StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Security and Its Business Impact - Essay Example

Cite this document
Summary
This essay presents network security which has become a major issue in the business world. With most of the organizations relying on technology using multi-networked computing environment, making it easy for flow of information and also sharing resources at the same time…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
Network Security and Its Business Impact
Read Text Preview

Extract of sample "Network Security and Its Business Impact"

 Table of Contents Background: 2 2 Situation Overview: 2 3 Presenting the Problem Definition: 3 4 Real World Target: 3 5 What is Security? 3 6What is Network Security? 3 7 Strategic IT Value: 4 8 Aim: 4 9 Objectives: 4 9.1 To identify the criteria of effective wireless networks. 4 9.2 To identify the criteria of security for integrated wired/ wireless networks in organizations. 4 9.3 To develop suggestions for the security policies in organizations, to address the changes in wired and wireless networks. 4 9.4 To evaluate the benefits and risks of blending wireless and wired security solutions and their implications for organizations. 4 10 Literature review: 4 10.1 Network Security in Wired and Wireless Networks 4 10.2 Wireless Network Security 5 11 Research Design-Research method: 5 11.1 Research Design – Phase 1: Primary Data Collection: 5 11.2 Basic Activity for Generating Data: 6 11.3 Primary Data: 6 11.4 Collection Protocols: 6 11.5 Primary Data Collection Presentation: 6 11.6 Research Design – Phase 2: Processing and Presentation: 6 11.7 Design for Pre-Processing for Primary Data Collection: 7 11.8 Design for generating the intended project outcome: 7 12 Intended Project Outcome: 7 13 Table 1 indicates the major project tasks including the estimated time 7 14 Time plan: 8 15 Suggested plan for the dissertation: 10 16 Internet References: 10 17 BookReferences: 11 18 Survey Questionnaire………………………………………………………………………………………………………………………..…….12 1 Background: Network security has become a major issue in the business world. With most of the organizations relying on technology using multi-networked computing environment, making it easy for flow of information and also sharing resources at the same time. The advent and compulsion of existence of multiple types of networks in an organization have complicated the arrangement of security implementation. This may lead to the issue of the information being available to everybody using the network. Business involves lot of critical data which needs to be sorted and reserved to and within the department depending on the requirement. Securing and stabilizing the network ensures the confidentiality of data and effects positively towards the productivity and functionality of a business. Providing secure information technology (IT) services to colleges and universities is a special and unique challenge. Unfettered and timely access to all enormous quanti­ties of information is higher education’s life­blood and is a key to its success in educating its students and generating new ideas and know-how. The situation becomes more challenging when a new technology is added and integrated into the existing setup and same or advanced level of accessibility and protection is expected. Thus, the need of the hour is to identify the security loopholes and develop security policies especially for environments where the wired and wireless networks co-exist. 2 Situation Overview: The research is set in MajanCollege in the context of improvising the security of the college network after adding the wireless network (Wireless LAN) with the existing wired network (Local LAN). 3 Presenting the Problem Definition: The problem for the Network administrators is focused on understanding that the security needs to be strengthened when a wireless network is added to the wired network. 4 Real World Target: The major benefit in the real world if the problem is resolved or partially resolved is that the network administrators would confidently revise the security policies every time a wireless network is added to their network rather than continuing with the existing policies for the wired network and not being susceptible to security breaches saving the confidentiality of the data which is an asset to business. 5 What is Security? Computer security is a complex of actions and activities aimed at creating a secure computing platform, so that individuals and users using this platform can perform only actions allowed by the platform (1). Computer security actions involve the development and implementation of a computer security policy (1). The range of questions allowed by the security platform can be reduced to accessing, modifying, and deleting available information (1). So security in terms of IT means to secure the computer or any IT equipment from unauthorized access whether physical or logical. Security in terms of IT means to secure the computer or any IT equipment from unauthorized access whether physical or logical. 