The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | May 2017 |
| Last Sign in: | 283 Weeks Ago |
| Questions Answered: | 27237 |
| Tutorials Posted: | 27372 |
MCS,MBA(IT), Pursuing PHD
Devry University
Sep-2004 - Aug-2010
Assistant Financial Analyst
NatSteel Holdings Pte Ltd
Aug-2007 - Jul-2017
Kim, this looks good but you need to make some changes. The outline portion should resembler a table of contents, the reference section needs annotations for each reference and make sure you are using APA format for all sources. Please fix the issues and resubmit.
                                    Ways to secure your network
Â
I. Introduction
Â
Securing any network infrastructures of today is not the same as it may have been years ago. In the past some IT specialist were able to control attacks on a network because the number were reasonable however; this is not the case today. At any given time, your network could be attacked up to several hundred times in one day. Depending on your organization this number could grow significantly. To ensure your organization is not one of the ones that are subjected to the frequency of successful attacks, you have to ensure you have proper security practices in place to help keep your network secure. Best practices used for securing any network should begin with security accountability, remote access policies, proper network connected devices, behavior and acceptable use, and training.
Â
II. Supporting Claim 1
Â
 Security Accountability.
Â
II. Supporting Claim 2
Â
 Remote Access Policies
Â
II. Supporting Claim 3
Â
 Network Connected Devices
Â
III. Supporting Claim 4
Â
 Behavior and acceptable use
Â
IV. Supporting Claim 5
Â
 Training
Â
V. Conclusion
Â
In conclusion a strong security policy should be the basis for securing a network. It should detail what should be expected to keep your network secure. Your policies must be strong enough to secure your network but not so restrictive that it will impede your users from doing whatever they may need to get done. Having an effective security policy in place will always help reduce many kind of attacks that may be encountered on an unprotected network.
Â
References:
Â
Dubrawsky, I. (2007). How to cheat at securing your network. Burlington, MA: Syngress.
Â
Gibson, D. (2010). Managing Risk in Information Systems. Sudbury, MA. Jones & Bartlett Learning.
Â
Solomon, M. (2011). Security strategies in Windows platforms and applications. Sudbury, Mass.: Jones & Bartlett Learning.
Â
Stallings, W. (2011). Network security essentials: Applications and standards Fourth-Edition. Upper Saddle River, NJ: Prentice Hall.
Â
                                    Ways to secure your network
Â
I. Introduction
Â
The need for network security.
Â
II. Supporting Claim 1
Â
 Security Accountability.
Â
II. Supporting Claim 2
Â
 Remote Access Policies
Â
II. Supporting Claim 3
Â
 Network Connected Devices
Â
III. Supporting Claim 4
Â
 Behavior and acceptable use
Â
IV. Supporting Claim 5
Â
 Training
Â
V. Conclusion
Â
 Security policies.
Â
References:
Â
Dubrawsky, I. (2007). How to cheat at securing your network. Burlington, MA: Syngress.
Â
Gibson, D. (2010). Managing Risk in Information Systems. Sudbury, MA. Jones & Bartlett Learning.
Â
Solomon, M. (2011). Security strategies in Windows platforms and applications. Sudbury, Mass.: Jones & Bartlett Learning.
Â
Stallings, W. (2011). Network security essentials: Applications and standards Fourth-Edition. Upper Saddle River, NJ: Prentice Hall.
----------- He-----------llo----------- Si-----------r/M-----------ada-----------m -----------Tha-----------nk -----------You----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------acq-----------uis-----------iti-----------on -----------of -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll