Module 5 INT Response G1 and G3

Group 1

Network protection is a point of concern in many companies that leads to outsourcing of services that monitor networks. Information technology is linked to hardware and network containing sensitive data that should be secured. IT security manages risk. Integrity and availability guides policies used in information security in an organization. Security policy does not end but is updated continuously since the technology and requirements are changing. Employees should be educated on how to protect the assets of the company and evaluate their effectiveness of the policy of the security to ensure required corrections. Insecurity in Information security has created acts such as hacking, which provides access to grades of students, finance status, and results.

Skilled personnel should have the necessary ethics to maintain security in lab computers. Necessary plans about network security team that is dedicated and alert to IT security issues of their end users, system administrators and developers. They should also identify organization threats and assess the risks of the organization profile. However, there should be measures to identify security teams that lack technical skills, focus, and understanding of the policies of an organization and procedures operated internally.

JT-Group 3

Virtual private network (VPN) are grouped into remote-access and site-to-site VPNs. Remote-access VPN establishes secure connection through networks of remote computers while allowing users access secure resources on networks as though they were joined to the servers directly. Produces encrypted connection in secure having less security. VPN covers private networks and public networks like internet and offers wired security of connected systems in case of failure of network infrastructure to provide itself.

VPN is used across shared networks to enable users send and receive data as if there were direct connections with the private networks. Users of VPN gain the functionality, management policies, and security of private networks.

VPNs enable secure access of the intranet of the organization while outside office. As a result, the employee’s confidential information is protected as well as information of private businesses. VPN connect offices in one geographical area by creating unified network. Businesses can hold virtual meetings and develop products.

 

References

Group 1-group 3 papers for TBD

All Rights Reserved, Essaysland.com
Disclaimer: