Best Essay Services

  • Refund Policy
  • Revision Policy
  • My Account
  • Home
  • About Us
  • ORDER NOW
  • Sample Papers
  • Contact Us
  • Writing Resources

We Write Student Assignments and Successfully Score High Grades!

Your assignment is in good hands if the writer assigned to work on it is well trained, and with over 3-7 years experience. Submit your instructions now via the Order Button below to get your paper written. We cover over 100+ disciplines; frequently requested being: Essays, Research papers, term papers, thesis/dissertations, reports, projects, among others.

PLACE YOUR ORDER

Boost Your Grades With BestEssayServices.com Writing Team

Do you feel like you have no spare time to rest or attend to your family needs because of homework assignments? Simply contact us! We are available 24/7 to assist you with your homework so that you can have some time off school work.

Can You Write My Paper?

Yes we do! and we understand the anxiety you have when you have to trust another person to complete your paper. Trust us, we will not disappoint! Order your paper with us now..

Timely Delivery

ALL SUBJECTS COVERED: We have over 100+ disciplines covered by our writers. No matter the complexity of your paper, there is a professional writer willing to help.

24/7 Customer Help

EXPERT ASSISTANCE: We have a database of expert writers, who have been with us for over 3-7 years. The quality of your paper is definitely guaranteed.

Affordable Pricing

100% ANONYMITY: While seeking academic writing help, you must be assured of your privacy and confidentiality. We respect your decision to seek for our services.

Sunday, 09 August 2020 / Published in Customized Research Papers

Sample Technology Essay Paper on Network Security

Network Security

Introduction

Network security is the adoption of policies that help in the prevention and monitoring of unauthorized access to data and information (Hua & Bapna, 2013). In today’s world, technology is advancing greatly with ordinary people benefiting the most. The internet has seen a rapid growth and advancements. Many people are able to work swiftly and efficiently with technological tools like the computers, wireless connections, and the information that is gathered from sites through the internet. This is the good side of technology but the bad side of it is hacking. Through hacking, information is prone to fall in the wrong hands and the consequences might be grave. This shows that there is need to protect and secure information that is sent and received via the internet.

Vulnerabilities Assessment

The firm has shown to have network security problems that could be breached if no actions are taken to stop the possible hacking of the network (Vacca, 2012). Vulnerability results from the flaw or weak point of the organization’s entire security and network system that can be easily exploited. The vulnerabilities of this organization include wireless connection, email setup of staff through the company’s internet provider, use of standard websites to access emails, management’s use of iPad to access and respond to emails, application of wireless as the primary network connection, and peer to peer network. These vulnerabilities are easily exploited and the implications could be severe; for instance, the connection of the computers and printers to the wireless NETGEAR MR814 device. Netgear routers have been seen to be very vulnerable due to the flaws that have been exploited by hackers. The company’s Domain Name System (DNS) settings could be changed to a malicious IP address and the company’s data can fall into the wrong hands.

The email setup of the staff through the company’s internet provider shows a flaw that could be easily attacked (Song & Shen, 2010). With the compromise of the internet connection, emails for the staff could be redirected to other IP addresses that the hacker wants the information to go to. This is very dangerous as the information on clients’ accounts can be easily retrieved against the account holders’ directive. The manager’s use of an iPad to send and receive emails is also a risk that can be exploited. This is because the gadgets, for example, the computers, are left vulnerable to hacking and vital information leaked and sent to addresses the hacker designates. Access to emails through standard websites is susceptible too. Most of these websites have spyware, software that monitors the use of a computer by a user. Spyware can access and collect information from personal information to readdressing web browsers. Emails that have been accessed through standard websites can be exploited and the information of clients is hacked and directed to other IP addresses intended by the hacker.

The use of wireless network as the sole primary network connection increases the firm’s vulnerability and reduces efficiency. In situations where many people are using wireless networks, the speed of the network reduces; this is because of network interference. Due to the low speed, malicious software can be sent to the files and data could be lost. Peer to peer networking is the distribution of tasks between peers. Peers make a portion of their resources directly available to other network participants without the need for central coordination by servers. Peer to peer applications can be vulnerable. What makes it dangerous for peer to peer software is that its applications operate as the servers, in addition to the clients, signifying that they can be more susceptible to remote attacks (Vu, Lupu, & Ooi, 2009). Without a proper server, the firm is at risk of losing all vital information to hackers and this will cause irreparable damage.

Network System Security Recommendations

Network security requires identification and passwords for computer networks and systems that helps in authorizing and being able to access vital information. There are private networks and public networks; nonetheless, private networks are suitable for this firm as other networks are prone to malicious attacks. There are two types of attacks: active and passive attacks. Passive attacks could arise when a network intruder intercepts data traveling through the network while active attacks may happen when an intruder initiates commands to disrupt the network’s normal operations (Vu et al., 2009).

For this firm to curb possible hacking of its network security systems the assessed vulnerabilities need to be checked and a few recommendations implemented as discussed below.

  • For the wireless network connection, updating the firm’s firmware will help. Constant update of the router helps if detection of redirected IP addresses is noted.
  • A different cable of a higher speed would be an advantage. The Motorola sb3100 cable modem is quite slow for a Netgear router. Changing the cable will enhance the speed of the network connection thus increasing its efficiency.
  • By setting up a windows server domain, access to files and other data will be safe especially to the firm’s employees. This will help reduce the risk of data being hacked or directed to other people’s IP addresses. With a server, authorization to access information will be required and failure to have a login id or password means one will not access the information.
  • The manager has to be integrated in the server domain so as to protect the information he has access to. It would be difficult to hack a server domain as to get the primary source of information a hacker has to try really hard to get a code of the domain.
  • Creation of a website. Website creation helps in redirecting attention of the hacker from the original information. By this, the firm gets to secure the original and important information by putting a website that has information that can help the public but prioritize and protect the original data by use of firewalls and other security systems.

Moreover, the firm needs to invest in securing the computer and network systems. The overall performance of the firm solely relies on the security of the clientele data. If information leaks to unknown persons, fraud is bound to take place and this could affect the firm and its reputation. Procuring systems and equipment will be beneficial to the firm too. Upgrading from old and slow systems will be a plus. This will help in eradicating the risks and dangers of information falling to the wrong hands. Investing in a firewall is recommended. A firewall denotes a system that checks and manages the received and leaving network traffic rooted in programmed security regulations. This means a firewall will establish a barrier between a secure, trusted internal network and another outside network that is assumed not secure and cannot be trusted (Marsa-Maestre, De La Hoz, Gimenez-Guzman, & Lopez-Carmona, 2013).

There are four types of firewall that they firm could choose from; they include network layers (packet filters), application layer, proxies, and network address translation. However, the best type of firewall for the firm will be the Network Address Translation. This basically refers to the masking of the Internet Protocol (IP) from a private network IP address to another IP address. Network address translation is the common method of masquerading IP addresses. Internet connection is seriously influenced by the use of this translation. Careful implementations are required for this translation as they vary differently according to particular behaviors and network interference. The details of the network address translation are usually not acknowledged by sellers of gadgets having implementations (Amutha & Rabara, 2015). The best configuration for the network address translation for the firm would be the full cone NAT, commonly known as the one to one NAT. Full cone NAT is when an internal address is mapped to an external address. Packets from the internal address can be sent through the external address. Any external host could send information to the internal address through to the external address.

Other than the Netgear router, a different cable modem with exceptional speeds is required. With a cable modem that has fast speeds, the firm will be able to competently and properly monitor the network and computer systems. A high speed cable modem with a Netgear wireless router will boost the firm’s internet and will also work efficiently with the windows server domain (Amutha & Rabara, 2015).

