Technology / Networking Security Cmgt440
Networking Security Cmgt440This essay Networking Security Cmgt440 is available for you on Essays24.com! Search Term Papers, College Essay Examples and Free Essays on Essays24.com - full papers database.
Autor: anton 28 November 2010
Words: 643 | Pages: 3
The Mc Bride Financial Services provides loans to people for mortgages, credit reports, home inspections and appraisals. In order for an individual to apply for a loan, the McBride Financial Services has an available loan application for them to fill out over the internet.
The security of allowing the loans to be filled out over the internet is of vital importance. The consumer trust McBride Financial Services to secure their personal information and prevent their information from being stolen. Stolen information could lead to identity thief. The thief could use the victimÐ²Ð‚â„¢s personal information to obtain credit elsewhere thus causing the potential to ruin the personÐ²Ð‚â„¢s credit.
Another aspect of the securing the information, is to block hackers from obtaining information for their own objectives. Hackers could have the potential to use the information given within the loan application to send out fraudulent e-mails with viruses attached. These e-mails could be viewed as coming from McBride Financial Services and therefore would be blamed for the viruses that have infected all of their customerÐ²Ð‚â„¢s computers.
Another need for security in this area is to protect McBride Financial Services from outside hazards. These hazards could be viruses, worms or Trojan horses. Any of these hazards has the potential to bring down the McBride Financial Services internal network. If this were to happen, the business may loose customers due to the inability to access their information or possibly even view the web page itself. Employees of McBride Financial Services would also become frustrated with their internal system due to the functionality of the system being slower. The risk of spreading the virus or worm internally and with customers is high if the system has already been infected.
All of these security issues need to be taken into consideration when providing the customer with an online application for them to fill out to request services. These items need to be secured in order to protect the customer, the business and the services.
To resolve these issues, I would recommend several items both hardware and software. Alone each of these items may be able to protect portions of the network, however together they will be able to protect the entire network at McBride Financial Services.
The first thing I recommend setting up is a Demilitarized Zone (DMZ). A DMZ will isolate the server used for the loan applications from the remainder of the internal network. This arrangement would make it more difficult for a hacker to get into the intranet. A Ð²Ð‚ÑšHarvesterÐ²Ð‚Ñœ server can be placed in the internal side of the DMZ to harvest applications off the application server on a regular basis. A firewall will be placed between the Harvester and the Application server, to protect the harvester from any potential hazards that may be lurking on the application server.
The next item I recommend is to update the anti-virus software on every computer in the facility. As well as updating them, set them up for scheduled downloads as often as required. This process will also aid in the prevention of any possible worms, viruses or Trojan horses finding their way into the network.
For securing the e-mails that come into the facility, I would recommend setting up the e-mail programs to not automatically open up e-mails and/or their attachments. Another item to configure is for the software program to run automatic virus scans on all e-mail attachments. Another idea would be to set up two e-mail programs; one for internal e-mails only and another for external e-mails.
In conclusion, setting the network up in a DMZ with anti-virus software installed on each PC and virus scans on the e-mail will eliminate a lot of the hazards of the internet.
Ciampa, Mark. Security Awareness: Applying Practical Security in Your World. Chapter 5: Total Security. 2005. Course Technology
Palmer, Michael. Guide to Operating Systems Security. Chapter 10: E-mail Security. 2003. Course Technology
Get Better Grades Today
Join Essays24.com and get instant access to over 60,000+ Papers and Essays