[SOLVED] Discussion 4 —- provide replies to Discussion 7

I don’t understand this Computer Science question and need help to study.

Struggling to find relevant content or pressed for time? – Don’t worry, we have a team of professionals to help you on
[SOLVED] Discussion 4 —- provide replies to Discussion 7
Get a 15% Discount on this Paper
Order Now

provide replies to below students posts:

Discussion 7:In terms of network security, what should organizational management allow and what should they block?

ven:

Network security management allows the administrator to manage a network consisting of physical and virtual firewalls in a central location. Administrators need network security management solutions to gain high visibility into network behaviors, automate device configuration, enforce global policies, view firewall traffic, create a unique interface for managing and reporting, and manage them.

Organizations now face threats against their information assets. At the same time, they are increasingly dependent on these assets. The rapid increase in the size and complexity of organizational networks will soon be the way forward for manual management. Most information systems are not inherently secure and technical solutions are only part of the holistic approach to information security. In recent years, a number of tools have been developed to automate this process. Establishing information security requirements is essential. However, organizations need to understand their unique threat environment. There are tools that allow to scan networks with multiple vulnerabilities and scan for attacks. In that network security after network security management. (Utz, L. (2018))

In network security organizational management allow :

1. First of all they have to setup a local firewall to prevent some trojans and backdoors.

2. They must install a descent antivirus to prevent from sort of viruses.

3. They must apply authentication and authorization for their services on the basis of layers, that who can access certain stuff, in which some authentication method will be there, like password protection to each user, so particular user if has rights to access then only he or she can.

4. They also has to block some sites which provoke viruses, on the basis of their content.

Saving only the work related data in the network.Complex passwords has to be encouraged. Use network and virus protection tools Provide two step authentication Block. saving employees personal information. Simple passwords has to be blocked intimate the employee the consequences of it. Don’t allow to disclose the company’s sensitive information. (Liu, J. (2018, August)

sin:

Organizational management plays a very integral role in the promotion of better delivery and achievement of optimal network security levels. The rationale for the above ideology can be explained from the fact that in as much as best policies guarantee better performance, users of computers and network systems must be closely monitored to ensure that their approach in work does not jeopardize the efforts of the organization in improving network security (Stewart, 2014). In light of the above, there are a number of things that organizational management may allow or block to ensure that network security levels are efficiently optimized.

For instance, management could allow access to the server room. This is because it is important to have an expert, or a team or expert with ready access to the server room in case of the occurrence of any emergency concerning the security of information. However, leaving the server room open should be blocked. That is, it is fundamental that the server room stays locked up and is only accessible by the authorized personnel – all other employees in the organization, without clearance to enter the server room, should be blocked. Notably, the server room stands out as the literal heart of the network security in a given organization and unauthorized access to switches, cables, routers, and the servers, among others, may result to destructive tampering (Kartch, 2017).

The management may allow the employees to bring their own devices to work. More so, they might be allowed the freedom to access any online resoruces using the corporate internet network. However, the above two workplace conveniences are countered with the disallowance of a few related practices. For instance, the management should block the use of home network for work purposes. The reason for the above is because the firewall robustness for the home network cannot be matched with that of the workplace, it is easier for hackers to take that advantage and use it as a loophole to enter into the corporate network system. Additionally, management should ensure that unused computers in the workstation are always disconnected or removed from the systems since they pose as easy entry points for intruders.

Discussion 4:Provide an example based on your professional experience of what motivate hackers to attack computer networks?

16 mins ago

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
$0.00
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
Sign up, place your order, and leave the rest to our professional paper writers in less than 2 minutes.
step 1
Upload assignment instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
s
Get personalized services with MyCoursebay
One writer for all your papers
You can select one writer for all your papers. This option enhances the consistency in the quality of your assignments. Select your preferred writer from the list of writers who have handledf your previous assignments
Same paper from different writers
Are you ordering the same assignment for a friend? You can get the same paper from different writers. The goal is to produce 100% unique and original papers
Copy of sources used
Our homework writers will provide you with copies of sources used on your request. Just add the option when plaing your order
What our partners say about us
We appreciate every review and are always looking for ways to grow. See what other students think about our do my paper service.
Human Resources Management (HRM)
Thank you so much.
Customer 452701, August 14th, 2023
Criminal Justice
always great!
Customer 452465, February 23rd, 2021
Human Resources Management (HRM)
Thank you so much for your time.
Customer 452701, September 5th, 2023
Other
I appreciate your work. Thank you????
Customer 452949, September 15th, 2023
Nursing
Did not receive paper on time.
Customer 452693, November 9th, 2022
Professions and Applied Sciences
Amazing work!
Customer 452707, May 29th, 2022
Nursing
Writer did an excellent job! Thank you.
Customer 452693, January 14th, 2022
Human Resources Management (HRM)
Thank you so much.
Customer 452701, October 11th, 2023
English 101
Although a little late, the content and structure of the paper was great! I would definitely use this writer again!
Customer 452561, July 12th, 2021
Nursing
Thank you for the outstanding work .
Customer 452635, June 5th, 2022
Human Resources Management (HRM)
Dynamic!!
Customer 452701, October 17th, 2023
Human Resources Management (HRM)
Excellent Thank you.
Customer 452813, January 11th, 2025
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Good News ! We now help with PROCTORED EXAM. Chat with a support agent for more information