Tgt2 Apps In Network Security Challenge

1035 words - 5 pages

A. Integrity of Network Security

Introduction

New security policy created for e-mail will ensure e-mails are used for business purpose and limits personal usage of e-mails. Policy also permits Softsearch to monitor employee’s e-mails if required. Controls implemented by e-mail policy will help prevent confidentiality breach. However, e-mail policy does not govern attachments within e-mails. Policy should be enhanced to include e-mail attachment specific statement to prevent employees from opening attachments from unknown source & forwarding such attachments within the company network.

Internet policy prohibits employees from visiting indecent, illegal and pornographic sites, ...view middle of the document...

Risk
No. Vulnerability Threat Risk Likelihood
Probability
1 No Network isolation of development platform Unauthorized Access, Uncontrolled modification of software Partner employee can gain unauthorized access to source code once connected to Softsearch network. Likely
2 Co-hosted Print, File & E-mail servers Unauthorized disclosure, Unauthorized Access Any user/employee with access to print, file or e-mail servers can obtain sensitive information. Certain
3 Shared development platform across offices Unauthorized access, Uncontrolled modification of software Partner employee can access all systems in development and modify software or access other development information. Possible
4 Undocumented Remote connectivity policy Unauthorized disclosure, Unauthorized Access No auditing or control of who can connect to network from where and for how long could result in partner employee getting access to Softsearch network & compromise confidential information. Possible
5 Uncontrolled remote access Unauthorized disclosure, Unauthorized Access Partner employee can connect to Softsearch network remotely without any logging or auditing. Possible

Risk description:

Risk # 1:
Security of Softsearch development platform is critical due to nature of the business. Servers for development are in separate IP address range but not isolated by firewall or other security device. Once partner connectivity is established; partner employees can get access to Softsearch’s all development platforms and may lead to partner employee obtaining unauthorized access to Softsearch’s propriety developed software.

Risk # 2:
Print, fax and e-mail servers are co-hosted on the same physical server. This increase risk of network intrusion due to large number of required open ports and running processes on the same server.

Risk # 3:
Employees can access development platform from both locations. With shared development platform when Softsearch establishes network connectivity to partner, all partner employees will potentially have access to all development platforms. This poses greater risk to Softsearch private data and source code.

Risk # 4:
Softsearch do not have established remote connect policy. Without documented remote connectivity policy, it will be difficult to regulate who can connect to Softsearch network remotely, when remote connectivity is allowed and how to remote connect. Partner employee can gain access to Softsearch network remotely without any logging or auditing.

Risk # 5:
No system/platform exists to securely allow remote connectivity to Softsearch network. Remote connectivity to Softsearch network is not secured. Risk of data leak or unauthorized disclosure increases with unsecured remote...

Other Essays Like Tgt2 Apps in Network Security Challenge

Integrative Network Design Essay

3985 words - 16 pages ability maintain and provide the services needed for each customer. The other technological advances that will be introduced will provide real time network analysis and security monitoring. Once the new network is completed it will bring Kudler Fine Foods to a new standard of service. Current Systems Analysis When evaluating a network topology we must first have an understanding of what a network topology is. In simple terms: Network Topology is

Network 410 Essay

772 words - 4 pages , and data. Email traffic and the campus websites are provided through Google Apps for Education. Student online courses will be provide by Blackboard. Each building in the network processes data through Microsoft Office web browser and share data through the servers located in each building. Voice traffic in the existing network is not transversing the network since it is a PBX based system. 7. Complete this table for all of the applications

Security Policy Framework

1330 words - 6 pages controls, data input controls ensure the accuracy, completeness, and timeliness of data during its conversion from its original source into computer data, or entry into a computer application. Input controls are very important at every step in implementing or designing a network project such as ours. Having controls and frameworks working together helps them be interchangeable, this means we stay within our HIPPA standards and our security

Xbox O vs Ps4 Recommendation Report

1002 words - 5 pages | Exclusive access to network apps | Game Library | Has exclusive games | Has exclusive games | Price Price was the most important criterion to consider in your purchase of a new gaming system. You state in our previous conversation that you want a gaming system that was under $400 and you were willing to go over your budget by $50. PS4: The PS4 is manufactured by Sony Entertainment. The gaming system price starts at $400. This will

