Tuesday, April 30, 2019

Cybersecurity Coursework Example | Topics and Well Written Essays - 1250 words

Cybersecurity - Coursework ExampleIt is important for Jacket-X to implement ways of detecting and securing networks so as to counter cyber threats vulnerabilities such as email spoofing, denial of service attack, malware intrusion, spywares, hackers as well as info and information thievery that are implemented through the network (Roberta Bragg, 2004).However there are several methods by which Jacket-X bottomland implement to avert these risks they include the following first is by Jacket-X ensuring the installation of firewalls. Firewalls comprises of hardware and software that controls the settle of data in and out of network. By utilize firewalls Jacket-X can be able to examine and corroborate address information on all packets of data as well as protect data stored in the network from unauthorized access (Roberta Bragg, 2004). It is therefore recommended for Jacket-X to put in place procedures and policies to allow for the fortnightly evaluation of firewalls and upgrades t hat involves the incorporation of current technologies to meet critical network risks.In the case of Jacket-Xs radiocommunication network, it would be advisable to enable WPA (Wi-Fi Protected Access) encryption to facilitate the protection of data that is transmitted all over a wireless network. WPA is considered more secure that WEP (Wireless Equivalent Privacy) because it utilizes dynamic key encryption.Also in nightspot for Jacket-X to gain control of their network from unauthorized access would involve the use of MAC address filtering. This technique is made possible by some routers to specify which computers can access the network (Roberta Bragg, 2004). This is facilitated by using a MAC address that comprises of unique series of numbers and letters assigned to every networking device. This would frustrate unauthorized access such as hackers from intruding the Jacket-X network.Another vulnerability posed by networks is the flying