Application/ End User Security Recommendations

Applications that the end-user can use to reduce the risks of hacking and losing vital information can be taught to the user and train a user on how to approach a potential risk. By educating and training a user on the potential risks of network security breach and computer security systems, value is added and exceptional care will be taken while using the computers, accessing data and sending vital information. A computer that has a proper authentication mode is the best (Amutha & Rabara, 2015). This makes the user be aware that he/she is the only person who has the authorization and password to the computer. This shows that there is some sense of responsibility. This also minimizes the risk of hacking as it would be hard for hackers to try and hack into a system that has an authorization password.

When there is no moving of data, the data is very much protected from hackers (Marsa-Maestre et al., 2013). This is because data that is at rest is quite hard to be hacked. Users should learn how to shut the computers safely so as to reduce the chances of losing data. When a computer is safely booted, the information that was on the computer’s database is saved and stored and is free from malware and spyware. For the installation of applications that detect spyware, the user can detect and prevent spyware from the computer to avoid loss of data and vital information. Detection of such spyware helps the firm to put up or install firewalls that can easily prevent the loss of data hence save important files.

Conclusion

The protection of the network security systems of a firm is vital to its success. The firm should invest in improving the security systems and computer systems by implementing the given recommendations. Important and crucial data can be saved if the implementations are followed and the firm’s reputation will also be increased.

References

Amutha, J., & Rabara, S. A. (2015). An Integrated Secure Inter-mobility IPv4/IPv6 Address Translation Architecture for Corporate Networks. International Journal of Future Computer and Communication, 4(5), 316.

Hua, J., & Bapna, S. (2013). The economic impact of cyber terrorism. The Journal of Strategic Information Systems, 22(2), 175-186.

Marsa-Maestre, I., De La Hoz, E., Gimenez-Guzman, J. M., & Lopez-Carmona, M. A. (2013). Design and evaluation of a learning environment to effectively provide network security skills. Computers & Education, 69, 225-236.

Song, L., & Shen, J. (2010). Evolved cellular network planning and optimization for UMTS and LTE. Boca Raton: CRC Press.

Vacca, J. R. (2012). Computer and information security handbook. Oxford: Newnes.

Vu, Q. H., Lupu, M., & Ooi, B. C. (2009). Peer-to-peer computing: Principles and applications. Berlin, Germany: Springer Science & Business Media.

Why are we trusted by Thousands of Students?

We are a flexible writing service provider. Your assignment is assigned to a writer based on his/her expertise and experience. We have put in place measures that ensure that you will never receive a plagiarized paper. As a student, you are also looking for a service provider which is affordable; we therefore have ensured that our prices are affordable and have provided a provision for various discounts.

Do you like the Quality of this sample? Click on the button below to ORDER a non-plagirized paper now

Do you have an assignment on a similar topic?

Do you have an assignment on a similar topic?

Is this your first time visit to our website? Are you writing an assignment on the topic you just read? We would be glad to offer our professional assistance by writing your assignment for you. The writing style will be so academic that you will think you wrote it yourself. You do not have to struggle anymore when we have writers online right now willing to take up your project. Get Homework Help Now!

PLACE YOUR ORDER NOW

Why we guarantee excellent results

Thank guys! I had never handled such a topic before. It was my first assignment in college studies and could not figure out how to hammer it on my own, but your writer did it perfectly

- Submitted 22 Minutes Ago

I expected perfection in terms of grammar and I am happy. Lecturer is always on our head but was pleased with my paper. Once again, thanks a lot, more papers and friends with you.

- Submitted 40 Minutes Ago

Thanks for the good work to save my studies. Will keep in touch with more assignments and refer my whole class to your team. The last 3 papers got me clean straight As, thank you.

- Submitted 3 Hours Ago

TI appreciate help on the assignment. It was hard for me but am good to go now; I needed someone to take up my assignment as I was overwhelmed by my family for the last one month.

- Submitted 12 Hours Ago

Just wanna say thanks for attending to my assignment guyz. Looking for the very best because it looks perfect, will be back with more assignments; and will definitely refer my friends.

- Submitted 2 Days Ago

❮ ❯

Why Getting Homework Help Is A Good Idea For You!

