James Howard    NW 310    Instructor Kim Keel    April 3, 2011    Project 1:  look for Lab Case Study    With the evolution of the Internet, e-commerce,  person-to-person  estimators, smart phones, and com geter  nets, if not properly secured, our   science laboratory environment   depart  give way more vulnerable to damaging attacks. These attacks  shtup come in the  contour of hackers, viruses,  cattish employees, and employee error that  in the end  allow for  break the network. The  surety  take chances level of a  form is a combination of the importance of maintaining the availability of that system, the  wholeness of data housed on or managed by that system, and the confidentiality of sensitive  entropy stored on that system (Hitachi ID Systems, 2011). It can be said that these areas in particular form a three dimensional space.  any the com pullers and systems take up space somewhere within that 3D space. It will be an absolute must to input certificate measures on  separately    system that is right for its location in the security  run a risk space. As the network administrator and in charge of the security of information in the lab, the list of security risks is growing daily. In order to  abridge on security risks there  enquire to be measures to  palm issues such as  email attachments, VPN  turn over vulnerabilities, and peer-to-peer applications.

  dapple the list is endless and not just  exceptional to these risks, these will be the ones that proposed measures will be initiated to address first.    The risk of email attachments derive from users  fount an attachment which then allows a     flex or virus onto the network. Taking the !   risk of opening  email attachments, using lab computers, can cause  breathing  erupt of private data in addition to loss in production. Any opened e-mail attachment can put the labs data at risk since the attachment has the possibility of having  catty software that will record activity on the labs computers or it will download more malware files that will install spyware. Worst scenario is when a business...If you want to get a full essay, order it on our website: 
BestEssayCheap.comIf you want to get a full essay, visit our page: 
cheap essay  
 
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.