Saturday, December 7, 2019

Digital Tools for Digital Security Guide- myassignmenthelp.com

Question: Discuss about theDigital Tools for Digital Security Guide. Answer: Digital Security Guide The world is becoming smaller day by day due to the growing interconnectivity between different parts of the world. This is all because of internet. However, even though there are lot of benefits of internet at the present day, it does prove as a major threat at the present age. Thus, this digital security guide has been created for the employees. Passwords It is crucial that the passwords created by the employees are effective and secure. In this matter, there is a need for the password to be alphanumeric with symbols as such passwords cannot be hacked. Also, the individuals should refrain from using their date of births as passwords as these are easily cracked (Nahari Krutz, 2017). Credibility of Website Such websites should be avoided which are not secured and this can be inferred from the green or red mark in the box where the URL of a website is written. Also, the websites which have proper trademarks, and are active are credible, and the ones like Wikipedia or the blogs are not deemed as credible websites as the matter on these sites can be altered by anyone (Nahari Krutz, 2017). Some key terms Spams are the unsolicited messages which can be easily spotted and can damage the system on which the same is opened or is responded from. Phishing are the emails sent by internet criminal which are disguised as email from trustworthy or legitimate source. The purpose is to lure the person in revealing confidential information. Spoofing refers to the criminals who impersonate other organizations or individuals for getting confidential information. Pharming refers to malicious websites which seem to be legitimate ones. It is advised to employees to stay away from such and where they doubt the authenticity of any communication, they should refrain from opening them (Texas Tech University, 2017). Password managers Password manager helps in generating and also in retrieving the complex passwords, particularly the ones in encrypted database. The advantages include the capacity of being easily incorporated in the softwares, no need of extensive modifications in computers and users being familiar with use of passwords. However, these are vulnerable, and can be blocked which make them useless (Nahari Krutz, 2017). Example of secure network Examples of network security include antivirus and antimalware softwares, application security, firewalls and network segmentation (Cisco, 2017). Encryption Encryption refers to the process whereby messages or information are encoded in such a manner that they can only be accessed by authorized parties. It does not prevent interferences and instead denies the important content to a possible interceptor. When it comes to encryption, there is a need for a successful encryption strategy to be used by the employees (O'Leary, Nelson, Green Grahn, 2017). The employees are also required to ensure that the encryption key is not provided to any third party, as the same can be used to gaining an access to the encrypted network. Denial of Service attack Denial of service attack is a kind of cyber attack in which the perpetrator attempts to make the network resource or a machine unavailable to the user of such device or resource in either temporary or indefinite manner of the host. It typically floods the servers, networks or systems with traffic in order to overwhelm the system of the victim and make it inaccessible. The employees should keep a lookout for such attacks and any suspicion of the same should be raised immediately. They should deploy the defence techniques in advance to save from such incidents, which includes firewalls and IPS based prevention (Nahari Krutz, 2017). Cloud computing Cloud computing refers to the information technology paradigm through which the omnipresent access to the shared pools of high level services and configurable system resources is enabled particularly the one which can be provisioned with minimalistic efforts over the internet. It is the general term which is used to refer to the delivery of hosted services on internet. In third party clouds, the companies are able to focus on their main business instead of having to expend their resources on infrastructure and maintenance of computers. The employees can share the resources for attaining economies of scale and coherence. It allows the employees to access information across different locations and devices (Davidi, 2013). Best practices in cloud computing The best practices in cloud computing includes the following: Creating a strategy and set of objectives before hand, so that a long term cloud strategy is articulated which relates to the overall business. Learning from the mistakes of others Avoiding upfront costs Being serious autonomy Addressing security concerns Ensuring availability and performance of data (ESJ, 2009). References Cisco. (2017). What Is Network Security? Retrieved from: https://www.cisco.com/c/en/us/products/security/what-is-network-security.html Davidi, A. (2013). How is cloud computing enhancing our ability to work anywhere? Retrieved from: https://www.theguardian.com/media-network/media-network-blog/2013/dec/18/cloud-enhancing-work-anywhere-flexible ESJ. (2009). Seven Best Practices for Cloud Computing. Retrieved from: https://esj.com/Articles/2009/08/18/Cloud-Best-Practices.aspx?Page=2 Nahari, H., Krutz, R. L. (2011).Web commerce security: design and development. West Sussex: John Wiley Sons. O'Leary, D., Nelson, J., Green, P., Grahn, A. (2017). 7 Key Elements of a Successful Encryption Strategy. Retrieved from: https://focus.forsythe.com/articles/364/7-Key-Elements-of-a-Successful-Encryption-Strategy Texas Tech University. (2017). Scams Spam, Phishing, Spoofing and Pharming. Retrieved from: https://www.ttu.edu/cybersecurity/lubbock/digital-life/digital-identity/scams-spam-phishing-spoofing-pharming.php

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.