Someone might question the idea of getting homework help, but what if you have reasons why you must get assistance in writing your papers. Apart from homework, you have other important things to do in life. Like a family to take care of, children that need to be attended to, business trips that you have to make and sometimes-family sickness. Would you not attend to these first before writing your essay? This is why we come in handy as the best essay services for all your homework papers.

Best Essay Services writing team understands that your need for paper writing service is not necessarily out of being lazy! Sometimes you need guidance in coming up with an outline, selecting the topic, analyzing data, writing a rough draft, carrying out research, among others. So, do not be anxious about asking for assistance with your homework. Our team of writers will be glad to write your paper, according to your specified instructions, and deliver it within your deadline. Place your order today!

We have a great team of homework writers chosen meticulously by our experienced editorial team. The team comprises of essay writers who can handle any type of assignment that you are in need of. You are in the right place if you are looking for essay help, research help, thesis help, report writing, project writing, case studies, term paper writing, and dissertation help among others. All you need is to specify the type of paper writing service that you need when placing your order.

We have over the years helped thousands of students in need of writing help. This means that we understand and are professionals at academic writing help. Our professional writers will handle any type of paper needed, any format and deadlines. We have customized our platform to allow for orders that take as long as 1-2 months and short deadlines as 3-6 hours. We also have specialized homework writers who handle Masters and PhD papers. We have made essay writing help easy for you!

Submit Assignment Details

Submit your order instructions by filling in the form, and then, submit payment for your order.

Writer is Assigned

Once we receive your order details, the writer is immediately assigned to work on your paper.

Evaluation and Delivery

The completed paper is checked by our editors and then emailed or uploaded to your account.

Need Help? Click On The Chat Button For Help. We Are Available 24/7

  • Free Outline
  • Free Formatting
  • Free Reference Page
  • Free Title page
  • 24/7 Customer Service
  • Free Plagiarism Report
  • Free Revisions
  • Discounts Available

We have an in-house professional team of support that is ready to answer your questions or concerns, or get you started to place your order with us. You can chat, call us or email our support 24/7!

Latest Samples from the blog

Latest Posts

  • Read more + May 29, 2021 By He's Restored in Sample Essay Papers

    Sample Psychology Essay Paper on Social Problems with Adulthood and Ageing

  • Read more + By He's Restored in Sample Essay Papers

    Sample Education Coursework Paper on Quantitative Reason in Research

  • Read more + May 16, 2021 By He's Restored in Sample Essay Papers

    Sample Business Studies Essay Paper on What Is Disruptive Innovation

  • Read more + By He's Restored in Sample Essay Papers

    Sample Holocaust Studies Essay Paper on Genetic Tests

  • Read more + May 15, 2021 By He's Restored in Sample Essay Papers

    Sample Religious Studies Paper on Comprehension and Reflection Assignment – Ecclesiology and the Sacraments

  • Read more + By He's Restored in Sample Essay Papers

    Sample Management Paper on Global Supply Chain Management

  • Read more + May 14, 2021 By He's Restored in Sample Essay Papers

    Sample Essay Paper on Big Brother at the Mall

  • Read more + May 13, 2021 By He's Restored in Sample Essay Papers

    Sample Women and Gender Studies Essay Paper on Racial Stereotypes of African-Americans and Arabs in Popular Culture

  • Read more + By He's Restored in Sample Essay Papers

    Sample Management Admission Essay on Child Care in the Workplace

  • Read more + May 12, 2021 By He's Restored in Sample Essay Papers

    Sample Sociology Essay Paper on Reflection and Discussion on Major Course Research Projects

CHECK 4K+ SAMPLES HERE
Place your order Now
GET STARTED NOW

About Us

BestEssayServices.com offer personalized and comprehensive essay writing help to students with an aim of helping them excel in their academic endeavors. Partner with us for all your academic writing services.

Corporate Info

  • Home
  • About Us
  • Contact Us

Resource Center

  • Sample Papers
  • Writing Resources
  • FAQs

Customer Info

  • Customer Account
  • Revision Policy
  • Refund Policy

Copyright © 2010- BestEssayServices.com. All Rights Reserved to JESUS

TOP