6 What is Network Security? Gregory L.Stockdale Network security is synonymous to “protection of networks”, as well as their services, from unauthorized use (2). Network security is associated with the provision of assurance that the network operates correctly and no harmful side effects are caused by it (2). Network security is the process of taking both physical and software means of protecting data from misuse by others or from a malfunction or system crash. 7 Strategic IT Value: The importance strategically of this work is that the integrated network security for wired and wireless network will help the college in securing valuable data, improving network systems performance, protecting networks from internal and external threats, to enable higher availability and accessibility to the network. Network systems that are designed with strategic security aspects will not only make the networking environment more supportive but also more productive. From a strategic management point of view, breach in network security will simultaneously threaten the structural and fiscal integrity. 8 Aim: The aim of the project is to investigate the process of integrating wireless solutions with wired enterprise networks and its implications for security within organizations. 9 Objectives: 9.1 To identify the criteria of effective wireless networks. 9.2 To identify the criteria of security for integrated wired/ wireless networks in organizations. 9.3 To develop suggestions for the security policies in organizations, to address the changes in wired and wireless networks. 9.4 To evaluate the benefits and risks of blending wireless and wired security solutions and their implications for organizations. 10 Literature review: 10.1 Network Security in Wired and Wireless Networks Brien Posey.2005 Wireless networks exemplify one of the most risky elements of data transmission in terms of their security (3) That wireless networks have long been considered insecure cannot be denied (3). However, given the scope of attention toward security of the wireless networks and their implications for users, wireless solutions has recently become even securer than their “wired counterparts” (3). The later discussion we would see that how the wireless network security can be better than the wired security and how we can integrate the features of wireless security to the wired network 10.2 Wireless Network Security Praveen Dalal,2006 Wireless networks have become extremely popular among individual users and organizations (4). Laptops are the most common element of wireless networks, with wireless cards installed by the manufacturer (4). Wireless networks provide individual and organizational users with numerous benefits. Simultaneously, security issues plague all types of wireless networks (4). They are extremely vulnerable to the risks of hacking: at times, wireless solutions themselves are being used to enter non-wireless networks (4). Secondary data(case studies, reports, white papers and internet) will help to compare the relevant work done by other researchers 11 Research Design-Research method: As part of the research, surveys would be conducted via questionnaires to analyze the understanding of network security in wired and wireless networks in the similar institutions of Oman.Which have both the wired and wireless network implemented. Zikmund, [2003, p.62]. Exploratory research is used, whenever researchers cannot adequately define the problem. The basic goal of exploratory research is to narrow the problem in ways, which allow developing specific research questions and analyze them adequately. Neil J.Salkind, [2003, p.10]. Nonexperimental research is a type of a study that incorporates a variety of different research methods and aims at describing the relationships between numerous variables. The research method adapted for this project will be non-experimental explorative research type. 11.1 Research Design – Phase 1: Primary Data Collection: This phase of research is exclusively related to the compilation of the primary data which would be later processed for the outcome of the project. 11.2 Basic Activity for Generating Data: The fundamental plan is to compare the network security enhancement features while adding a wireless network to an existing wired network. 