Security Software Proposal Essay

Great Essays
Proposal for Security Software
Name: Jamonte Reed
Institution: University of Maryland University College

Proposal for Security Software Owing to the cybercrimes threats attempted on Advanced Research Company, it is recommended that the executive should make plans to acquire security software that will protect confidential corporate data from external access. Past events have demonstrated that companies are not secure from cyber attacks owing to the ones that the company has experienced and the recent one that involved a major competitor. In this study, attention is accorded to a description of the recommended security software and its benefits to the company.
Description of the Security Software PureVPN is the recommended security
…show more content…
The foregoing means that the software prevents hackers and crackers from accessing password prompts from the company. Such a condition means that it will be difficult for them to access any leads that might result to corruption of data. In addition, the PureVPN protects the firewall that protects the company’s network from malicious access and programs. Notably, rival companies might hire hackers to direct malicious programs to the Advanced Research Company’s network in order to corrupt the data held there within (Pure VPN Review, n.d). However, with the presence of this software, malicious programs will be detected and eliminated before doing any harm to the data. The current system is not secure, as technological advancement has led to production of malicious programs, which overpower the firewall’s …show more content…
PureVPN is powerful software with customized features, which close other operations during the test process. For example, the company will be forced to switch off its network in order for the software to detect the presence of external access. Evidently, this will bring the business to a standstill as most of the information is stored and accessed over the network. The consequences of the security test are felt by the entire company, including the workers who were involved in research activities. Such workers must run their variables in the computers, which are all interconnected with the same server. The unavailability of the server translates to work stoppage at the various stations at the company. However, it is better to run the software and quit operation for a few hours than ignore it and suffer data and profit

Related Documents

  • Improved Essays

    Ilab 5 jerry Metcalf Keller Graduate School of Management Professor: Gregory Gleghorn 6/4/2017 VPN Connection The type of VPN connection solution that we will be using to connect user to the internet work will be the Cisco Any connect client and the RSA secureID. We will be going in to detail of how the connection process goes and also how to configure it. Both clients are required in order for the user to authenticate and connect to the company network. When the user is connected they will be able to do their job remotely and send and retrieve information remotely.…

    • 678 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 3 Assignment 1

    • 1044 Words
    • 5 Pages

    Additionally, when remote workers are employed by organizations it is important to provide the employee with a secure connection to the network and server. By using a VPN, the establishment of a safe connection can ensue. For example, when buying locks to keep homes or businesses safe there is a different key for every lock. This means like keys; the VPN establishes a secure connection that does not allow for intrusions to occur by using the Internet (Stewart 19). The remote connection is established by using a tunneling protocol which adds security by encrypting data.…

    • 1044 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    Cyber Ark is an enterprise application cyber security company based in Israel with offices worldwide. The United States headquarters is in Newton, MA. with regional sales offices in Ft. Lauderdale, Houston, Las Angles and Chicago. The company is well known in the IT Security Company with a quality product designed to secure data in the enterprise as well as the cloud.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Managing Threats to Data Common threats to data consist of Botnets, DDoS (Distributed denial of service), Hacking, etc. You can manage and prevent data threats with antivirus/malware/hacking/etc software. By downloading a legitimate program you can protect your computers data. The software will alert you if there is something out of place in your computer before it’s too late, so you can get it removed.…

    • 1963 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Final Project

    • 1035 Words
    • 5 Pages

    Introduction…………………………………………………………………………….. 3 2. Virtual Private Network (VPN)……………………………………………………….... 3 3. Classification…………………………………………………………………………....…

    • 1035 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Capstone Project Summary

    • 681 Words
    • 3 Pages

    Recently Acme Produce has experienced random unscheduled down time due to network outages resulting from various points of failure within the network infrastructure including power surges and blackouts, loss of WAN connectivity, failed hardware and virus and malware network propagation. The loss of network resources and unscheduled down time can equate to tens of thousands of dollars in a matter of hours for Acme Produce. Due to the associated cost of downtime and nature of Acme Produce's operations, several constraints are placed on the implementation of the new network infrastructure. Constraints to network implementation include minimal downtime, migration to new facility should appear seamless to end users, and users at the new facility will require access to network resources at the existing facility to allow for ease of collaboration with team members who have yet to transfer to the new…

    • 681 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Developing data analytics to monitor and screen cybersecurity threats and react to threat attacker episodes and review log activities (Bergquist, 2016). Technical recommendations to boost security without significantly increasing personnel management can be achieved by incorporating security frameworks reviews, examining any area(s) of weakness or vulnerabilities and implementing security controls. Business partners of ABC Healthcare such as banks, vendors, and collection agencies will continue to thrive with the integration of proper security measures without introducing significant overhead and complexity. Integrating data sharing polices can protect the information and ultimately reduce the level of access to individuals information. To tackle information security infringements, ABC healthcare business partners must concentration on the collaboration of security control with ABC Healthcare to enforce security regulations such as data encryption, data sharing and disposal policies, and educate personnel by…

    • 782 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Pomeroy Case

    • 201 Words
    • 1 Pages

    Pomeroy was hired by a Fortune 20 supermarket client. With annual revenue of over one billion dollars, the retailer operates nearly 2,800 retail, food, drug, jewelry, and chain stores. (Pomeroy, n.d.). The company asked the execution to occur in parallel with another system-wide deployment to resolve other critical issues. The clients’ Network Data Security included their stores operating on single, open network where store-wide devices capable of transmitting, receiving and storing confidential customer data of one department.…

    • 201 Words
    • 1 Pages
    Improved Essays
  • Great Essays

    For example, if the router of the company is hacked, the hacker may be able to access all the data being sent to and from the company’s network and even altered the content of these data. Therefore, it can lead to incorrect business information. The consequences will be even worse if the information being transmitted or received is meant to be confidential.…

    • 1416 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The purpose of this paper is to describe the network configuration, explaining the role of each component and connection of the scenario provided. Specifically, I will discuss the functions of the components and describe how they contribute to the network. Along with this I will modify the appropriate components of the provided database with the information regarding the employees’ computers and the upgrade. Network Configuration Network configuration allows a system admin to set up a network to use to communicate. Per Techopedia, “Network configuration is the process of setting a network 's controls, flow and operation to support the network communication of an organization and/or network owner.”…

    • 923 Words
    • 4 Pages
    Improved Essays