Network security is a protection to retrieve the documents and files in computer network against hacking, misemploy and unaccredited amend to the system. Ciampa (2011) assert that network security is very important to the employees as well to the customers’ data. In running a company or business, it is recommended to have security analyst to help in protecting it from insecure actions.
Problems/ Vulnerabilities attached to network security
Secure network ensures the protection of information from both internal and external attack. These attacks include; injection of virus, service theft, service disruption, exposure of information to the public, hacking among others (Ciampa, 2011). These problems cause failure of the businesses as well as the companies. The managers are always cautious of the condition of the company and what is likely to happen if anything bad happens. With the rapidly growing technology, the information in computers is endangered since it can be obtained without the manager consent and exposed to the public (Ciampa, 2011).
This has accelerated the need for the companies to think and hire security analyst to curb this problem. In most cases, the security officer needed must have the CompTIA Security+ certification industrial credentials (Kemper, 2009). These certificates contain the information that shows that the analyst is internationally recognized, knowledgeable and experienced in matters regarding security. In addition, the greater workforce has resulted to mistrust since the secrets of the company can be revealed to the public. This creates new vulnerability of the company to any company can be attacked by both of the outsiders and outsiders. To ensure network security, complete networking life cycle is considered (Kemper, 2009).
For a small accounting firm to ensure secure networking, platform security is improvised. This ensures that each device is accessible to execute its intended use and does not fail the total network (Kemper, 2009). This security platform should include antivirus to safeguard the computer from malware, prevent adware as well as preventing other forms of malevolent programs. Access security ensures that every employee only accesses the information which is intended for him or her. That is each user can access only those applications and network elements required in their line of duty. As a result, no user can access someone else documents (Stoneburner, 2003). This helps the manager to follow up if any problem emerges the cause is easily detected. For instance, if a certain user spreads a certain information, the security analyst detects the device or computer used to generate that information and the user will be responsible for it.
Physical security is intended to protect the network from physical harm. That is protection against events that can cause mega loss or damage to the company. This includes protection from theft, burglary, natural disasters, fire, and terrorism among others. It is recommendable to use physical security such as alarm systems and locked doors to ensure security. The firm is likely to suffer from outside attack trough technologies (Stoneburner, 2003). To prevent this, perimeter security is imposed to detect firewall and intrusion. This will help the firm to detect any information concerning it but released unintentionally to the unintended recipient.
Although this is a small firm, many barriers hinder communication and has to be prevented. Also, at times, misunderstanding may arise among employees thus lowering overall production (Stoneburner, 2003). Because of this, communication security is needed to ensure data confidentiality and integrity. This is typically done through the use of IPsec virtual private networks (VPN). Apart from using VPN to protect the network management information, other security mechanisms such as LANs, SSH, TLS, and SNMPv3 are used (Stoneburner, 2003).
Moreover, the firm needs to incorporate people in the process of network security planning. That is, the firm should employ effective processes like security awareness training, security policies and enforcing the policy. Having employees who work use the network, they adhere to this critical policies to minimize the challenges that the company is likely to face (Stoneburner, 2003). Additionally, the company is using wireless mesh communication is recommended to use VPNs or 802.11i to protect the user information. Also, for the departments within the same network, VLANs should be used to separate traffic between them. VLANs separate regular users from guests (Stoneburner, 2003). This helps to protect the user information.
All the user devices should be accounted for whether wired or wireless. The employees are allowed to have devices such as smartphones which can store intellectual information regarding the firm and are easier to be misplaced or to be stolen hence revealing the important information to the public (Kemper, 2009). To remedy this, control devices should be avoided and if used any information should not be copied in them. This helps to protect the firm from the outside forces.
Conclusively, companies are vulnerable to many problems sine technology is advancing every day. However, the security analysts have been of great use to the companies because they curb all the intended bad plans to the firm or company. Also, they guide the managers on how to run their businesses to ensure no criminality action is targeted to the business will pros
Ciampa, M.D. (2011) Security+ guide to network security fundamentals. 4th edn. Boston, MA: Course Technology, Cengage Learning.
Kemper, A. (2009) Valuation of network effects in software markets: A complex networks approach (contributions.. Heidelberg: Physica-Verlag GmbH & Co.
Stoneburner, G. (2003) Risk management guide for information technology systems, and underlying technical models for Info. Technology security. S.l.: Diane Pub Co.