Explore BrainMass

Secure Business Networks

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

Discuss the security of the network and suggest best practices for securing the business network.

© BrainMass Inc. brainmass.com October 24, 2018, 11:23 pm ad1c9bdddf

Solution Preview

Security Characteristics
The need of security for the network is to ensure,
1. Integrity
2. Authenticity
3. Authentication
4. Authorization
5. Secrecy
6. Trust

Best Practices
The data integrity is to ensure that transmitted or conveyed data are not corrupted and deformed. In transmission physical memory and transmission media are involved. The corruption of physical memory can be easily detected and rectified. To ensure the transmission media is intact, transmitted data matches an accompanying checksum. Error Correcting Coding (ECC) and Cyclic Redundancy Checking (CRC) are fundamental coding and integrity checking mechanisms of most computer systems.

If an office receives a message from a customer submit a document for car registration, the office has to make sure that the message has been sent from the actual customer and not an impostor or intruder. A ...

Solution Summary

This response provides suggestions for securing a business network.

See Also This Related BrainMass Solution

Describe the security monitoring activities that should be conducted in an organization.

Describe the security monitoring activities that should be conducted in an organization with both internal IT (payroll, human resources, inventory, general ledger, and so on) and e-commerce (Internet sales and marketing) applications. Include the rationale supporting each monitoring activity you propose and any recommended course of action to be taken when a significant risk is identified.

View Full Posting Details