Write on Web and Data Security Plan

Requirement

Question: Write on Web and data security.

Solution

Introduction

Information management is a crucial part of Information Technology Administration, which is a foundation in corporate governance. Information Security is an essential part of IT administration, especially related to personal information. Though, lots of organizations don’t have a strong strategy for ISM.
Data protection is important for all small businesses all the information’s like client information, customer information, personal files. payment information, bank account details - this information is often impossible to recover when lost in the hands of criminals and this can be dangerous. Due to the disasters like floods or fire, the data has gone bad, but losing it from hackers or malware infections can have many more consequences. The way you handle and secure your data is between the security of your business and the privacy expectations of employees, customers, and partners. (Andress, 2014)
For the better security of data and information against threats and vulnerabilities, we will implement Web and Data security plan.

Writing Assignment and completing it on time is not an easy job. If you forget to write your assignment you can take urgent essay help from Allassignmenthelp.com. We are a team of professional assignment writers who are talented enough to deliver a plagiarism-free assignment within the given frame. On our website, the students can get information technology assignment help at a very affordable price.

Recommendation 

For the better security of data and information against threats and vulnerabilities, we will implement Web and Data security plan. It is not required for every employee to access all the information of an organization. Not every employee needs access to all your information. Your marketing staff is not required to see employee salary data, or they should not be allowed, similarly, your administrative staff may not require accessing customer information.

Security Layers: 

Following are the network devices that we can use the topology:

  • NIC (Network Interface Card):  For a computer to connect to the network, NIC is required which is on circuit board or in the form of a card.  This allows the computer to get full-time access to the internet. It is present on every computer, laptop or a server which is based on the LAN technologies. (Hooda & Singh, 2013)

  • Bridge: A bridge is a kind of network that used to provide the interconnection with other network bridge where the same protocol is used.

  • Switch: A switch is a device which is used to connect various devices to the same network with the help of LAN. 

  • Router: A router is a device that sends the data packet from one logical network segment to another. The router forwards the packet based on its destination address. 

Thinking about all the above network setups and network gadgets, we can interface all clients to organization resources (like printers, scanners, and different things), give the option of file sharing, deal with these assets in a core location. (Tennenhouse & Wetherall, 2002) 

IP Address

Internet Protocol (IP) is a digital protocol (or communication protocol) that uses the Internet Protocol Suite (often referred to as TCP / IP) to exchange messages between computers in the same network or in a series of other exchanges rules and regulations. Messages are converted into datagram form, which is also known as data packets or just packets. (Scholz, Evans, Flores, & Rahman, 2001)
IP addresses are divided into different classes:
Class A IP addresses are used in the case where there is a requirement for large networks, such as Internet Service Providers (ISPs).
Class B IP addresses are used in the case where the enterprises and organizations require the medium and large-scale networks. They used to support up to 16,000 individual networks and 65,000 hosts.
Cass C is the most common form of IP Addresses and mainly used home or small business. It used to support up to 256 Host. 
Class D and E addresses are utilized at least rate. Class D has been reserved for not being broadly utilized, and at one-time numerous clients are particularly reserved for special cases for administrations and applications to stream sound and video. Class E addresses are mainly reserved for research for programmers on the internet who are responsible for research on IP address and networking, also for development and management.
In our case, we will use Class C IP Address as it is good for small firms. 
There is various type of IP addresses like: 

  • Static IP: In Static IP address, a system will connect with same IP address all the time. 

  • Here are some of the advantages of Static IP: 

  • Stability- In the case of certified services, such as applications on the Web server and download the file, the connection must be stable. A small interruption in connection to static IP generally does not eliminate packet exchange through the service.

  • Hosting: As in static IP address, the IP does not change, so it can be used for VOIP or Voice Over Internet Protocol, can be used in live games and VPNs. 

Dynamic Host Configuration Protocol (DHCP) is a network management protocol that provides an IP address dynamically to a new node to enter the network. DHCP automatically permits a node to configure, by which the network administrator needs to avoid participation.
It is possible to mix up the DHCP and Static IP addressing scheme. 
Which one is better? Well, I will prefer DHCP if you want a network supporting true plug and play. 

Intrusion Detection System

IDS is used perform network monitoring operations and detect issues and suspicious activities. The system automatically detects intrusions and block the IP transfer during malicious activities. (NIST – Guide to Intrusion Detection and Prevention Systems (IDPS), n.d.) There is a different type of intrusion detection system like: 

  • NIDS: Network Intrusion Detection System is installed within the network from where it can detect incoming and outgoing traffic. 

