To alleviate the poor protocol choice of WEP WPA2 Enterprise should immediately

To alleviate the poor protocol choice of wep wpa2

This preview shows page 15 - 18 out of 20 pages.

to the network. To alleviate the poor protocol choice of WEP, WPA2 Enterprise should immediately be put in place. The next thing to do would be to reconfigure the access points turning off SSID broadcasting. This will ensure that someone must be a current employee to know the SSID name and have a login name/ password. 15
Image of page 15
BYOD Policies- This allow employees to be more mobile, efficient, and flexible to move freely throughout the office spaces especially when working on projects with coworkers. However, appropriate policies need to be briefed to protect the network, customer data, and the employees themselves. This includes how employees access the network and what exactly they can access while connected. A relatively inexpensive way to enforce BYOD policies is have MDM software installed on devices. This involves the employees downloading an application that can be used to monitor company data accessed and how it is stored. Another key feature of MDM is the ability to remote wipe the device should it be lost or stolen. MDM also enforces security policies such as keeping devices updated and ensuring that a PIN is required to unlock the device. The average costs to deploy an MDM software is $30 per device for a yearly subscription. GFI can easily justify this price when considering the potential for mobile data being lost and the increase in employee efficiency by allowing them to work and access data. Implementing this also increases security for GFI. BYOD is completely voluntary for any employee. However, once they decide to take advantage of BYOD, they are subject to the policies in place. If an employee does not want an MDM application on their device, then they do not have to participate. Cloud Computing- This solution has a low risk associated with the company network but, the moment it is configured, the risk may magnify. This new capability will require that a DMZ be setup. This will exponentially increase network security for the company. The risks associated can be that of web-based attacks. To alleviate this, the web server hosting the company website will be placed within the DMZ outside of the internal network. This will certify that any traffic destined for the web server will not interact with the internal network. The only real costs 16
Image of page 16
associated with this would be to acquire another server to act as the web server hosting the website. Conclusion Global Finance Incorporated will continually be a victim to cyber-attacks and network breaches if they don’t re think the way they prioritize their IT department. The vulnerabilities talked about in this assessment pose significant threats to GFI and its customers. The company has been attacked in the past and need to put solutions in place to combat against this from happening again in the future. These breaches of security have come from multiple angles, meaning that vulnerabilities exist at different levels of the organization. This means that there is multiple weakness to exploitation available for internal/ external attackers to gain access to the network and extract valuable data that could cripple the company.
Image of page 17
Image of page 18

You've reached the end of your free preview.

Want to read all 20 pages?

  • Fall '14
  • GFI Software

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes