|Perfect Number of Pages to Order||5-10 Pages|
Harry and Mae’s Recommendation 2 Essay
HARRY AND MAE’S RECOMMENDATION 2
Harry and Mae’s Recommendation
Running head: HARRY AND MAE’S RECOMMENDATION 2
Running head: PERSONAL INFORMATION AT RISK
Harry and Mae’s like any other contemporary organization which makes use of the most recent and sophisticated technology may suffers set back as a result of cyber attacker who make use of the existing flaws in the system. The data breach that this organization suffered came as result of vulnerabilities present in the network System (Ravji & Ali, 2018). Therefore, the network system needs redesigning to incorporate the latest technology that prevent the most advanced data breaches. The network or any system used in any organization requires regular updates to implement strategies that ensures that existing vulnerabilities that were not discovered initially have been corrected.
Through close analysis of the case study, one of the ways through which the intruder accessed the organization network is through the Wi-Fi connection vulnerabilities which is a gate to the organization. The organization also did not implement strong security policies that prevent organization resources by individual with bad intention on the organization resources. therefore, the first step in securing the organization resources by Harry and Mae’s franchise is through the establishment of proper security policies that guard the passwords from sophisticated data breaches (Ravji & Ali, 2018).
I have included Ethernet wired network connection in additional as my recommendation to the wireless connection that was in my earlier diagram. The new wired connection adds more security features as those devices are only privileged to access the resources in the network. Also, I have included additional firewall to prevents suspicious traffic from the internet.
The audit of the network resources is one of the recommendations that should be conducted to identify areas that intruders might use. Therefore, the strategies might be put in place that prevent the attacks from the outside. The intrusion detection system installation in the network is one of the recommendations that should be used to alert the management in an event when the intruder tries to access the network. I addition, the intrusion detection system can also be installed to allow the organization to prevent attack launched by the attacker (Pathan, 2016). Last, the organization should contact regular test on the network to identify vulnerabilities and correct them before the attacker realize their existence and make use of them.
Pathan, A. K. (2016). Security of Self-Organizing Networks: MANET, WSN, WMN, VANET. Boca Raton, FL: CRC Press.
Ravji, S., & Ali, M. (2018). Integrated Intrusion Detection and Prevention System with Honeypot in Cloud Computing. 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE).
GET THIS PROJECT NOW BY CLICKING ON THIS LINK TO PLACE THE ORDER