Essay Example on Handmade Company's Network Management and Security

Published: 2023-01-04
Essay Example on Handmade Company's Network Management and Security
Type of paper:  Essay
Categories:  Company Cyber security Risk management
Pages: 7
Wordcount: 1815 words
16 min read


Every organization needs to protect and guard its network and system framework from any kind of attacks. The running and effectiveness of most organizations depend on the ability of the organizations to have a properly running network system that is based on the essentials of security. In most cases, most organizations are unable to keep up with the demands and the requirements of network systems based on the fact that the majority of them are worried about the vulnerability of their information. It is, therefore, mandatory that organizations must rely upon the benefits of proper network and security management framework (Peltier, 2016). For whatever length of time that there has been network and internet systems administration, there has been in existence the relevant executives to help in the management and control of networks in the most amicable way possible. The primary bit of uplifting news is that in 2008 and past, that there came a rise in the network security which spilled into the present times.

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

Similarly, as there are three particular bits of "news" there are additionally three noteworthy drivers of progress. The primary significant change in the system the board is driven by a noteworthy change in system mission. System administrators have would in general spotlight on "assembly" as the driver for change. Ten years prior, endeavors acquired the main broadband associations, where today the quantity of consumer broadband range is 10-to-multiple times the number of big business associations, contingent upon the market region. Consumerization makes an administration issue for two reasons - scale and education. That expansion would take steps to launch activities and organization costs that for most administrators are as of now three to multiple times as a percent of offers. At the point when the expansion in the number of associations is because of the acquaintance of broadband administrations with clients with low innovation proficiency, an association can make a much all the more disturbing dimension of cost hazard.

The main answer for controlling activities costs is to mechanize more tasks. That prerequisite has made the biggest test for the system the executives' world, on the grounds that so as to mechanize purchaser broadband tasks, you should take an outside-in perspective on the system the executives. Customers are overseen in total on the system; however, they should be upheld as people when they call for administration. According to Peltier (2016), the consumerization as methods for the system the executive's plan will see the move requests that organize the board to be connected to an administration the boarding procedure that keeps up client explicit data and furthermore gives a connection between the client procedure and the system assets that are connected to satisfying the client's administrations. Shopper broadband administrations, regardless of whether Internet, VoIP or IPTV, create more client care occasions than PSTN administrations. Thus it is important that client care give direct connects to not just charging information for request and membership information for administration data, yet in addition, arrange the information.

The Need for Network Management Plan by Handmade

As the head of the team tasked with producing a reliable network and security management plan, I wm zealous of the effect this will create in as far as improving the sustainability of their organization. Handmade furniture has a well and clearly set out plan; both in short and long-term objectives. It is, thus, based on these factors that the elaborate network plan must be created. The decision to discant the internetworking system that existed before for a more public approach and liberal operation calls for a clear and outlined plan in line with the consumerization process as means of managing and controlling the network system.

With new dangers seeming every day arrange security is ending up progressively significant and complex, yet numerous entrepreneurs aren't paying attention to the pattern. Subsequently, Handmade Company is particularly defenseless against security dangers. Truth be told, the National Cyber Security Alliance found that every year 20 percent of private companies experience a digital assault. In case of entrepreneurs as Handmade Furniture, it is basic that they know the nuts and bolts of system security, become mindful of normal system security dangers, and find out about the numerous advantages organize security offers your business. System Security shields your private venture against an assortment of system security dangers.

The absolute most basic dangers incorporate infections, spyware, and malware. Infections, spyware, and malware can introduce themselves through email and by means of site visits. They can examine your system for delicate data, for example, charge card numbers, the government managed savings numbers and passwords. Proficient programmers represent another risk. Programmers are continually finding inventive approaches to break into systems. When they do, every one of the information put away on your system, including basic organization and client information is accessible to them. Zero-day dangers incorporate malware, spyware, and unlawful access to client data. While you trust that the product designer will convey a "fix" to fix the product, your profitable information is helpless before digital culprits.

Handmade Furniture Network and Security Management Plan

Handmade Furniture Company must have a well-outlined network and security management plan that will see it stand out above all the rest. In any case that the management plan fails to secure the overall wellness of the Company, then there is the danger of losing the entire progress that the company had gained in as far as standing out above its peers as the ultimate solution provider. As the advanced economy moves toward becoming standard, the volume of data supporting the significance of cybersecurity for organizations everything being equal and divisions increments ordinary. As indicated by research, up to 99% of PCs are powerless against attacks from programmers, majorly known as cyber attackers. Among different purposes behind the unprecedented expansion of supposed malignant programming (or malware). Accordingly, it is significant that organizations take estimates right presently to secure themselves against digital wrongdoing. In this plan, a proposal of the 10 fundamental advances that Handmade Furniture Company should remember to expound a cybersecurity plan will be discussed. The elaborate 10 security plan steps must be followed in order as a means of ensuring that the entire team of staffs and consumers play according to the rules and regulations.

Establishing a Risk Management Protocol

The first step toward achieving a proper cybersecurity measure for the Handmade Furniture is to ensure that there is a reliable risk management protocol. While this may seem to be a wide and vast approach in the establishment of the network plan, it is a very essential part of the security process in the network process (Almorsy, Grundy and Muller 2016). The measure of the security risks in Handmade Furniture Company points towards a gloomy and uncontrolled process. The use of the Wi-Fi network exposes a worrying trend in the entire company which means that the organization cannot be certain about the safety of its information, data and other relevant documents and staff information. it is also important to ensure that the Security department at Handmade furniture Company measures the cybersecurity hazards that the organization's data and frameworks are presented to, with a similar consideration with which the organization ensures its lawful, money related and administrative movement. When they have evaluated those dangers, set up a hazard the executives convention, which must have the help of the board and of the individuals from the directing panel.

Cyber attackers scan for remotely open system points that are vulnerable to abuse. Basic precedents are to ensure that the systems incorporate ineffectively arranged web servers, mail servers, record and print administrations, and Domain Name System (DNS) servers to be introduced as a matter of course on a wide range of gadget types, frequently without a business requirement for the given administration. The Handmade Furniture Company has numerous product bundles that are consequently introduced by administrations and turn them on as a major aspect of the establishment of the fundamental programming bundle without educating a client or executive that the administrations have been empowered. Network hackers filter for such administrations and endeavor to misuse these administrations, regularly endeavoring to abuse default client IDs and passwords or generally accessible abuse code. Therefore, the first step in the process of network and security system management for the sake of the safety of the Company. Web Protocol security (IPsec) can be utilized as remote access burrowing convention to encode traffic going over the Internet. It utilizes the Internet Key Exchange (IKE) over port 500 to make a security relationship for the VPN.

Network's Security Reinforcement

The second and most essential point of the network and security management plan will be the reinforcement of the security of the information contained in the data. The security management can take different approach especially with the most recommended approach being cloud computing. The cloud computing technology is sure to store a large amount of data online as a means of ensuring that unwanted persons do not access it at will (Ormazabal, Verizon Patent and Licensing Inc 2015). However, even with that, there is a need to ensure that the security of such information stored online through third-party vendors such as Oracle must be well managed and stored to the very best.

The connection of the company's PC's to the cloud-based system that will ensure that the information that is on the cloud is protected against attacks by having a super administrator that will control all the proxies related to the access of information by unauthorized persons. It is very important to Shield the Handmade Company's data system from potential assaults by falling back on specific programming organizations that enable them to test your security, recognizing unapproved get to and noxious substance. These fall back options may include the need to indulge third-party service providers. The indulgence of such companies as Google is effective for the Handmade Furniture Company as a means of creating a lasting solution to the security issues in the entire framework. ACACS+. TACACS+ is utilized as an option over RADIUS. The VPN utilizes different test reactions for verification, approval, and review (AAA). TACACS+ has more extensive uses including as a verification administration for system gadgets. TACACS+ utilizes TCP port 49.

An unmistakable, tamper-proof, and exhaustive system approach fills in as a security compass for business associations such as Handmade Furniture. Such system strategies are composed of reports that plot client arrangements about who can get to the system, what confinements and benefits do they have. A weak password is a danger for corporate systems, while great passwords go far to keep them out of hacker's way. hackers send basic virtual products to break a client account, so it's extraordinary to make passwords dependent on your memory's comfort. System administrators ought to authorize system users to make passwords that are hard to crack and not something that is chosen of word reference. One of the ways cybercriminals discover provisos to dispatch their assaults is through old forms of malware products.

Cite this page

Essay Example on Handmade Company's Network Management and Security. (2023, Jan 04). Retrieved from

Request Removal

If you are the original author of this essay and no longer wish to have it published on the SpeedyPaper website, please click below to request its removal:

Liked this essay sample but need an original one?

Hire a professional with VAST experience!

24/7 online support

NO plagiarism