11.3 Primary Data: The survey would be done based upon the questionnaires distributed to selected Academic Institutions of Oman having recently deployed Wireless networks within their institutions. The plan is to focus on the security changes within the institutions after adding the wireless network to the existing wired network. The primary data would be formed with the collected information for the entities such as: wireless security parameters (Authentication, Encryption) wireless availability options (No. of Access Points, No. of wireless users logged on at the same time, bandwidth utilization on wireless network) wireless security vulnerabilities (Open Authentication vulnerabilities, shared key authentication vulnerabilities, MAC address authentication vulnerabilities, WEP encryption vulnerabilities) 11.4 Collection Protocols: The collection would be based on survey format where the questionnaires would be distributed to selected institutions within Oman. The idea is to visit the institutions personally and get the questionnaires filled. Also the questionnaires would be sent by emails and post mail with a deadline for return. In addition to the questionnaires, interviews would be conducted with Networking and Security professionals to have their valuable inputs on the subject matter. 11.5 Primary Data Collection Presentation: The primary data sets would be attached in the project document appendix and presented in the form of report using a rating system. 11.6 Research Design – Phase 2: Processing and Presentation: This phase of research will compile the whole set of primary data gathered, and the data would be maneuvered to find the expected outcome of the project. Which in this project would be a document stating the importance of security reconsideration at the time of implementing the wireless network in an existing wired network. 11.7 Design for Pre-Processing for Primary Data Collection: The answers would be interpreted directly from the questionnaires filled in phase 1 and based on that the data would be processed to identify the measures of security adapted at the time of implementation of the wireless network. The outcome of this processing would be a comparative report outlining the security measures with the existing wired network and changed adapted in security measures with addition of wireless network. 11.8 Design for generating the intended project outcome: The processed data would be analyzed to identify the factors of change in the network security planning and the amount of change which is required with the addition of a wireless network in the existing institutions wired network security. The data would blend the key findings and learning about the network security implementation policy variation with the change in the existing network architecture. 12 Intended Project Outcome: The researcher expects that the proposed research project will reveal the hidden benefits and threats of integrating wireless solutions with wired networks in organizations and their implications for organizational performance. This research will help to develop effective criteria of security for wireless networks used by organizations. 13 Table 1 indicates the major project tasks including the estimated time S.No Task description Estimated days 1 Brain storming and finalization of topic 4 2 Took the management approval 3 3 Study the current status of college network 7 4 Preparing Title, Aim & objectives 7 5 Preparing the draft proposal 7 6 Literature search 28 7 Literature review 21 8 Submission of 1st progress report 1 9 Research design 7 10 Data collection 60 11 Data analysis 14 12 Submission of 2nd Progress report 1 13 Conclusion 4 14 Preparing the draft of dissertation & submission 7 15 Update the comments 7 16 Submission of dissertation & viva 2 14 Time plan: Dates are Saturdays Jan-11 Feb-11 March-11 April-11 May-11 June-11 July-11 Event 22 29 05 12 19 26 05 12 19 26 02 09 16 23 30 07 14 21 28 04 11 18 25 02 09 16 23 Brain storming and finalization of topic Took the management approval Study the current status of college network Preparing Title, Aim & objectives Preparing the draft proposal Literature search Literature review Submission of 1st progress report Research design Data collection Data analysis Submission of 2nd Progress report Conclusion Preparing the draft of dissertation & submission Update the comments Submission of dissertation & viva 15 Suggested plan for the dissertation: 1. Introduction. 2. Aims and objectives of the dissertation. 3. Literature review. 4. Methodology and data collection. 5. Data analysis and results. 6. Discussion. 7. Implications for organizations and ideas for the future research. 16 Internet References: 1. SecurityDocs.com (n.d). In Security White Papers and Articles. Retrieved December 21, 2010, From: Securitydocs.com Website : http://www.securitydocs.com/Reference 2. Gregory L. Stockdale (n.d). In Digital Guard Glossary. Retrieved December 21, 2010 From Digital Guards website : http://www.digitalguards.com/glossary.php 3. Brien Posey.