Security Software Proposal Essay

Great Essays
Proposal for Security Software
Name: Jamonte Reed
Institution: University of Maryland University College

Proposal for Security Software Owing to the cybercrimes threats attempted on Advanced Research Company, it is recommended that the executive should make plans to acquire security software that will protect confidential corporate data from external access. Past events have demonstrated that companies are not secure from cyber attacks owing to the ones that the company has experienced and the recent one that involved a major competitor. In this study, attention is accorded to a description of the recommended security software and its benefits to the company.
Description of the Security Software PureVPN is the recommended security
…show more content…
The foregoing means that the software prevents hackers and crackers from accessing password prompts from the company. Such a condition means that it will be difficult for them to access any leads that might result to corruption of data. In addition, the PureVPN protects the firewall that protects the company’s network from malicious access and programs. Notably, rival companies might hire hackers to direct malicious programs to the Advanced Research Company’s network in order to corrupt the data held there within (Pure VPN Review, n.d). However, with the presence of this software, malicious programs will be detected and eliminated before doing any harm to the data. The current system is not secure, as technological advancement has led to production of malicious programs, which overpower the firewall’s …show more content…
PureVPN is powerful software with customized features, which close other operations during the test process. For example, the company will be forced to switch off its network in order for the software to detect the presence of external access. Evidently, this will bring the business to a standstill as most of the information is stored and accessed over the network. The consequences of the security test are felt by the entire company, including the workers who were involved in research activities. Such workers must run their variables in the computers, which are all interconnected with the same server. The unavailability of the server translates to work stoppage at the various stations at the company. However, it is better to run the software and quit operation for a few hours than ignore it and suffer data and profit

Related Documents

  • Improved Essays

    Reconnaissance involves gathering information of a target without any prior knowledge about the company relating to or an individual. It includes both Passive and Active Reconnaissance. This steps helps to discover useful data which can assist them to plan the attack. Scanning is the phase which takes place exactly after the attacker is able to collect enough information to understand the business works and those data which are valuable. Hackers uses this collecteddata to find a way which will help them executing an attack on the Operating System, Installed Software, Open Ports, IP Addresses or user accounts.…

    • 1032 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Essay On Cybersecurity

    • 1115 Words
    • 5 Pages

    “Anything that can connect to the Internet can be vulnerable to certain exploits, and that could end up helping someone get into a network or system and cause much data loss, as well as disruption of services that are provided by the group being affected the by ‘hacker’ (Cormier)”. Cybersecurity is used to stop the hackers, but it does not work all the time. “Thieves using computers can rob banks and steal corporate trade secrets from the other side of the world (Flamini 157).” They can take down government and business websites within minutes (Flamini 157). Cyberwarfare is becoming huge because the technology…

    • 1115 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    and how to protect from it ?. More susceptible to this malware who browser suspicious sites which mean some sites are already get hacked from hackers and the hackers have hidden ransomware. To be more safe , users and employments should not visit a susceptible sites and if they need to visit make sure that browser is updated and do not download any execution file. As I mentioned the common attack method of ransomware. So we can always have seen that attack come in after the victim accept which mean the attacker convince the victim to open the link or the execution file.…

    • 1452 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Think like a Hacker, Defend like a Professional The theme of this article might sounds confusing due to the fact that most people will interpret the word “hacker” as a term used to refer to the malicious guys who always find ways to steal user information and financial details. We are not trying to give you any bad intentions about the actual meaning of “hacker” whatsoever. The original meaning is neutral and does not identify anyone as a bad person. Literally, any technology enthusiasts who enjoy analyzing technology and tricking the process to perform functions that is different from the original function can be referred to as a hacker. Of course, their goals might be different, which is the reason why hackers are categorized into three…

    • 803 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    However, mere detection does not provide the comprehensive analysis of the threats. Additional information such the origin and the intention of the threat are equally important. Moreover, a bigger attack could be preceded by small sniffing attacks to gauge the weakness in the security. Effective monitoring tools should be capable of detecting these forms of attacks, analyzing their intent and determine the scope of damage that could be caused in case of a security breach. Attacks such as DDoS (Distributed Denial of Service) target servers by sending large numbers of connection requests within a short span of time, which renders the server unresponsive.…

    • 810 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Hardware thieving defines stealing the computer hardware vandalism is when the computer equipment is being wrecked. To lower your chances of that happening you may want to put the hardware in a secure place, lock it up and protect your devices. Who are mainly at risk in this area, are organizations that house several computers, and people with mobile devices the size that makes it particularly simple to rob. Thieves usually shoot for notebooks of company executives, as they can get into confidential company information. So with that being said software or identity theft, can be connected with hardware theft.…

    • 2603 Words
    • 11 Pages
    Great Essays
  • Improved Essays

    Appropriate firewalls need to be installed in order to stop hackers from entering your data systems. firewalls need to be upgraded quite often, since hackers will find out new ways to get through security barriers. Privacy issues are also another acute issue when dealing with company data, and it does not just pertain to information of patients, it can also include information of its employees. Misuse of company data by its employees can also become a type of breach of data. no matter what ype of data breach is involved with a company's data it is the ethical and legal responsibility of each company to implement a sound deterent by either having the best anti breach threat from a particular software or IT support to keep risks to a minimum.…

    • 477 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Without it, how else will an organization know what their weaknesses are and what they can do to improve their defenses? As mentioned previously, Deerman (2012) found that there are three main phases of the malware lifecycle. Through the good intentions of implementing white hat hacking, an organization will be able to clearly see the vulnerabilities in their system and where attackers will most likely hit first. Understanding the offensive and defensive perspectives of the malware lifecycle will equip the organization with the adequate skills and tools to disable the first phase from developing so the malware never reaches the second or third phases. The best method of security is to always take preventative…

    • 1603 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    With the FBI being professional, Apple could develop a technique that could be shared to enhance personal security while balancing private security. If those that are serving our country isn’t allowed to fully operate, unnecessary conflict will occur which will not only affect the U.S but become a worldwide problem. Terrorist are viewed as people that have given up their rights, therefore obtaining their information shouldn’t be questioned unless the company supports…

    • 1810 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Cyber Security Failure

    • 802 Words
    • 4 Pages

    The purpose behind the policy brief is to inform the Department Heads and all City branch department of the Federal Bureau of Investigation on the rising cyber security breaches due to the fact of human error. This brief will outline the major instances and reason behind a successful cyber security attack. The Failure of Cyber Security Systems Humans Executive Summery Without human’s computer viruses and cybersecurity systems would be stuck in a stand still because they are built to combat perfectly. It is human error that makes helps hackers and cyber-attackers get what they want. “Only amateurs attack machines, professionals target people” (Gallagher) Introduction With cyberwarfare becoming a huge part of how nations and terror groups are…

    • 802 Words
    • 4 Pages
    Improved Essays