Clouds Computing in Education

1783 words - 8 pages Flash on mobile devices • There is no public accessibility layer on Ipad or IPhone or Itouch • Even if there was you can only have one app running at a time. • People really want AT solutions on Phones, Handhelds and Tablets • Accessibility is often not a priority in new platforms, and a new generation of App developer has to learn about accessibility • Focus on Standalone Apps for now … To the Cloud Cloud computing is the delivery of

Mobile Operating Systems

3502 words - 15 pages later was extended to work with other Apple devices like iPod and iPad. It can be dubbed as the “first real smart mobile OS”, and is claimed as “The most advanced mobile operating system in the world”. Basics: iOS is based on a UNIX kernel, same as the one used by Apple’s desktop Operating System, Mac OSX. This Unix kernel provides iOS with best-in-class security from malicious softwares or malicious activities. Although iOS runs on the same

Mobile Optimized Middleware

2765 words - 12 pages systems, and the need to balance data and network access with data and network security. Not surprisingly, the security challenge ranks top of mind for most survey respondents. References [1] Consumers Now More Likely to Buy Androids Than iPhones, http://www.mark etforce.com/2011/02/consumers-now-more-likely-to-buy-androids-than-iphones/, Accessed on February, 2011. [2] Penetration test, http://en.wikipedia.org/wiki/Penetration_test

Blackberry

552 words - 3 pages February 2014. The smartphone ran out of stock in just a week time in India after BlackBerry reduces its price. What could have been done differently? Besides lowering the prices and partnering with the GPS navigation system provider, there are other things that BlackBerry could do to improve its business in India. Firstly, Blackberry should partner with some of India’s local carriers or mobile network providers. As every phone needs a

Security Threats

606 words - 3 pages campuses. I will discuss each of the threats in this report. College students love new technology and each year smaller and more powerful devices are hitting the market. Students on the campus have a variety of devices ranging from cell phones, tablets, and laptops. These devices connect to the campus network and are used by students to check email, class schedules, get grades, and many other uses. The challenge is to allow these devices the necessary

Facebook Pestel

1130 words - 5 pages be listed on the App Center. Consequently, Facebook has more users utilizing its network even if it is just a login feature. This further enables Facebook to collect more data on its users which in turn enables the company to further its core targeted marketing proposition. In addition, Facebook also intends to sell non-platform-specific apps, or HTML5 apps. Facebook is estimated to take 30% fee for app sales. Through App Center, the company

Network Design Project

4945 words - 20 pages Standards Analyze Security of Organization Current Network Infrastructure - Problems Bus network – Lack of communication between stores Network topology – Separate networks No Central Location No Backups No Security Proposed Solution New Network Infrastructure – Solutions VoWLAN topology – Communications Central Server Location -- Secure Backups New in-store Infrastructure Cash registers with new Dell Studio XPS 8100 Network

Related Papers

Wireless Network: Is It Right For You?

358 words - 2 pages How do you choose the right wireless network setup and configure it properly? What are the advantages to having a wireless network over a wired one? Well for one the wired networks have to have a montage of wires all over your office or home. They must all be connected to a central switch called a hub. This often involves stringing cables through walls and ceilings and can present a challenge for anyone.If the computers in your office or home

Apple Market Essay

3347 words - 14 pages advertising or subscriptions. For many companies, this won’t be a priority because they will have to put budget into higher priority areas such as improving the experience on site or in their social network presence. Owing to volume of users reached through these other platforms incremental improvements here are likely to give better returns. But the figures presented above show the potential benefits of apps to marketers in reaching audiences and

Indp Part 3 Essay

907 words - 4 pages antitheft feature that will let you remotely lock your phone if it is lost or stolen, remotely erase sensitive information, block fraudulent websites designed to trick you into revealing personal information, and the Norton Mobile Security automatically scans all apps and app updates you download to your phone for threats. Distinguish between local area networks, wide area networks, and wireless technologies. A Local Area Network (LAN) is a network

Cloud Computing Essay

5991 words - 24 pages increasingly becoming an essential part of human life as the most effective and convenient communication tools not bounded by time and place. Mobile users accumulate rich experience of various services from mobile applications (e.g., iPhone apps, Google apps, etc), which run on the devices and/or on remote servers via wireless networks. The rapid progress of mobile computing becomes a powerful trend in the development of IT technology as well as