(2005,March,22).In wireless security Retrieved December21, 2010, From: windows security website: http://www.windowsecurity.com/articles/Wireless-Networks-Surpassed-Security-Wired-Networks.html 4. Praveen Dalal (2006,Sep, 21). Wireless security some measures. Retrieved December,21,2010 from computer crime research centre. Website: http://www.crime-research.org/articles/wireless-security-some-measures/ 17 BookReferences: Zikmund W. (2000). Business Research Methods, 7th Ed:, South-Western, Thomson Learning, Ohio, USA. Salkind, Neil j. (2003). Exploring Research, 5th Ed., Prentice Hall, USA, 0-13-122916-8 Allan Liska (2003), The Practice of Network Security, Prentice Hall, 0-13-046223-3 Owen Pole (2003), Network Security a practical guide, Computer weekly, 0-7506-5033-8 Charlie Kaufman, Radia Perlman, MickeSpeciner (2002), Network Security, Prentice Hall,0-13-046019-2 Survey Questionnaire Note: The information provided in the questionnaire and institution names will be kept confidential and the data will use for educational analysis purpose only Name of the network Administrator: Contact telephone no: 1. Name of the college 2. Number of staff a. Less than 40 b. 41 to 60 c. 61 to 80 d. More than 80 3. Number of total students in the college a. Less than 300 b. 301 to 600 c. 601 to 1000 d. More than 1000 4. Number of part time students a. Less than 100 b. 101 to 300 c. 301 to 400 d. More than 400 5. How you are connected to the internet a. ADSL b. Lease line c. Dail Up d. Multi Link 6. Number of servers a. Less than 3 b. 4 to 6 c. 7 to 10 d. More than 10 7. Number of total PC’s installed in the college? a. Less than 100 b. 101 to 200 b. 201 to300 d. More than 300 8. Which operating system is installed on the servers and desktops ? a. MS-Windows based b. Unix based c. Linux based d. Others, if any…….. 9. Number of PC’s connected to wired network a. Less than 100 b. 101 to 150 c. 151 to 250 d. More than 250 10. Number of registered users using the wireless network a. Less than 100 b. 101 to 150 c. 151 to 250 d. More than 250 11. Number of wireless Access points installed in Campus a. Less than 10 b. 11 to 20 c. 21 to 30 d. 31 to 40 12. How often are you reviewing your servers and PCs installing procedures? a. Half-Yearly b. Yearly c. As and when required d. Not applicable 13. How often are you reviewing your students’ and staffs using PCs policies and procedures? a. Half-Yearly b. Yearly c. As and when required d. Not applicable 14. Does the college have any IT security policies and procedures in placed? a. Yes b. No 15. How often are you reviewing your security policies? a. Half-Yearly b. Yearly c. As and when required d. Not applicable 16. What type of AntiX (Anti virus/spam/spyware) software is installed in servers and client PCs? a. Mcafee b. Symantec NAV c. Trend micro d. Others, if any. 17. Is any Anti virus and Anti spam software installed on the mail server? a. Yes b. no 18. How often are you Updating the Anti X software and security patches? a. Auto updates b. Daily c. Weekly d. Monthly 19. How regularly are you monitoring the security logs? a. Hourly b. Daily c. Weekly d. As an when required. 20. Is the college implementing the vendor recommended best practices and methods? a. Yes b. No 21. Is college has any resetting password policy placed if yes how often? a. 45 days b. 90 days c. As on user request d. Not applicable 22. Which authentications methods are in use to access the network resources? a. Windows based authentication b. Smart card c. USB tokens d. software tokens 23. Is any RADIUS server placed for AAA (Authentication, Authorization, Accounting) Authentication? a. Yes b. No 24. Is any Intrusion Prevention System (IPS) is installed in your network? a. Yes b. No 25. What type of Authentication and encryption methods are configured on wireless network a. Wire Equivalency Privacy (WPE) b. Wi-Fi Protected Access (WPA) c. RADIUS d. Others, if any…. 26. Is any hard role implemented to deny the connection through wireless network if node is not updated for security patches and anti virus? a. Yes b. No 27. What are the firewalls installed ………………. a. software firewall b. Hardware firewall c. built in OS firewall enabled d. Other, If any…… 28. Is the firewall protecting all external threats? a. Yes b. No 29. What type of authentication is in use to access the internet a. OS level authentication b. Software based proxy authentication c. Hardware based proxy authentication d. not applicable 30. What type of the security methods you installed to authenticate the wireless users? a. Mac ID filtering b. Static IP Addressing c. Non broadcast SSID d. Others, If any ********** END ********** Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Security and Its Business Impact Essay Example | Topics and Well Written Essays - 2000 words”, n.d.)
Retrieved from https://studentshare.org/family-consumer-science/1404801-network-security-and-its-business-impact
(Network Security and Its Business Impact Essay Example | Topics and Well Written Essays - 2000 Words)
https://studentshare.org/family-consumer-science/1404801-network-security-and-its-business-impact.
“Network Security and Its Business Impact Essay Example | Topics and Well Written Essays - 2000 Words”, n.d. https://studentshare.org/family-consumer-science/1404801-network-security-and-its-business-impact.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Security and Its Business Impact

