StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Security for the Athletes Shack - Essay Example

Cite this document
Summary
From the paper "Network Security for the Athletes Shack " it is clear that generally, TAS can make use of the latest technology such as cloud computing as backup support. It will improve the speed, quantity, and quality of resources available to TAS…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful
Network Security for the Athletes Shack
Read Text Preview

Extract of sample "Network Security for the Athletes Shack"

?NETWORK SECURITY Network Security Affiliation Table of Contents Table of Contents 2 Type of Network Security 3 User and Password Based Access: 4 Firewalls 4 Antivirus Software 5 Data Backups 5 Network Security Devices 5 Security Cameras 5 DVDs/Tapes 6 Hardware Discussed 6 Printers and Scanners 6 Switch 6 Computer Server 6 Personal Computers 7 Recommendations 7 Staff Training 7 Update Passwords 7 Update Antivirus Regularly 7 Cloud-based Backup 8 References 9 Executive Summary In the past few years network security has turned out to be a serious challenge for the business organizations that heavily rely on business data and information. The basic purpose of implementing a computer network is to allow a number of staff members to enter and update data simultaneously. This paper presents an analysis of a network security for the Athlete’s Shack (TAS), which runs its business through a chain of sporting goods’ stores. This firm is emerging as a huge business set-up with a head office located in New York. In the past few years, TAS has got massive popularity and now it has 10 stores in the area. The staff of TAS comprises more than 500 people. In order to connect its different stores the business has implemented a wide area network (WAN). However, the internal activities are performed by using local area network (LAN), which is established by using cables and other hardware devices. The implementation of this network has brought a number of advantages and improvements to business, however; in order to run its business operations effectively the firm has implemented an effective security mechanism. The firm has mixed a wide variety of security techniques to improve its network security. In this scenario, the business uses different security techniques to ensure the maximum security of its network. This paper discusses some of the important aspects associated with its network security. Type of Network Security Network security consists of a wide variety of rules, regulations and measures that an organization must follow with the intention of protecting its computer network and related resources. Without a doubt, in the past few years network security has turned into a main concern for each business in which computers are utilized to process data to a great extent. In addition, the absence of a network security can create many security challenges for a firm for instance a competitor or a hacker can gain access to private or vital information, which can destroy the entire business or personal information related to a specific system or data loss. In this scenario, an organization can implement effective network security when its employees and staff members have knowledge of network security. In simple words, in an attempt to ensure effective network security system users must follow organization’s security guidelines (Kaminsky, 2012; Ray, 2004; Laudon & Laudon, 1999). Athlete’s Shack (TAS) makes use of a wide variety of security techniques to ensure the security of its network and business data. Some of the important techniques are outlined below: Username and Password Based Access: Each employee is provided with a username and a password which they use in order to access and use the system. For this purpose, they have an IT Centre, which is responsible for determining the access type for the organization’s employees. Firewalls A firewall can be implemented in both hardware and software format as they are designed to stop illegal access to or from a private network. In addition, firewalls stop illegal Internet users from accessing private networks connected to the Internet, in particular intranets (Indiana University, 2012; Rouse, 2007). Since the different stores of the Athlete’s Shack (TAS) are connected using the Internet so they have implemented firewalls to secure their computers and network. Antivirus Software An anti-virus program stops viruses from entering into the computer network. In this scenario, TAS is using the latest version of Avira Antivirus1 that is very effective in dealing with different kinds of computer viruses. Data Backups As the business of TAS greatly depends on data so they regularly take backups of their data and store them in DVDs so that in case of any failure they could use that data. The firm has established an IT Centre which is responsible for carrying out this kind of tasks. Network Security Devices TAS has implemented both the hardware and software security firewalls to ensure the security of its network. It is some kind of filtering device that is used to filter the network traffic. In this scenario, it filters the traffic coming to network and going from the network. Security Cameras In order to ensure the maximum security TAS has placed security cameras at all sensitive locations. In this scenario, two security cameras are also installed in the server room and a number of security cameras are installed in staff areas. The basic purpose of these cameras is to keep an eye on activities of workers and detect any illegal physical access to organizational resources such as server room (Norton, 2001). DVDs/Tapes In order to take data backups and keep them secure for a long time, TAS makes use of Tapes and DVDs. It is easy to store and retrieve data using DVDs and the majority of computers come with a DVD drive so they are compatible. Hardware Discussed Printers and Scanners The basic purpose of establishing a computer network is to allow a number of employees to enter and process data simultaneously (Nash, 2000). A printer is used to take the receipt of the transactions. In this scenario, TAS uses its network to allow its employees to access a common printer and scanner. Switch A switch is used to control the traffic in a LAN. Basically, a switch is a device that receives the incoming data from a number of input ports to the particular output port and it will take the data toward its desired target (Rouse, Switch, 2007). All the systems are connected with each other via a cable and the terminals of these cables are connected to the switch in order to maintain this communication. Computer Server A computer server is a high quality computer that provides services to other computer programs (and their users) in the same or other computers (TechTarget, 2012). TAS uses a high class computer as a server, which manages all the processes of the network. Personal Computers Every staff member is provided with a latest personal computer. These computers contain all the necessary programs that are necessary for the business operations. Recommendations This section presents recommendations to improve the network security: Staff Training In order to improve the network security TAS must educate and train their staff members. The staff members must have knowledge of network security such as what is network security, why it is important and how should it be implemented. They should be provided with tips, guidelines and manuals. The staff must be trained regarding latest emerging security threats, viruses and their effects. They should also be trained regarding how to deal with these threats. Update Passwords Staff members should keep their username and password safe and do not share with any other person. They should regularly change their passwords and do not set their passwords as their names and data of birth as it is easy for others to make a guess. If a password is stolen then they must inform to IT centre so that a new password can be assigned to them. Update Antivirus Regularly The installation of a latest antivirus program is not enough until it is updated regularly. Without a doubt, new viruses and threats are emerging daily so an updated antivirus program will help deal with these latest security threats. Cloud-based Backup TAS can make use of the latest technology such as cloud computing as a backup support. It will improve the speed, quantity and quality of resources available to TAS (Dell, 2012). In this scenario, TAS can move its business data to a cloud, which is secure and affordable. References Dell. (2012). Cloud Computing. Retrieved January 12, 2013, from http://content.dell.com/us/en/gen/dell-cloud-computing Indiana University. (2012). What is a firewall? Retrieved January 10, 2013 from http://kb.iu.edu/data/aoru.html Kaminsky, A. (2012). What is Network Security? Retrieved January 14, 2013, from http://www.wisegeek.com/what-is-network-security.htm Laudon, K. C., & Laudon, J. P. (1999). Management Information Systems, Sixth Edition (6th ed.). New Jersey: Prentice Hall. Nash, J. (2000). Networking Essentials, MCSE Study Guide. California: IDG Books Worldwide, Inc. Norton, P. (2001). Introduction to Computers, Fourth Edition. Singapore: McGraw-Hill. Ray, R. (2004). Technology Solutions for Growing Businesses. New York: American Management Association (AMACOM). Rouse, M. (2007, May). Firewall. Retrieved January 10, 2013, from http://searchsecurity.techtarget.com/definition/firewall Rouse, M. (2007, July). Switch. Retrieved January 11, 2013, from http://searchtelecom.techtarget.com/definition/switch TechTarget. (2012). Server. Retrieved January 10, 2013, from http://whatis.techtarget.com/definition/server Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network security Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1466101-network-security
(Network Security Essay Example | Topics and Well Written Essays - 1250 Words)
https://studentshare.org/information-technology/1466101-network-security.
“Network Security Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1466101-network-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Security for the Athletes Shack

