Professional working in a network security center

Assignment Help Computer Engineering
Reference no: EM131598509

Today we see various proactive measures in use. For example, banks may use thick steel and concrete vaults with the latest electronic security system to prevent break-ins. While convenience stores may place cameras in visible sight to record business activities, as well as, deter possible theft.

Although I lack the experience in role of a professional working in a Network Security Center, I believe one of the goals or main goal for those security professionals is to prevent host based or network-based attacks that would compromise a system. One common example today for most companies is that they may own thousands of endpoints around the world that run multiple operating systems and applications from various vendors.

While assuming the task to make sure software on those endpoints are not susceptible to dangerous vulnerabilities from a missing patch update or user embedded, it is important that proactive measures are always set. From research on the current topic, Farhat et al (2011) recommends developing a compliance work plan.

The plan must include your cyber-attack procedures, in combination with other compliance matters such as policies, code of conduct, training, and specific incident response procedures.

In most companies, a majority of employees may not read the specific details for use of computers on the network when signing on to gain access.

In return, employees introduce worms or viruses that may cause damage to the system infrastructure when not knowing the appropriate network use. Vacca (2014) states that the fundamental goals of a security policy are: "to allow uninterrupted access to the network resources for authenticated users and to deny access to unauthorized users" (p. 263).

Farhat et al (2011) also recommends that companies should invest in security equipment and procedures to deter or prevent cyber-attacks. Those measures include applying the latest security patches, protecting all passwords, developing network security architecture, monitoring activities and procedures of third-party contractors (p. 3)

I think having effective patching processes in place, employee training on the network and use policy, and investing in your equipment are some of the ways to have proactive measures for your network.

The list doesn't stop there, but having plans such as a Cyber Incident Response, knowing cybercrime law, and mitigation against cyber-attacks go a long way. 2 Timothy 3:16-17 says, "All Scripture is breathed out by God and profitable for teaching, for reproof, for correction, and for training in righteousness, that the man of God may be competent, equipped for every good work." As security professionals, it may be a common theme to continually teach and learn so that they may uphold the posture of their company's network.

Through this training the professionals are given in their careers their goal is to perform good work.

References: Vaca, J. R. (2014). Network and System Security (2nd ed.) Waltham, MA: Syngress/Elsevier. ISBN:9780124166899.19. Farhat, V., McCarthy, B., Raysman, R., Holland & Knight LLP. (2011).

Cyber Attacks Prevention and Proactive Responses. Vince Farhat, Bridget McCarthy and Richard Raysman, Holland & Knight LLP

Article with reference in APA format.

Verified Expert

The paper is about the bank security measures which can be protected through the technology know how & through the software which protect from getting damaged which are key highlighted in the paper. This paper has been prepared in Microsoft office document.

Reference no: EM131598509

Questions Cloud

Compute the companys weighted average cost of capital : Compute the company's weighted average cost of capital. Use the dividend discount model. Show calculations in Microsoft Word.
An agency or departments can impact the issue : Describe the primary ways the human resource management part of the organizational structure positively or negatively impacts the issue that you selected.
Protect against intrusions to the network : The simplest measures to implement in order to help protect against intrusions to the network are some of the more practical applications.
Evaluate efficiency of two common inventory control systems : Evaluate the efficiency of two common inventory control systems. Determine ways in which they provide a firm with a competitive advantage in the marketplace.
Professional working in a network security center : role of a professional working in a Network Security Center - majority of employees may not read the specific details
Determine the service-related variance for patient days : Determine the service-related variance for Patient Days. Determine the total variance between the planned and actual budgets for Surgical Volume.
Experiencing pathology within which body system : Patients with pneumonia are experiencing pathology within which body system? What are the organs of this system?
Compare job costing with process costing : Compare fixed, variable, and mixed costs. What do we mean by a Relevant Range?Compare job costing with process costing.
Describe one of the civilizations from the list provided : Describe one of the civilizations from the list provided (i.e., location, environment, and relevant history of the civilization).

Reviews

inf1598509

9/12/2017 6:15:18 AM

Preparing my computer science task is tough for me like battling a wild python. Be that as it may, assignments help specialists from Expertsmind.Com demonstrated their class and prepared my task like bubbling water on the stove. That is the thing that I call top notch task offer assistance.

len1598509

8/12/2017 12:59:38 AM

i have to reply to this article with reference in APA format. Today we see various proactive measures in use. For example, banks may use thick steel and concrete vaults with the latest electronic security system to prevent break-ins. While convenience stores may place cameras in visible sight to record business activities, as well as, deter possible theft.

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd