Enterprise Computing and Network Encryption Responses – Online Assignment Help – savvyessaywriters.net
Enterprise Computing and Network Encryption Responses – Online Assignment Help – savvyessaywriters.net
Get Information Systems Assignment Help Online
Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.RESPONSE 1:Two specific ways in which security for enterprise computing is different from personal computing include the risk of attack as well as the probability of attack. The security posture of an enterprise is most likely going to be held at a higher standard than that of a personal computing system. Smith identifies insider threats as a major concern for enterprise computing (Smith, 2016). The probability of attack can impact an enterprises ability to meet business objectives and may increase the cost of operating. Personal computing may choose to increase security measures however the overall expense and ability to operate will most likely not impact the user.Two techniques that help reduce insider threat include job rotation and two or multi-person control. Job rotation is a simple concept that involves rotating tasks assigned in an effort to discourage one individual from having to much control over any one program. This concept is also a great way to enhance professional development and ensure the absence of one or two key personnel does not halt productivity. Two-person control reduces the risk of an individual threat and requires accountability during critical evolutions. Elifoglu points out that insider threats can be both intentional and unintentional and often the lack of training, loss of equipment, and non-work related browsing create devastating effects on the system (Elifoglu, 2018).The difference between passive and active attacks on a network is the invasiveness of the approach. Passive attacks do not attempt to interfere or disrupt while gleaning information. Active attacks are disruptive in nature and often attempt to steal information and damage the company. Thanks for reading.· TimElifoglu, I. H., Abel, I., & Taşseven, Ö. (2018). Minimizing insider threat risk with behavioral monitoring. Review of Business, 38(2), 61-73.Smith, R. E. (2016). Elementary Information Security, 2nd ed. Jones & Bartlett Learning.RESPONSE 2:Two extremely specific ways that enterprise versus personal computing is different is how each device can be updated and who has access rights to do just that. In an enterprise computing environment, if patches or updates are needed, one overarching administrator would generally download said updates and then forward them out to all respective devices within their network. For personal computing, one could be seen updating each device individually as they log onto each device and they would normally be set to auto update. Additionally, on personal computing the user may be signing into their network as the administrator every time. This gives attackers a huge advantage, if they can gain the credentials of said user, they would have complete control and access of their devices and information as the administrator. On the enterprise side of things, this is not the case. Users generally will not have administrative rights and therefor unable to make big changes, such as updates of software (Steinberg, 2017).Two techniques to combat or reduce insider threat are monitoring and job rotation. In monitoring, individuals would be less likely to perform insider threat attacks if they believe someone is monitoring their activity. It also helps double check periodic results and potentially scan and find unauthorized activity early. Job rotation is another technique in which individuals are only subjected to a job for specific time frames. This diminishes the time an attacker has in one specific area to devise and implement an attack (Smith, 2016).A passive attack is an attack on a network that does not directly interfere with communications. However, an active attack is an attack that directly interferes with one’s network. An example of a passive attack would be “disclosure”. Since disclosure is more or less eavesdropping, there is no specific attack on the network itself, they are just “listening” from afar. Forgery on the other hand is an active attack. If an individual eavesdrops on one’s communications, and finds out pertinent information, and they reciprocate with a fake or alters the original message to the end user, they are actively interfering with communication (Smith, 2016).ReferencesSmith, R. E. (2016). Chapter 13: Enterprise Computing. In Elementary Information Security, 2nd Ed. (p. 561). Burlington: Jones & Bartlett, LLC.Smith, R. E. (2016). Chapter 14: Network Encryption . In Elementary Information Security, 2nd Ed. (p. 606). Burlington: Jones & Bartlett, LLC.Steinberg, J. (2017, October 09). Five Key Differences Between Personal and Enterprise Endpoint Security. Retrieved from Security Intelligence: https://securityintelligence.com/five-key-differences-between-personal-and-enterprise-endpoint-security/NOAH
#Enterprise Computing and Network Encryption Responses
Management Information Systems is one of the various business information systems. It is vital to look at the various kinds of information systems available to businesses to comprehend management information systems better. Savvyessaywriters.net offers management assignment help for all students.
PLACE YOUR ORDER NOW
