Tuesday, June 4, 2019

Today The Worlds Becoming More Interconnected Information Technology Essay

Today The Worlds Becoming More Interconnected Information applied science EssayThis dissertation will evaluate the communicate warranter issues, its modern situation, existing engagement policies, key net profit security factors and challenges in SMB, and aims to propose the recommendations for upward(a) the current policies and procedures to reduce or alleviate the impact of the security risk. The look for plan includes pursue, primary and secondary data accrual on studying meshing security aspects.Background of the studyToday the world becoming more interconnected than it was few years ago and the reason is fast growing internet technologies and Internet. Nowadays it is al virtually(prenominal) impossible imagine world without Internet and net. As the speed is increasing the security issues related to the network security going up as well. If in early years we had minor threats and worries about the vulnerability and protection of our data in the internal and external network in a small ancestry nowadays we should take care more than it was. About 10-15 years ago there was not even a sign that the applied science will grow so fast. As an example the speed of Local Area Network will change from 10 M/bits to 1G/bit, the wireless technology such as Wi-Fi and WiMAX will come up, the mobile network technology will evaluate and could reach the speed when every mavin give the bounce watch a picture in HD format.Fast and reliable network has born other new problems and concerns how to keep the internal data secure and not to be compromised (Richardson, 2008). Every technology and invention has another side as well such as security aspect. Network security has huge importance as the intellectual place and security data can be acquired good through Internet if the organization has not any information and security policy. From what was said above we can define the Network security as The combinations of policies and procedures and countermeasure ac ts implemented to avoid and keep track of exploitation, destruction, disclosure and well-implemented policies for blocking viruses, hackers from the accessing or changing secure information.Purpose and deduction of the research areaThe pace of network technologies has risen and the hazards and threats, hackers attacks (Christian S. Ftinger, Wolfgang Ziegler , 2005) to the blood line on the rise as well. With this speed we need to be aware and evolve network security policies and procedures in order to be ready to face any possible attacks, attempts to destroy, obtain or change any data universe held by the transmission line.The principal(prenominal) purpose of this research is to define the awareness of network security and its effect to the small business by the employees, find out the current security policies and procedures and help to improve it and alleviate existing problems. Also this document will provide to small business owners and employees with a better understandi ng of network security and snitch recommendations to understanding and acknowledging the threats. Statement of the problemStatement of the ProblemFor a ordinary PC user the impact of virus attack or security breaches can be much less that if it had a place in an organization. The PC is generally just a single entity and any network security breaks impact is not distributed beyond that PC. But if it was in an organization premises it could pick up more serious impact not further on that particular work station also it could be spread among the organization as well. The most companies there are often consist of a spell of different systems, different type of information, terminals for processing customers data, servers (Knapp, 2011). Having such a complex structure has determined multiple points of entry and source of vulnerability which can be used by hackers, viruses and who has any intention for espionage or attacks.Internet connection adding additional problems to maintain sma ll business network environment secure and safe. The business use netmail and Internet to communicate inside and outside the organisation. This poses other secure issues like spreading computer viruses and provided an additional opportunity for the hackers, which can easily enter an organization network and wreak havoc on total intranet. By growing the pace of online business the network security has become importantly important and costly to be ignored. some other problems are that most computer users have not enough knowledges about computer and network security (Kenneth C. Laudon, Jane P.Laudon, 2012). It index be result of lack of network policy of the organization or even not existence such a policy. Another problem is most of small business has limited fund to keep their own IT specialist or to have some IT companies on the side.All these problems stated above have impact on the business securities and can reduce companys ability to ensure confidentiality, au accordinglytic ity and data integrity.Main research question and Sub questionsMain research questionWhat are the key aspects and impact of the current network security policy of small and mid enterprise and what recommendation could be made to make the policy effective?Sub questions What are key specify factors of a Network security? What are key defining factors of a Network security for SME? What are challenges in Network Security? What recommendations to SME? What recommendations to any general SMEs?Plan of work1. Written project purpose (draft) 18th January 20132. Written project proposal (final) 25th January 20133. Information and data collection 2nd February 20134. Analysis of the information collected 9th February 20135. Final writing of the dissertation February 20136. Submission Before deadline March 2013Chapter outlineNetwork security has become an essential need for any organization. The security issues and threats are increasing everyday and making high speed