Friday, February 21, 2020

Network Security and Different Ways to Secure Networks Essay

Network Security and Different Ways to Secure Networks - Essay Example The researcher states that assigning a password and an ID to a network is often called one-factor authentication while the two-factor authentication has often been identified when the account or network is secured by a security-token for e.g. an ATM Card or a mobile phone; and the three-factor authentication is distinguished by the use of the security measures such as a fingerprint or a retinal scan (de Jong et al, nd). It can be further secured by a firewall so that it could only be available to specific users of that network. Most of these utilities are being used by banks, armed forces, and, intelligence agencies etc. The Need for Network Security In practice, network security is an important part of many networks at homes, at public places, at colleges and universities and at various offices such as banks, stock exchanges, all kinds of multinational firms and other businesses, law enforcement agencies and even the Government offices and departments where important information is stored. The level of security needed and indeed, in use, varies from network to network and it depends on things such as the sensitivity of the data, the structure of the network, the size of the network and the threats to the network. A home user, for example, may not need to employ the same in-depth means of securing the network as, for example, a large multinational bank would. The reason for that is that there’s less sensitive data on a home network, there are fewer threats and there is not much at risk compared to the network of a bank. Now let’s take a look at the history of network security. The need for network security has been around since the time computers have existed, although this need was further emphasized after one of the most famous computer hackers of the world, Kevin Mitnick was arrested and convicted in 1995. Even before that, there were reported crimes related to computers and networks. The requirement for networks and networked computers to be s ecured was further enhanced after the Internet was made publically available in the 1990s. And gradually, in order to protect against loss of intellectual property, monetary loss, loss of sensitive customer data, invasions into personal privacy, disruptions to the working networks of large multinational firms and banks etc, further ways to secure the networks are being implemented. There are various ways in which the security of a network can be breached. In broader terms, the attacks can be categorized in two forms first one is a passive attack in which the hacker disturbs the travelling of data using the same network and in active attack the hacker uses different commands to change the network’s normal working. Both these attacks can have various forms. Some examples are Wiretapping, Idle scan, Port scanning, a Denial of Service attack, spoofing, ARP poisoning, smurf attack, heap overflow and SQL injection. Further to that, other forms of attacks such as Trojan Horses, Viru ses, Worms or Logic Bombs are also sometimes used. Ways to Secure Networks Securing a network depends on the type of network structure in place and the level of security which needs to be implemented.

Wednesday, February 5, 2020

Employment Laws and HRM Strategy Essay Example | Topics and Well Written Essays - 1500 words

Employment Laws and HRM Strategy - Essay Example HRM strategy refers to a particular approach that is used in the management of human resources with the aim of providing a strategic framework to support short and long term strategies of an organization (Dessler, 2010). Employment law is one of the essential functional areas that provide organizations with the foundation for effective development of workforce that will support the organizational goals and objectives (Moran, 2007). In order to have a better understanding of the subject of employment laws and HRM strategy, this essay will apply the employment laws of the Virginia State to one of the HRM strategy problems. In particular, the essay will apply the employment laws of the Virginia State on the HRM strategy problem of introduction of new technology for employees who may experience physical limitations. The subject of physical limitations of employees is one of the most comprehensive in the employment laws in the United Constitution. This issue is covered under the Americans with Disability Act (ADA), as well as under the U.S Equal Employment Opportunity Act (EEOA) (Walsh, 2012). The ADA is designed to protect the rights of people with physical limitations including in the employment environment. This Act provides framework within which people with physical limitations can fully access and participate in all aspects of employment. It requires that employers should provide facilities and means through which employees with disability can access and participate in activities with as little difficulty as possible. The Act requires that the employer should do enough to remove the barriers that might deny people with disability with equal opportunity in accessing and using the facilities and services within an employment set up (Dessler, 2010). The provisions of the ADA are enforced by t he U.S Equal Employment Opportunity Commission. The employment laws related to this subject prohibits employers against discrimination of any kind to