Network Security

It covers all key areas around network security and those relevant to information security.... In this book Harrington tears a part skills based network security and provides practical examples of network scenarios with security breaches.... The author gives a large overview of Jackson, Chris "network security auditing", Harrington Jan "network security: A Practical approach", Douglas Comer “Computer Networks and Internets” and other works on the topic of network security....
18 Pages (4500 words) Annotated Bibliography

Security Risk Analysis Issues

network security has advanced from a fascinating curiosity to a vital rather essential part of the network management activity for potential corporate users in all sectors of the economy.... In the recent past, last decade, network security implementations have shifted the focus from the relatively small early adopters to a much larger group of organizations that use the network security to expand and comprehensively cover the networking capabilities and enhance their solicitation to their clientele....
17 Pages (4250 words) Outline

Network Security and Its Business Impact in Educational Institutions

Network Security and Its Business Impact in Educational Institutions By Mohammed Abdul Rahman Supervisor: Dr.... Student Particulars Name: Mohammed Abdul Rahman Student Id: xxxxxxxxxx Project Title: Network Security and Its Business Impact in Educational institutions Student Declaration I declare that 1.... Kim Heng Teo for the advisory support during the formulation of this project Abstract network security is a crucial issue.... The research analyzes that the business impacts of combined wireless and wired network security in educational institutions....
56 Pages (14000 words) Dissertation

What is security Why network security is important

Moreover, due to vast dependency of organization on information systems, security and protection of these systems has become a mandatory factor.... hellip; In the context of network security definition, it consists of concerns related to network communication privacy, confidentiality of data over the network, accessing unauthorized classified data, access to prohibited network domains and utilizing Internet for concealed communication (network security....
9 Pages (2250 words) Coursework

Network Security: a Vital Element in Todays Booming Commerce

Many Information technicians understood the growing concern of this security and wanted to address it in an effective manner.... This report "network security: a Vital Element in Today's Booming Commerce" discusses some important aspects regarding maintaining a secured network connection via virtual private networks.... The History of network security seems to very vague as security was kept in low profile for most corporations.... Next, the VPN router decrypts the data, and transfers it to the proper destination VPN security is a major element in achieving a proper, secure, and efficient connection....
12 Pages (3000 words) Report

Impact of the Virtual Private Network on Businesses

The aim of the paper is to look into the impact of Virtual Private Network to businesses, this in relation to the meaning of VPN, the stages of its development, and the advantages it has over others.... VPNs are categorized according to the role they play in business, and there are three different categories of VPNs, one being remote access VPNs that allows remote users like mobile employees to securely access the business network.... business exchange information securely within computers and devices on these networks provided that only persons with real access to the network could share that information....
5 Pages (1250 words) Research Paper

Political Terrorism

This essay discusses the impact of information technology on terrorism; how policymakers, intelligence specialists, and scholars view this current change in the nature of terrorism; and the needed security or defense policies to disrupt this new form of terrorism.... Yet, together with these gains… National security officials across the globe are extremely concerned about this new kind of terrorism....
12 Pages (3000 words) Term Paper

Network Operating Systems Past and Present

A network operating system is a program that is executed in server machine and also able to take care of the users, facts and figures, security, groups, applications and other networking operations.... … network operating systems in the past and presentWith the advent of information systems and computerization in many organizations, computer technologies have been seen to get more advanced every day.... With these, there has been need to have computers network operating systems in the past and presentWith the advent of information systems and computerization in many organizations, computer technologies have been seen to get more advanced every day....
9 Pages (2250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us