Security being a top concern for any organisation, choosing the correct security solutions is of utmost importance. Consider an area of information technology (IT) security, such as, network security, e-mail security, database security and so on. Identify and research three different commercial IT security solutions/products for the chosen security area. The three products must target the same security issues. [Note: Instead of IT security specific products such as antivirus software etc. you may also choose to research the security features of products such as database management systems, operating systems and so on.]
Prepare a report providing categorical feature comparison for the three products in the chosen category and make recommendations about the products to assist purchasing decision.
Your report may include the following sections:
Length of the report:1500~2000 words, excluding references and appendices.
This assessment item is aligned with the following learning outcome of the subject:
Depending on the IT security area chosen, the assessment item also relates to one or more of the following learning outcomes of the subject:
IT security is must for every organization as it secures the organization network and data from attack, hacking, steal etc. There are different areas of IT security such as e-mail security, network security, database security etc
Here our area of focus is on network security. Network infrastructure systems security is a key to many organizations, as the attacks are increasing day by day, there are many areas which need to be focused upon and need proper adherence towards the system maintenance. [Albright 2002]
Attacks happens on different parameters in different organizations, if these attacks are not prevented it will be penetrated inside the organization and can have a big impact on the overall systems:
Emails are daily send by the employees working in an organization, it can be either work related, social or nonsocial. Some employees are sending emails which they are not authorized to send to the outside entities and it will release the information into the wrong hands. If such email etiquettes are not followed and these are not implemented in the organization certain rules and standards are not laid out, then there would be an issue with the network security and it is not implemented in a way it should be. It will harm organizations in long run when components of the particular object are sent out by unauthenticated information and its impact will be certainly over the time. (Miles, 2007)
Attackers can usually attack a system through a medium where they can spread virus or Trojans into the system, by doing this they actually starting the data retrieval process from the intended systems without its users actual will. The data retrieved is basically gathered out intentionally, and it would be having a bad impact over the organizations network. This type of acts should be protected and it can only be possible to protect them if proper network infrastructure is present. (Miles, 2007)
Worms increase over the internet which even slow down system, it start sending the files present on your computer to another computers over the internet, and then start creating a permanent network connection with the system, after uploading the files to the server, then hackers can come and use those for their unauthenticated use.
There should be always proper systems laid down by employees over the organization to protect employee’s personal interest for information’s, they are working for the organization, network administrators should have responsibility to handle the unauthenticated websites used by employees and block them. Access to websites such as proxy websites, mails, chats which are unauthenticated should not be given to employees, as it would need to be prevented and protected from any unauthorized access. (Miles, 2007)
Activities take place inside and organization which are unauthenticated and unauthorized, these entries are usually take place in the midst of enviroments which are created by employees who want to create a bad impact of the organization or use its important information. There should be an immediate incident response in such case and it should be avoided from getting it happened.
The three products that protect the network system from security issues are listed below:
Nowadays, anti-virus software is installed on every system that protects the system from getting new or old viruses, worms, and Trojans. Antivirus program that is installed is configure to scan e-mail and files as they are downloaded from the Internet. Many Information technology organizations like Symantec, McAfee and Sophos have released their anti-virus software in order to prevent or block spyware. The company called Grisoft also released their own anti-virus software with the name of AVG Anti-Virus. Free version of AVG antivirus is also available for private and noncommercial users. The different way of preventing Trojan is never open any e-mails or download any attachments from unknown senders.
Firewall is a program written for the computer systems, these can be present on the system either in software or hardware mode, there are accelerated firewalls which are very powerful in preventing the system from getting impact, and it should be executed in a well appropriated manner. There are software or hardware firewalls, the hardware firewall provides a better level of security to the software systems and these are more active than software firewalls.
Operating system up-to-date
Latest available operating system has in-built features to secure the operating system from threats. Companies that develop operating system software such as Microsoft will produce new versions every few years. The main of producing new versions of operating system every few years is to install latest technical features as they provide latest security protection to their users. Benefits from modern operating system apart from security are listed below:
Product comparisons in term of their advantages
Advantages of Antivirus program
Advantages of Firewall program
Advantages of operating system up-to date
Conclusions and recommendations for network system security
Albright, J. G. (2002, March 25). The Basics of an IT Security Policy. Global Information Assurance Certification. Retrieved May 15, 2013, from www.giac.org/paper/gsec/1863/basics-security-policy/103278
Miles Tracy, 2007, Guidelines on Electronic Mail Security
Nortan. (2007), Keeping OS and Antivirus Software up to Date, com/security-resource-center/os-antivirus-software-up-to-date.html”>http://www.nortonantiviruscenter.com/security-resource-center/os-antivirus-software-up-to-date.html
Pinktec Computer Services. (2011), Firewalls Advantages and Disadvantages,http://kimberleytaylor.com/articles/firewalls_advantages.htm
What We Offer:
• On-time delivery guarantee
• PhD-level professionals
• Automatic plagiarism check
• 100% money-back guarantee
• 100% Privacy and Confidentiality
• High Quality custom-written papers
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more