Security Best Practices: Assessing the Essay

Total Length: 934 words ( 3 double-spaced pages)

Total Sources: 3

Page 1 of 3

Next, firewalls capable of blocking IP addresses need to be installed and used (Becker, Clement, 2006). The focus on these efforts is just the first phase; there needs to be a monthly audit of IP addresses in the departments where P2P file sharing has occurred to make sure it isn't happening again. This an be accomplished using a series of constraint-based configuration tools that will trap on P2P known client footprints or digital signatures and immediately block them (Hosein, Tsiavos, Whitley, 2003). This technology will also work to isolate any inside IP addresses which attempt to reach P2P client-based download sites and immediately log and block all IP activity for the address. This will make a given IP address inoperable and immediately delete it, which will make any subsequent hacking attempts of the system useless.

Stuck Writing Your "Security Best Practices: Assessing The" Essay?

This is precisely the strategy the U.S. Government is using today to ensure a very high level of system fluidity and integrity going foreword (Swartz, 2007). Finally all of these strategies must be brought together into a common framework which can be quickly implemented over time. The use of automated technologies to accomplish this will drastically reduce risk and cost, while increasing overall system performance (Risk Management, 2003). Blocking P2P sites and clients will further create a highly effective program for determining of sleeper clients are on the company network, deleting them if they attempt to communicate or if they are discovered (Swartz, 2007)......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Security Best Practices Assessing The" (2012, April 18) Retrieved May 16, 2024, from
https://www.aceyourpaper.com/essays/security-best-practices-assessing-56299

Latest MLA Format (8th edition)

Copy Reference
"Security Best Practices Assessing The" 18 April 2012. Web.16 May. 2024. <
https://www.aceyourpaper.com/essays/security-best-practices-assessing-56299>

Latest Chicago Format (16th edition)

Copy Reference
"Security Best Practices Assessing The", 18 April 2012, Accessed.16 May. 2024,
https://www.aceyourpaper.com/essays/security-best-practices-assessing-56299