1,573
23
Essay, 2 pages (350 words)

Free technology management essay example

Internet security is an important factor that needs to be put into consideration in protecting company information from malicious threats and software. Most computer software threats and malicious programs come from the internet includes information gathering where an organizations network can be discovered profiled the same way other systems have been profiled. After the ports have been identified, a banner will be used in grabbing and enumerating to detect the types of devices hence determine the operating system and application versions.
Sniffing is another threat and it involves acts of monitoring network traffic for data that include plaintext passwords and information on configuration (Roman and Lopez, 2009, p. 247). An attacker uses packet sniffer to read plaintext traffic, crack packets that are encrypted through lightweight hashing of algorithms as well as decipher payload that is considered to be safe.
There are various strategies that can be used to counter threats relates to system networks, for instance, the issue of information gathering will require configuration of the routers which will assist in restricting responses to footprint requests. Strong physical security together with proper network segmentation prevents the problem of sniffing or traffic from being collected at a local level (Supriyanto et al, 2013, p. 65). When dealing with host threats, there are several measures that can be put in place which include ensuring the systems are current with the latest operating system service packs and software patches, ensure all necessary ports are blocked both at the firewall and the host, un used functionalities should be disabled and this will include protocols and services, and ensure weak, default configurations are hardened.
Arbitrary code execution can be prevented by locking down the systems commands and utilities using restricted ACLs and ensuring the entire company systems stay current with updates and patches so that buffers that are newly discovered will be speedily patched.

Reference

Roman, R., & Lopez, J. (2009). Integrating wireless sensor networks and the internet: A security analysis. Internet Research, 19(2), 246-259.
Supriyanto, Hasbullah, I., Murugesan, R., & Ramadass, S. (2013). Survey of internet protocol version 6 link local communication security vulnerability and mitigation methods. IETE Technical Review, 30(1), 64-71.

Thank's for Your Vote!
Free technology management essay example. Page 1
Free technology management essay example. Page 2
Free technology management essay example. Page 3

This work, titled "Free technology management essay example" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Free technology management essay example'. 20 September.

Reference

AssignBuster. (2022, September 20). Free technology management essay example. Retrieved from https://assignbuster.com/free-technology-management-essay-example/

References

AssignBuster. 2022. "Free technology management essay example." September 20, 2022. https://assignbuster.com/free-technology-management-essay-example/.

1. AssignBuster. "Free technology management essay example." September 20, 2022. https://assignbuster.com/free-technology-management-essay-example/.


Bibliography


AssignBuster. "Free technology management essay example." September 20, 2022. https://assignbuster.com/free-technology-management-essay-example/.

Work Cited

"Free technology management essay example." AssignBuster, 20 Sept. 2022, assignbuster.com/free-technology-management-essay-example/.

Get in Touch

Please, let us know if you have any ideas on improving Free technology management essay example, or our service. We will be happy to hear what you think: [email protected]