(855) 4-ESSAYS

Type a new keyword(s) and press Enter to search

Network Security Measures and Recommendations


We shall base our discussion on the widely used higher level protocols since this is an e-commerce business service provider.
             Examples of common protocols in the market include; FTP which facilitates transfer of files, TCP, UDP, HTTP and VPNs (Mitchell, 2014).They are all designed to serve a particular purpose.These internet protocols are instrumental in providing a wide range of services from handling security problems and ensuring that fast growing, private owned businesses having multiple branches are able to securely communicate through the internet. The fact that a business will have to connect to the world wide web in its daily transactions exposes it to security issues which should be given utmost importance. The ease at which people can communicate online has enhanced the high rate of internet crimes which mostly target unsuspecting users of credit cards and companies involved in credit card transactions. The internet has provided a platform for criminals to exert profound effects by at the click of the mouse without necessarily having advanced computer programming skills by simply hacking security system protocols employed. There are always human errors in softwares resulting from coding and these cybercriminals will always find their way to hack the security systems in place. The resulting consequences may be adverse,they will result to banks losing billions of dollars as a result of fraud. What may follow will be filing a lawsuit against a company that processes the credit cards.
             3. Detailed Network Security Recommendations.
             3.1. Fundamentals of Firewalls and VPNs.
             Firewalls are software that come are incorporated within most computer operating systems. Its work is to ensure that computers within the business are protected from the adverse effects of cyber crimes such as blocking employee access to certain fraudulent websites and preventing hackers from accessing from penetrating the network protocol of the business (Tyson, 2014).


Essays Related to Network Security Measures and Recommendations


Got a writing question? Ask our professional writer!
Submit My Question