  • HIDS: Host Intrusion Detection System is present in all the system and it has access to both intranet (Internal) and internet.

We will recommend using HIDS over NIDS because HIDS can also detect network packets that are uncontrolled within the organization’s network as well as those packets which NIDS failed to detect. In case the host is infected with virus and malware and is spreading the same to other computers, HIDS will detect it. 

Web/Vulnerabilities Scanner

A vulnerability scan detects and categorizes system vulnerabilities in computer, network and communications devices and estimates the effectiveness of counter masters and is an inspection of scanning potential points on the computer or the network to detect vulnerabilities. (Makino & Klyuev, 2015)
There are two types of vulnerabilities scanning: 

  • 1. Authenticated Scanning: In this tester used to logging as a user on the network and will list down all the vulnerabilities and intruder connected to the network. 

  • 2. Unauthenticated Scanning: In this tester will perform some test like intruder detection without any reliable access to the network. In such a scan, there is a vulnerability that can be accessed without logging into the network. 

I will prefer Authenticated Scanning because they are allowed to go deeper into the network and use privileged credentials to detect the risk of malware, weak passwords, configuration problems and installed applications.

Network Firewall Devices

A firewall is a framework intended to keep unapproved access to or from a private network. You can either apply firewalls to equipment or programming frames, or a mix of both. Firewalls keep unapproved Internet clients from getting to the Internet associated with the Internet, particularly intranet. (Canavan) Firewalls are of three types: 

  • 1. Proxys

  • 2. Stateful Inspection

  • 3.Packet Filters

However, these three categories are not exclusive because most modern firewalls have such capabilities that they can keep in more than one capabilities of these three. 
There are also Network layer firewalls and Application layer firewalls but amongst them, the latest is Unified threat management. 
Although UTM is easy to install and very convenient for use, and these are two important advantages of UTMs and, human intervention required to install and configure those devices is very low. But I will not prefer it because it is not meant for small organizations. 
I will prefer Proxy Firewall because they offer more protection than application and network layer firewalls, however at the cost of speed and usefulness, since they can restrict which application supports the network. 

Conclusion 

Computer security efforts to ensure the privacy, integrity, and availability of computing systems and their components. Three main components of the computing system are under attack: hardware, software, and data. These three, and communication between them, are susceptible to computer security vulnerabilities. In return, those people and systems that are interested in compromising a system can plan for those attacks that exploit weaknesses. 
The increasing demand for cyber hazards, such as data stealing, phishing scams, and other cyber vulnerabilities, users should be cautious about data protection. It is necessary to understand the different types of risks and weaknesses in the internet world. For every user, it is important to think before connecting with someone using the online medium. 
I assure you that above-discussed implementation of web security will definitely help in protecting the useful information and data of the company. 

Place Order For A Top Grade Assignment Now

We have some amazing discount offers running for the students

Place Your Order

Bibliography

  • Andress, J. (2014). What is Information Security? Retrieved 2 22, 2018, from https://sciencedirect.com/science/article/pii/b9781597496537000013

  • Canavan, J. E. (n.d.). Fundamentals of Network Security. Artech House. Retrieved 2 22, 2018

  • Hooda, D., & Singh, P. (2013). A New Approach to Design Programmable Secure Network Interface Card. International Journal of Computer Applications, 62(8), 33-36. Retrieved 2 22, 2018, from http://research.ijcaonline.org/volume62/number20/pxc3885051.pdf

  • Makino, Y., & Klyuev, V. (2015). Evaluation of web vulnerability scanners. Retrieved 2 22, 2018, from http://ieeexplore.ieee.org/document/7340766

  • NIST – Guide to Intrusion Detection and Prevention Systems (IDPS). (n.d.). Retrieved 2 22, 2018, from http://csrc.nist.gov/publications/nistpubs/800-94/SP800-94.pdf

  • Scholz, G. R., Evans, C., Flores, J., & Rahman, M. (2001). Internet protocol version 6 (student paper). Journal of Computing Sciences in Colleges, 16(3), 197-204. Retrieved 2 22, 2018, from http://dl.acm.org/citation.cfm?id=374779

  • Tennenhouse, D. L., & Wetherall, D. (2002). Towards an active network architecture. Retrieved 2 22, 2018, from http://dblp.uni-trier.de/db/conf/dance/dance2002.html

Get Quality Assignment Without Paying Upfront

Hire World's #1 Assignment Help Company

Place Your Order