Wireless Solution for a Sporting Goods Company

Hence, seeing these advantages of wireless networks the management of the Athlete's shack (TAS) has decided to implement new Wireless technology based on WLAN.... The major aim of the Athlete's shack (TAS) is to enhance overall corporate credibility and develop better performance-based arrangements at a corporation.... I have been asked to write a report to propose a wireless networking solution for the Athlete's shack.... In this report, I will present a detailed analysis of WLAN architecture for the Athlete's shack (TAS)....
13 Pages (3250 words) Research Paper

Wireless Network for The Athletes Shack

However, there is no guarantee of the network security, if the iPads are misused and stolen or snatched from one of the employees of TAS.... The paper "Wireless Network for The Athlete's shack" proposes wireless connectivity and 'access points' for the TAS environment.... The Athlete's shack comprises of a chain of stores for sporting goods.... However, security is a primary concern, as data channels will be established in the environment....
12 Pages (3000 words) Business Plan

Preparation for the exam - Strategic Management

As for government policies, the Bureau of Industry and security (n.... New Balance: Case Study Name Instructor Class 6 May 2013 1.... You should be able to produce a comprehensive and meaningful analysis of the external environment for the industry on a global basis (elements of this might cover PESTEL, 5 forces, value net model or variations on these....
14 Pages (3500 words) Research Paper

The Significance and Impact of the Olympic Games

Sporting events in general have the potential of uniting the hearts and lifting the spirits of all participants, provided the games are played in an environment full of sporting spirit and a playful mood.... Organising an event like Olympics requires years of planning, sound strategies and of course a co-ordinated approach for the final show....
12 Pages (3000 words) Essay

The Athletes Shack Wireless Upgrade

However, there is no guarantee of the network security, if the iPads are misused and stolen or snatched from one of the employees of TAS.... The paper "The Athlete's shack Wireless Upgrade" discusses that for catering to the needs of the business for TAS, there is a requirement of secure and effective wireless network connectivity for all the 10 stores within the same area.... security is a primary concern, as data channels will be established in the environment....
12 Pages (3000 words) Case Study

Network Security

This paper presents an analysis of network security for the Athlete's Shack, which runs its business through a chain of sporting goods stores.... This paper presents an analysis of network security for the Athlete's Shack (TAS), which runs its business through a chain of sporting goods stores.... This paper ''network security'' tells that The primary purpose of implementing a computer network is to allow several staff members to enter and update data simultaneously....
5 Pages (1250 words) Essay

Reflective Essay for the Website Project

The website analyzed, in this case, contains information about Chinese retired athletes.... The websites project in this case is solely based on retired athletes from China.... The problems facing Chinese athletes are immense.... While most of the problems are general to other athletes around the world, some can be specifically associated with the Chinese sports system.... One of the reasons athletes face problems in their future is because the career is shorter than any other career or occupation (Padgett, 2002)....
14 Pages (3500 words) Essay

Security at the 2008 Beijing Olympics

"security at the 2008 Beijing Olympics" paper discusses the security plan involved at the 2008 Olympics, the agencies involved and the strategies used in not only these events, but also others of the same kind.... The paper looks at different perspectives on the security governance at such SMEs.... This was brought about by the extensive use of cutting-edge security technologies and the international exchanges of criminal and terrorism suspects....
8 Pages (2000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us