Saturday, August 10, 2019
Cybersecurity Coursework Example | Topics and Well Written Essays - 1250 words
Cybersecurity - Coursework Example It is important for Jacket-X to implement ways of detecting and securing networks so as to counter cyber threats vulnerabilities such as email spoofing, denial of service attack, malware intrusion, spywares, hackers as well as data and information theft that are implemented through the network (Roberta Bragg, 2004). However there are several methods by which Jacket-X can implement to avert these risks they include the following: first is by Jacket-X ensuring the installation of firewalls. Firewalls comprises of hardware and software that controls the flow of data in and out of network. By using firewalls Jacket-X can be able to examine and validate address information on all packets of data as well as protect data stored in the network from unauthorized access (Roberta Bragg, 2004). It is therefore recommended for Jacket-X to put in place procedures and policies to allow for the periodical evaluation of firewalls and upgrades that involves the incorporation of current technologies to meet critical network risks. In the case of Jacket-Xââ¬â¢s wireless network, it would be advisable to enable WPA (Wi-Fi Protected Access) encryption to facilitate the protection of data that is transmitted over a wireless network. WPA is considered more secure that WEP (Wireless Equivalent Privacy) because it utilizes dynamic key encryption. Also in order for Jacket-X to gain control of their network from unauthorized access would involve the use of MAC address filtering. This technique is made possible by some routers to specify which computers can access the network (Roberta Bragg, 2004). This is facilitated by using a MAC address that comprises of unique series of numbers and letters assigned to every networking device. This would prevent unauthorized access such as hackers from intruding the Jacket-X network. Another vulnerability posed by networks is the fast
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.