Network Security.
Network security is primarily the protection of data, files, and directories in a computer from unauthorized access. As a corporate network administrator, it is paramount to secure such records and foster client confidentiality. Any security breach/ attack affects the confidentiality and the integrity of the system. There are various types of network attacks which affect different organizations. A close-in attack is one of the most common types of attack. It is whereby a person tries to get a close physical contact with the network and is, therefore, able to access such data with an aim of modifying, gathering or denying access to information. Another common type of attack is phishing. It is whereby a fake look-alike website is created. Here, a hacker sends an email of a link which prompts the person to be hacked to click the link. On clicking the link and trying to log to the account, the hacker can access the username and password giving the hacker access to the real account. A sophisticated form of network attack is the active attack. The hackers (attackers) bypass secured systems. An active attack is carried out by use of worms, viruses, and most importantly Trojan horses. Malicious codes are sent whereby data is stolen and modified. This form can be carried remotely. For passive attacks, the hackers look for unencrypted traffic and looks for passwords and sensitive information which can be used in other types of attacks (Edon, 2016).
As such, phishing affects client confidentiality since authorized personnel access data which they are not cleared to access. By them posing as the original owners of such accounts, it would be very tough to determine the real owner leading to the closure of the account in totality. This kind of attack also affects the integrity of the organization offering the services. The availability of the original document is also hindered due to the phishing. As such, the use of antivirus is highly recommended. Also, one is encouraged not to clink links sent via email. One is also advised not to disclose personal information when promptly asked (Edon, 2016).
Response to John King
There are many ways to protect an enterprise network against malware or viruses. There are a few ways: System hardening, user permissions and using proxy servers Suggesting two Products to work in conjunction with each other would be implementing McAfee's HBSS system, (Host Based Security System). It is a suite of software applications to monitor, detect, and counter attacks against computer networks and systems. The second product to be recommended for use in an enterprise level protection would be a suite of Network management tools called "Solar winds." This product can be used to monitor the network performance, applications, systems, and also has an IT security software in the suit. The security software can allow a person to monitor event logs on systems, patch management, firewall configurations, assist in managing switches, and servers.
Cloud services
Cloud services are any services that can be accessed via the internet. Many organizations are investing in cloud-based services such as the Linux. Linux allows the users to download their products online. In the case of any query, the customers send their questions online, and the customer services send their request online thanks to the cloud services (Levelcloud, 2016). The customer services of such organizations are thereby enhanced, and there are reduced physical interaction with the offices.
If the cloud does not offer this kind of services, Linux offices would be crowded. The customer care desk would also be overwhelmed. Some of the advantages of cloud-based services are flexibility and disaster recovery. When it comes to scaling up or scaling down, cloud services is the place to go. It allows remote servers. For the catastrophe recovery part, businesses can store their information securely in the cloud. It saves on significant investments of file servers (Salesforce, 2015). Although cloud-based services are essential, there are some disadvantages. One of them is limited control since the whole cloud infrastructure is owned and managed by the service providers. The vendor lock-in is also another problem. Organizations find it difficult to migrate their services from one vendor to another (Levelcloud, 2016). As indicated by the strength of the advantages, it is imperative to say that the benefits are more than the disadvantages.
Reference
Edon, P., 2016, "Data Breach Survivor”, The State of Security. viewed 19 May 2016
www.tripwire.com
Salesforce, 2015, "Why move to cloud computing" viewed 19 May 2016
https://www.salesforce.com/uk/blog/2015/11/why-move-to-the-cloud-10-benefits-of-cloud-computing.html
Levelcloud, 2016, "Advantages and disadvantages of Cloud Computing". LevelCloud,
viewed 19 May 2016
http://www.levelcloud.net/why-levelcloud.