Widgets International Business Analysis

Improved Essays
Here at Widgets International need to take into account different security aspects with the recent merger and integration of the two networks. Also if we plan on being number one in the global widget industry we need to take into account possible threats not only from outside but also within our network. We are going to have to deploy hardware as well as software to protect our network. A computer use policy will also have to be created as we will have a unified network with more people accessing the resources it contains.
Potential Threats There are many different threats that could potentially disrupt our network, steal or delete confidential data. Hackers are people that attempt to gain unauthorized access to the network by exploiting
…show more content…
The network firewall prevents access to different parts of the network depending on how it is configured. A firewall can be either hardware or software, in our case here at Widgets International I will have to suggest in a hardware firewall to be integrated into the network upgrades. This will block hackers or anyone outside our network from gaining access to the information contained within our network. This can also be used to limit the access we allow the users within our network from accessing the internet (Mitchell, …show more content…
I recommend we deploy a domain based network where each user will have to login to the terminal using a supplied username and password. They will only have access to the areas of the network intended to them. A sales reprehensive would have access to sales and inventory, where human resources has access to employees information. This will help reduce the potential threat of a user gaining access to information not intended for them. The domain based network allows you to keep a central administration area where access to any network resource can be granted to the desired user (Thefreedictionary.com, 2014). Computer Use Policy

Objective Widgets international provides network, e-mail, and internet access to our employees as it will benefit us a company. We encourage the use of the provided network, e-mail, and internet access in an appropriate manner as you are representing Widgets International. This policy will contain the guidelines we have set in place for the use of network, e-mail, and internet access.

Scope This policy must be followed by all employees at Widgets International along with all other policies set in place. Widgets International follows all local laws and holds all employees accountable to these local laws as well. All information contained within this policy also will not violate the rights or responsibilities contain is such

Related Documents

  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Since access has been granted previously, the network access codes will now need to be changed, to warrant away previous access to the network. An employee should be responsible for monitoring all network access to ensure that there isn’t unauthorized access or activity. Reports should be assessed by management to make any necessary…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Superior Essays

    Nt1330 Unit 3 Assignment 1

    • 1461 Words
    • 6 Pages

    ABC Company has a few diverse equipment and software needs to meet the prerequisites of their network. We've investigated the different pieces of equipment and software to suit the needs of the company. We've looked into what every building will require with respect to what benefit every site gives and decided their needs based on those results. Servers…

    • 1461 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    They should also disable remote administration and use private browsing when accessing admin interface so the URL is not saved in the browser history to further mitigate the risk of attackers to gaining admin access to the…

    • 693 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Abstract: With a specific end goal to outline and fabricate the secured network system, numerous elements must be thought seriously about, for example, the topology and position of hosts inside of the system, the determination of equipment and programming innovations, what's more, the cautious arrangement of every part. My paper will be an examination of the issues percentage in outlining a safe Local Area Network (LAN) and a best's portion practices proposed by security specialists. I will examine securing a LAN from network's perspective. [1] Introduction: With most complex innovations, there's not one size-fits-all arrangement regarding the matter of network administration. The needs and assets of every one of a kind association will relate…

    • 877 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    This also helps to detect strange traffic running across the servers 3. Secure Workstations: Creating user log in set ups so that only the corresponding person can access the network from a work station help to prevent lower security level personnel from gaining access. 4. Secure the Network: Access level assignments…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Wyoming Medical Center, Los Angeles County, and Raymond James all share similar struggles with how to secure the network, computers and mobile devices. Control and security are a concern from both inside and outside of the facilities and organizations. Each organization deployed a multi-level/tier approach was needed to protect the data. The Novell ZenWorks agents are used to manage the operating systems and software that is installed on the desktops/workstations; it allows the information technology group to customize the software for installation and patch management.…

    • 302 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Managing Threats to Data Common threats to data consist of Botnets, DDoS (Distributed denial of service), Hacking, etc. You can manage and prevent data threats with antivirus/malware/hacking/etc software. By downloading a legitimate program you can protect your computers data. The software will alert you if there is something out of place in your computer before it’s too late, so you can get it removed.…

    • 1963 Words
    • 8 Pages
    Improved Essays
  • Decent Essays

    Most of the organisation has a system that visitors cannot move around the building without an organisation employee to enter them to the building and escort them out. If the visitors in a wrong place of the building they can be identified to the organisation employee so they will escort them out, otherwise without visitors passes they cannot be identified and they might have a wrong reason of being on that building such as stealing equipment or stealing data, corrupting the system. • Sign in/out systems This security measure can be used within the system to secure and keep the data confidential. The organisation employees each one of them who uses a computer system can have a sign in and sign out system, which is User name and password that they need to enter before the system opened and that will prevent anyone from accessing the system without someone else permission .…

    • 806 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    In the profession of IT a key component in your job will be looking after networks keeping them operational (for the users whom use the network), safe (clean out any corrupt files, check security measures, look for a virus. Etc…) and secure (making sure only authorise users are accessing the network). But first what is a network in a general meaning? A network consists of two or more computers that are connected in order to share resources (such as printers), exchange files, or electronically communicate. The computers on a network can be linked through various ways such as cables, telephone lines, radio waves, satellites, or infrared light beams.…

    • 673 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Information security policy is to protect the data and assets. We can apply policies to the users. What to access and what not to access. These security policies can protect the networks, computers, applications of the company.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    During the 1980’s the Internet grew exponentially, one reason included the various technical innovations such as more powerful and affordable computers and hardware that made the Internet more accessible to organizations, educational institutions and individuals. In the last 10 years, there has been a spike in the number of mobile devices and personal computers within a household, which aided with the widespread use of the Internet…

    • 790 Words
    • 4 Pages
    Improved Essays