StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

An IT security consultant - Essay Example

Cite this document
Summary
An IT Security Consultant Name: Institution: An IT Security Consultant A vulnerability could be a flaw, error or weakness in an Information Technology (IT) system which an attacker may exploit and alter the system’s normal behavior (Christey 2007). Vulnerabilities offer the attackers possible entry points into an organization’s system…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.1% of users find it useful
An IT security consultant
Read Text Preview

Extract of sample "An IT security consultant"

Download file to see previous pages

This paper will explain four methodologies and how they can be used to protect an organization’s system from being vulnerable. Firewall A firewall is the first in line of a network’s defense mechanisms, which can either be a software application or hardware device. It keeps unauthorized people from accessing the organization’s network by blocking selected outbound or inbound traffic (Vacca 2009). Depending on the implemented type, the firewall allows the network administrator to determine the traffic to be let out or in of the network, and also restricted to specific domain names or IP addresses.

There are four firewall mechanisms including application gateway, proxy server, circuit level gateway and packet filtering gateway. With the packet filter, traffic flow into or out of the network is intercepted and evaluated against the rules given by the administrator. Filtering is based on the criteria that the packet filter is able to access the destination and source ports, as well as their IP addresses (Christey 2007). The circuit level gateway bars all inward traffic to any other host, with the exclusion of itself.

The client machines within the organization and the circuit level gateway establish connectivity via software run on the clients’ machines. . The application gateway is a type of proxy server. After internal clients connect to it, it determines whether or not to establish the connection, then connects to the destination machine. All communications are routed from the client to the application gateway, then application gateway to destination machine. Since the gateway is the address viewed by the outside world, the internal network is kept safe.

Encryption Encryption is the process of converting information in a way that cannot be understood by unauthorized people (Ardi, Byers & Shahmehri 2006). The information is converted into an unreadable form called ciphertext, and decryption is required to convert it back into its initial for by the recipient. During encryption, the information is encoded into ciphertext using encryption algorithms. An encryption key determines the way the information is encoded. Encryption schemes require algorithms for key-generation in order to produce keys randomly.

By use of a decryption algorithm that needs the correct secret decryption key, the authorized party can decode the ciphertext. Key algorithms undo the encryption algorithms’ work. Encryption protects data both in transit and at rest (Zittrain 2008). Data in transit comprises that being transferred across networks like mobile phones or the internet. Data at rest includes files stored on storage devices and computers. Encryption makes it difficult to intercept data on transit, while securing that which cannot be physically kept from being accessed by unauthorized persons.

In the case of data at rest, it remains safe in incidents of laptop and back up devices theft. The safest practice is to apply encryption at the time of

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“An IT security consultant Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
An IT security consultant Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/business/1470542-an-it-security-consultant
(An IT Security Consultant Essay Example | Topics and Well Written Essays - 750 Words)
An IT Security Consultant Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/business/1470542-an-it-security-consultant.
“An IT Security Consultant Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/business/1470542-an-it-security-consultant.
  • Cited: 0 times

CHECK THESE SAMPLES OF An IT security consultant

Management Consulting Firms

The paper "Management Consulting Firms" discusses that the need for consultants with specialized skills, expertise would never seize although a more value-based approach should be provided with a focus on understanding needs of the client, the context they work in and measurable deliverables.... nbsp;… The main goal of consultancies is to enhance the performance of the client organization and increase revenues by adopting new or best practices....
8 Pages (2000 words) Research Paper

Role of Management Consulting in the Financial World

According to Fritz Steele, Management Consulting is, "any form of providing help on the content, process or structure of a task or series of tasks, where the consultant is not actually responsible for doing the task itself but is helping those who are.... According to Peter Drucker, "what is unique to management is that from the very beginning the consultant played a key role in the development of the practice, the knowledge and the profession of management....
19 Pages (4750 words) Coursework

Assessment Action Plan of Software Upgrade Project

The author of the following case study under the title "Assessment Action Plan of Software Upgrade Project" aims to choose the most suitable consultant to take end to end accountability of the Software Upgradation project of Boardman Management Group.... The selected consultant is expected to have a soundtrack record, an experienced implementation & customization team, and a sound Project Management methodology.... The project management team of the consultant is expected to have adequate experience in bringing to table these finer details to enable the internal project committee to verify the acceptance by going back to the business requirement specifications and analyze the impacts on the business of the infeasibility of certain requirements which cannot be met by the consultants....
6 Pages (1500 words) Case Study

Million Dollar Consulting by Alan Weiss

In the paper “Million Dollar Consulting by Alan Weiss” the author provides a deep and comprehensive analysis of consulting practices and gives practical advice to everyone involved in this sphere.... Modern consultancies are supporters of change, who must adapt their service.... hellip; The author states that hiring qualified personnel, subcontracting to other firms, and supporting R&D networks with peer firms and research institutions seem to be of prime importance here....
3 Pages (750 words) Article

Security consultant

Also, it is from this risk assessment that compliancy with new it security laws and regulations can be achieved to avoid legal issues.... A secured company network is that which has instituted a set of procedures to… Risk assessment is a proactive network security measure that serves to identify risks, threats, and vulnerabilities that could endanger the Network Risk Assessment Describe the purpose of a risk assessment, risk scope and identify critical areas for an assessment....
2 Pages (500 words) Essay

Business Plan Project for a Security Guard Company SecureIT

The study describes the business plan project for a security guard company SecureIT.... hellip; The company aimed at providing quality security services that will cover the provision of guards to different premises, conducting private investigations and the provision of consultancy services to the customers.... Its marketing strategy focuses on the provision of a website for communication and a high tech system that provides support for gaining the necessary intelligence for security purposes....
9 Pages (2250 words) Case Study

Healthcare Consultancy at Career Consultants Incorporated

This paper "Healthcare Consultancy at Career Consultants Incorporated" answers the question: what sort of education is needed by the healthcare consultant?... In order to keep the designation intact, healthcare consultant re-validates the certificate after every three years.... After a thorough exercise, the consultant pinpoints the grey areas and suggests remedial measures to the management for improvement.... The health care institution hires qualified consultants either on a full-time basis or a part-time basis as the case may be to seek their assistance to address the problematic areas to improve organizational efficiency and to re-organize existing structure in the light of the consultant's recommendations....
9 Pages (2250 words) Assignment

The Role of a Security Consultant in the Architecture Design Process

… The paper "The Role of a security consultant in the Architecture Design Process' is an outstanding example of a capstone project on architecture.... The paper "The Role of a security consultant in the Architecture Design Process' is an outstanding example of a capstone project on architecture.... This calls for the participation of a security consultant.... The study empirically explored the roles of security professionals in the architecture design process....
25 Pages (6250 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us