1,127
28
Essay, 2 pages (400 words)

With use wep to encrypt data, and should

With the given prompt, it had to be determined how best to handle network security for an online streaming media company. As a company that relies heavily on third party vendors, it’s important to focus on the security risks of transferring data outside the company’s firewalls. This includes the security risks of using email and FTP; similarly, the security precautions for networks inside the workplace environment should also be considered. Email is one of the most commonly used methods in a business environment for data transfer.

Unfortunately, email poses a lot of threats to a company’s safety. Messages containing critical company information can not only be sent to an unknown external party but can also hold a multitude of viruses. It can be quite simple to gain confidential data of an employee from email, such as their username and password. A solution could be finding a way to identify the source of the sender. A good example of this is using an encryption program such as Pretty Good Privacy, or PGP. In addition to an encryption program, sending out the company’s security guidelines to the employees should also be considered. FTP is similar in that it is a risk to company data.

FTP is not encrypted, and therefore it is not an ideal choice. MFT is a much better option, as it encrypts files and alerts the sender if a problem arises in the file transfer. Understanding the risks of certain network environments inside the workplace can be beneficial to the company’s health as well. VPN networks are considered to be the equivalent as bringing your own laptop to work. It helps in regards to keeping secure from an untrusted network, but not from an untrusted device. There is nothing that can stop malware located on the untrusted device from extracting access credentials or copying critical work files. Using company regulated devices can assure that the company’s data can remain secure.

In general, networks are susceptible to many issues. One of the issues arises from the firewall itself. In many instances the firewall is not properly set up, which results in creating an entrance for many security risks. Another risk to consider is using little, or no wireless encryption. Many companies still use WEP to encrypt data, and should consider the benefits of using WPA. The company needs to primarily focus it’s efforts on managing the threats the third party vendors pose. Knowing the vendor’s and the company’s security risks could prevent the scenario in which the prompt addresses.

Thank's for Your Vote!
With use wep to encrypt data, and should. Page 1
With use wep to encrypt data, and should. Page 2
With use wep to encrypt data, and should. Page 3

This work, titled "With use wep to encrypt data, and should" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2021) 'With use wep to encrypt data, and should'. 28 December.

Reference

AssignBuster. (2021, December 28). With use wep to encrypt data, and should. Retrieved from https://assignbuster.com/with-use-wep-to-encrypt-data-and-should/

References

AssignBuster. 2021. "With use wep to encrypt data, and should." December 28, 2021. https://assignbuster.com/with-use-wep-to-encrypt-data-and-should/.

1. AssignBuster. "With use wep to encrypt data, and should." December 28, 2021. https://assignbuster.com/with-use-wep-to-encrypt-data-and-should/.


Bibliography


AssignBuster. "With use wep to encrypt data, and should." December 28, 2021. https://assignbuster.com/with-use-wep-to-encrypt-data-and-should/.

Work Cited

"With use wep to encrypt data, and should." AssignBuster, 28 Dec. 2021, assignbuster.com/with-use-wep-to-encrypt-data-and-should/.

Get in Touch

Please, let us know if you have any ideas on improving With use wep to encrypt data, and should, or our service. We will be happy to hear what you think: [email protected]