broadband tolerate wir ed or wireless insecure and less reliable. Working out the weak sides of the network security and improving the security policy and procedures are most important things towards which every owner or manager of small business must pay their attention (Spivey, 2007). This dissertation aims to help a small business to improve or alleviate that burden and network issues what they face in everyday base.Chapter 2. Preliminary literature reviewChapter introductionThis chapter will provide the collection of information and critical literature review which was collected and examined for the purpose of the study. Information mostly related to the network security issues and to the main and sub-questions question of this dissertation. The review garner information regarding past and current network security management issues and highlighted nowadays security trends in wired and wireless network.Background of the Network securityThe computer security problem has the same age as the computer its elf. Even in early 1950s the necessity of proper hardware-based protection already recognized. ( Karl female horse Michael de Leeuw, Jan Bergsta, 2007). But that was a quantify when everything could be controlled physically and have not had that complexity. Later the Internet took a birth on 1969 by Advanced interrogation Project Agency Network (ARPANet) which was accredited by USA Department of Defence (DoD). ARPANet was successful from the beginning and in two years it had 15 nodes (23 hosts) and the e-mail application was invented. Despite of the fact that originally it was designed for the research purposes and was aimed to allow scientist to share their data and access remote computers, electronic mail quickly becomes one of the most popular application. This gives for ARPANet to become a high-speed digital office of that time, where people could collaborate on their research projects and have a discussion versatile interests and topics. On October 1972 the International Co nference on Computer Communications at the Washington DC formed International Network Working Group (INWG) which main role was to identify the needs for a combined effort in advancing networking technologies and Vinton Cerf appointed first Chairman who becomes known as Father of the mesh (Hobbes, 2012).In 1982 the Transmission Control Protocol (TCP) and Internet Protocol (IP) TCP/IP, as the protocol suite, were established for ARPANET and it was first time when all computers in the network were presented as a collection of networks or Internet. Shortly in 1984 as the bend of hosts becomes more than 1,000 it becomes more complicated to remember each host address. thus the Domain Name Service (DNS) was presented the main purpose of which was to translate the numeric computer addresses presented as173.194.34.132 into understandable host name www.google.com. In 20 years the number of Internet hosts broke 1,000,000 and in this time period the Internet users already have faced with ac cidentally-propagated status-message virus in 1980, Internet worm which has affected 6,000 of the 60,000 hosts on the Internet in 1988, and presented many different network protocols such as DNS, DHCP, UUCP, NNTP. It also have connected the Europe and North and South America continents (Hobbes, 2012). scratch line from 1990s the Internet becomes available to the public. The main reason the World Wide Web (WWW) protocol was introduced and become more popular. First Internet browsers Netscape and Microsoft were competing by that time. Since then the Internet has become the source of threats for network security and any business network face constant threats from various types of viruses, worms, malware and spyware software and more. Design and achieving plans and network policies for network security for small business requires big effort to protect the business from these threats. Although numbers of studies were carried and information security law in operation we still face up new threats and it cannot be overcome by single and simple action. Below the key defining factors, challenges and main security factors will be reviewed.Key defining factors for Network securityRegarding the key factors of network security different sources has controversial and different opinions and views. Depends on the place and auditorium where the survey was conducted this factors are different. The information security breaches survey in UK conducted by PwC with association InfoSecurity Europe, beating-reed instrument Exhibitions and BIS in April 2012 find out interesting facts. According to this survey report up to 76% of small business had security breaches, 54% of small business dont have any plans or programme for improving or educating their staff about the security risks. The same time controls are not keeping same pace with business changes and most of SMBs (56%) did not carry out and checked their external providers security and just relaying on contracts. The same time 52% of SMB depends on social networking sites. The tendency to move towards mobile technology poses another risk and threats. As this is nowadays requirement roughly 34% of SMB allows mobile devices to connect to their systems without insuring or mitigating the security risks. More than half (58%) SMBs in the UK even not trying to evaluate the network security effectiveness. Another key factor was the staff network security awareness. Nearly 45% of the staff were not informed or had lack or small information. (PwC, Infosecurity Europe, Reed Exhibitions, BIS, 2012). Almost the same percentage (48%) the network security awareness have resulted another survey which was conducted by GFI Software (GFI, 2007)Everything what was said above has relation only to the additional factors which can improve and help to build robust and secure network. Except that we should take in our account other key factors which might clear more tangible and intangible harms to SMB.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.