Internet security is an important factor that needs to be put into consideration in protecting company information from malicious threats and software. Most computer software threats and malicious programs come from the internet includes information gathering where an organizations network can be discovered profiled the same way other systems have been profiled. After the ports have been identified, a banner will be used in grabbing and enumerating to detect the types of devices hence determine the operating system and application versions.
Sniffing is another threat and it involves acts of monitoring network traffic for data that include plaintext passwords and information on configuration (Roman and Lopez, 2009, p. 247). An attacker uses packet sniffer to read plaintext traffic, crack packets that are encrypted through lightweight hashing of algorithms as well as decipher payload that is considered to be safe.
There are various strategies that can be used to counter threats relates to system networks, for instance, the issue of information gathering will require configuration of the routers which will assist in restricting responses to footprint requests. Strong physical security together with proper network segmentation prevents the problem of sniffing or traffic from being collected at a local level (Supriyanto et al, 2013, p. 65). When dealing with host threats, there are several measures that can be put in place which include ensuring the systems are current with the latest operating system service packs and software patches, ensure all necessary ports are blocked both at the firewall and the host, un used functionalities should be disabled and this will include protocols and services, and ensure weak, default configurations are hardened.
Arbitrary code execution can be prevented by locking down the systems commands and utilities using restricted ACLs and ensuring the entire company systems stay current with updates and patches so that buffers that are newly discovered will be speedily patched.
Roman, R., & Lopez, J. (2009). Integrating wireless sensor networks and the internet: A security analysis. Internet Research, 19(2), 246-259.
Supriyanto, Hasbullah, I., Murugesan, R., & Ramadass, S. (2013). Survey of internet protocol version 6 link local communication security vulnerability and mitigation methods. IETE Technical Review, 30(1), 64-71.
The paper "Free technology management essay example" was contributed to our database by a real student. You can use this work as a reference for your own writing or as a starting point for your research. You must properly cite any portion of this sample before using it.
If this work is your intellectual property and you no longer would like it to appear in our database, please request its deletion.Ask for Removal
Create a Citation on Essay
PaperPrompt. (2021) 'Free technology management essay example'. 28 November.
PaperPrompt. (2021, November 28). Free technology management essay example. Retrieved from https://paperprompt.com/free-technology-management-essay-example/
PaperPrompt. 2021. "Free technology management essay example." November 28, 2021. https://paperprompt.com/free-technology-management-essay-example/.
1. PaperPrompt. "Free technology management essay example." November 28, 2021. https://paperprompt.com/free-technology-management-essay-example/.
PaperPrompt. "Free technology management essay example." November 28, 2021. https://paperprompt.com/free-technology-management-essay-example/.
"Free technology management essay example." PaperPrompt, 28 Nov. 2021, paperprompt.com/free-technology-management-essay-example/.
Get in Touch with Us
Do you have more ideas on how to improve Free technology management essay example? Please share them with us by writing at the [email protected]