Professional working in a network security center

Assignment Help Computer Engineering
Reference no: EM131598509

Today we see various proactive measures in use. For example, banks may use thick steel and concrete vaults with the latest electronic security system to prevent break-ins. While convenience stores may place cameras in visible sight to record business activities, as well as, deter possible theft.

Although I lack the experience in role of a professional working in a Network Security Center, I believe one of the goals or main goal for those security professionals is to prevent host based or network-based attacks that would compromise a system. One common example today for most companies is that they may own thousands of endpoints around the world that run multiple operating systems and applications from various vendors.

While assuming the task to make sure software on those endpoints are not susceptible to dangerous vulnerabilities from a missing patch update or user embedded, it is important that proactive measures are always set. From research on the current topic, Farhat et al (2011) recommends developing a compliance work plan.

The plan must include your cyber-attack procedures, in combination with other compliance matters such as policies, code of conduct, training, and specific incident response procedures.

In most companies, a majority of employees may not read the specific details for use of computers on the network when signing on to gain access.

In return, employees introduce worms or viruses that may cause damage to the system infrastructure when not knowing the appropriate network use. Vacca (2014) states that the fundamental goals of a security policy are: "to allow uninterrupted access to the network resources for authenticated users and to deny access to unauthorized users" (p. 263).

Farhat et al (2011) also recommends that companies should invest in security equipment and procedures to deter or prevent cyber-attacks. Those measures include applying the latest security patches, protecting all passwords, developing network security architecture, monitoring activities and procedures of third-party contractors (p. 3)

I think having effective patching processes in place, employee training on the network and use policy, and investing in your equipment are some of the ways to have proactive measures for your network.

The list doesn't stop there, but having plans such as a Cyber Incident Response, knowing cybercrime law, and mitigation against cyber-attacks go a long way. 2 Timothy 3:16-17 says, "All Scripture is breathed out by God and profitable for teaching, for reproof, for correction, and for training in righteousness, that the man of God may be competent, equipped for every good work." As security professionals, it may be a common theme to continually teach and learn so that they may uphold the posture of their company's network.

Through this training the professionals are given in their careers their goal is to perform good work.

References: Vaca, J. R. (2014). Network and System Security (2nd ed.) Waltham, MA: Syngress/Elsevier. ISBN:9780124166899.19. Farhat, V., McCarthy, B., Raysman, R., Holland & Knight LLP. (2011).

Cyber Attacks Prevention and Proactive Responses. Vince Farhat, Bridget McCarthy and Richard Raysman, Holland & Knight LLP

Article with reference in APA format.

Verified Expert

The paper is about the bank security measures which can be protected through the technology know how & through the software which protect from getting damaged which are key highlighted in the paper. This paper has been prepared in Microsoft office document.

Reference no: EM131598509

Questions Cloud

Compute the companys weighted average cost of capital : Compute the company's weighted average cost of capital. Use the dividend discount model. Show calculations in Microsoft Word.
An agency or departments can impact the issue : Describe the primary ways the human resource management part of the organizational structure positively or negatively impacts the issue that you selected.
Protect against intrusions to the network : The simplest measures to implement in order to help protect against intrusions to the network are some of the more practical applications.
Evaluate efficiency of two common inventory control systems : Evaluate the efficiency of two common inventory control systems. Determine ways in which they provide a firm with a competitive advantage in the marketplace.
Professional working in a network security center : role of a professional working in a Network Security Center - majority of employees may not read the specific details
Determine the service-related variance for patient days : Determine the service-related variance for Patient Days. Determine the total variance between the planned and actual budgets for Surgical Volume.
Experiencing pathology within which body system : Patients with pneumonia are experiencing pathology within which body system? What are the organs of this system?
Compare job costing with process costing : Compare fixed, variable, and mixed costs. What do we mean by a Relevant Range?Compare job costing with process costing.
Describe one of the civilizations from the list provided : Describe one of the civilizations from the list provided (i.e., location, environment, and relevant history of the civilization).

Reviews

inf1598509

9/12/2017 6:15:18 AM

Preparing my computer science task is tough for me like battling a wild python. Be that as it may, assignments help specialists from Expertsmind.Com demonstrated their class and prepared my task like bubbling water on the stove. That is the thing that I call top notch task offer assistance.

len1598509

8/12/2017 12:59:38 AM

i have to reply to this article with reference in APA format. Today we see various proactive measures in use. For example, banks may use thick steel and concrete vaults with the latest electronic security system to prevent break-ins. While convenience stores may place cameras in visible sight to record business activities, as well as, deter possible theft.

Write a Review

Computer Engineering Questions & Answers

  Main differences between c and c++ languages

What are the major differences between C and C++ languages? What do you want to learn in a programming language, such as C, in order to use it effectively in problem solving.

  Compute the output of a sigmoid neuron

Write out Equation a′=σ(wa+b). in component form, and verify that it gives the same result as the rule 4 for computing the output of a sigmoid neuron.

  Implementing stringed musical instrument class

Generate a Java test class which simulates utilizing your instrument class. a) Construct 10 examples of your instrument, b) tune your instruments, c) Start playing your instrument, d) Call your unique method, and e) Stop playing your instruments.

  Discuss the advantages and disadvantages of star

Discuss the advantages and disadvantages of star, bus, and mesh physical topologies. Provide real examples of each type.

  Software engineering and microprocessor systems

Software is required for a simple house burglar alarm system.

  Design an application that will receive the weight of parcel

You will need to design an application that will receive the weight of a parcel and calculate and display the cost per kg and the delivery charge for that parcel.

  Describe the different roles

define the different roles you think might be fulfilled by Web Services and Web Portals. What do you see as the major distinctions between the two from the perspective of provisions of eBusiness services? Which do you think is the more useful in t..

  Compute the greatest common divisor of two integers

Write down a recursive function that calculates the greatest common divisor of two integers using the Euclidean algorithm. Write a driver program to test your function.

  Describe a recent high-profile computer security

define a recent high-profile computer security issue that you have heard of or read about. According to basic network security principles, how might the issue have been avoided? Provide at least one resource.

  As a member of the information security team at a small

as a member of the information security team at a small college you have been made the project manager to install an

  Design an access system that would control people

Design an access system that would control people getting into your favorite or most valued items, what things would you consider based on your readings?

  Modify an instance of the class polygon

suppose you are participating in a big project that deals with points in a two-dimensional plain

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd