Tuesday, February 25, 2020

Computer Network Security Case Study Example | Topics and Well Written Essays - 1250 words

Computer Network Security - Case Study Example In order to protect digital information, organizations are keen to implement technical controls such as firewalls, Intrusion Detection Systems, honeypots and Demilitarized zones. These controls are considered as logical and provide security on the logical layer. However, often the important aspect i.e. information security management is not addressed to the optimal level. A typical information security program is led by an information security manager who establishes a steering committee for discussing security aspects focusing not only on the IT department but every department within the enterprise. Some of the management controls that are implemented by the information security manager are IT governance, Risk management, monitoring Key Process Indicators (KPI) and Key Goal Indicators (KGI). KPI demonstrates the current state of security within an organization and KGI demonstrates the level of security to be achieved. As per the current scenario, critical data must be protected by i mplementing Firewalls to secure the network from external logical threats and Virtual Private Network will be implemented for securing the data transmission on the Wide Area Network. 2 Detailed Network Security Recommendations 2.1 Fundamentals of Firewall and VPN Network security appliances are implemented for providing three fundamental functions i.e. prevention, detection, and correction. Some of the most commonly adopted security appliances are Firewalls and Intrusion Detection Systems. Firewall is defined as â€Å"a piece of software or hardware device that ? filters the information coming through the Internet connection into a private network or a computer system. Firewall enforces an access control policy between two or more networks with two key functions: to block unwanted traf?c, and to permit wanted traf?c† (Firewall.2007). Similarly, as per network dictionary, Intrusion detection system is defined as â€Å"Intrusion detection system (IDS) is a type of security man agement system for computers and networks. An IDS gathers and analyzes information from various areas within a computer or a network to identify possible security breaches, which include both intrusions and misuse†. 2.2 Recommendation for Firewall and VPN Remote access ‘VPN’ provide emulation of a workstation to a remote user. It can extend every application related to data, video or voice communication. Remote access ‘VPN’ can provide highly customizable and secure remote access to employees anywhere anytime with any compatible device (Vachon & Graziani,). They can access the network resources and data access with any compatible device. The remote access ‘VPN’ portrays a realistic user experience as the user access his own system. The access is more flexible and easy because it can be operated by any compatible computing device. Remote access ‘VPN’ supports a wide variety of connectivity options and platforms, fulfilling the user requirements efficiently. 2.3 Recommended Solution for the Enterprise-A recommended solution for the enterprise will be a hardware-based firewall that is also called as Adaptive Security appliance ASA 5500 from Cisco. The ‘Cisco ASA 5500 Series Security Appliances’ personalize the security for specific network requirements such as securing credit card transactions.  

Saturday, February 8, 2020

How Samsung Electronics has established its current presence Assignment

How Samsung Electronics has established its current presence - Assignment Example Previous concentration fields include mobile privacy, Internet of Things, clouding communication, and human interface. Businesspersons and inventors will achieve access to Samsung’s distinct ecology and capital. Intense connections inside Samsung’s institutional network both in Asia and across the globe will be required to face the next round of rivalry in the electronics segment. Asia has a fundamental destination for Samsung’s direct investment for several reasons. The company objectives and goals include recovering cost competitiveness by using the low-priced capital accessible in Southeast Asia. Samsung as well is interested in pursuing various chief consumers for its components as some of the world’s most active market. But the weakness of Samsung’s performance in the consumer products segment means that it has established itself with surplus capacity in its offshore affiliations. In reality, this means that the overseas associates are underuti lized, despite the skill to enhance cost competitiveness, since Samsung’s worker assessment structure is slanting towards performance at the plant status (Mortinik, 2012). According to Bloom (2002), Koreans electronics corporations have been assertively engaged in culture and knowledge accumulation over the past two decades. Their consumer products, including color television sets (CTVs), videocassette records (VCRs), and microwave ovens, were capable to remain competitive in the low-end sector of the global markets till the late 1980s. As a result, this created the cash flow required to endorse of more improved technologies. In the current years, nevertheless, Korean products are achieving growing rivalry, especially from Japanese manufacturers that have recuperated their competitiveness by investing in low-priced overseas manufacturing. Growing offshore manufacturing has been a chief part of Korea’s tactic reaction. Korean products channels in Asia now go beyond the ASEAN region to China and India. The overall percentage of offshore production to total production has grown tremendously in current years, from nineteen percent to twenty-seven percent for CTVs from sixteen to seventeen percent for VCRs during the phase 1922-1994. Nevertheless, those of the Japanese electronic competitors grew even rapidly, from 67 percent to 86 percent for CTVs and from 36 to 71 percent for VCRs during the same phase. This as a result kept the rivalry deep in the cost-fueled struggled for low-end markets. In the year 1993, three chief Korean manufacturers, Goldstar, Samsung and Daewoo, declared their objective to expand their offshore production quotient from a standard of 20 percent in 1993 to 60 percent by 2000. This paper will focus on how Samsung has managed to maintain its international presence. The firms involved are all components of Samsung Group, an exceedingly diversified multinational. The key electronic manufacturer is Samsung Electronics Co. SEC and its liaison corporations are Samsung Electron-Devices Co. (SED), Samsung Corning Co.(SC) and Samsung Electro-Mechanics Co. (SEM). Lee Bung-Chull first incepted Samsung in 1938, and its primary line was trade. The business operation has persisted to be essential, first with imports, and latter export, beginning in the mid 70s. By