In this report, our time will provide measures for the protection of the company's network from malicious invasions. In this paper, our team will suggest activities in the case studies include configuring firewalls, antivirus products, password, user accounts, and security settings on web browsers, encryption policies, FTP configuration and an FTP folder that the senior partner can administer. These will be detailed in the report and presentation, out purpose in which is to get the authority to make the necessary changes while reassuring the employers that the restrictions are beneficial and will not prevent work being done.
Case Analysis
Our team provides operational technical support to an international law firm. The lawyers frequently contact each other via e-mail, use the Internet to research cases, and use listserve groups to discuss recent cases and developments in international law. However, the initial proposals to do this have caused some concern among employers. In addition to wanting a way forward that enables the lawyers to carry out their job functions, a specific important request needs attention, as it is seen as typical of the sort of service that need to be provided. Occasionally, a senior partner needs to make a large legal document available to an overseas customer. However, the document contains sensitive information, it is too large to send via e-mail, and the senior partner is expecting an amended document in return. The senior partner wants the document to be available in electronic format to only himself and the customer.
In this report we will suggest measures for the protection of the company's network from malicious invasions, and limit the lawyers' access to the Internet and newsgroups.
Discussion
In times of global informatization, social networks, and ubiquitous e-mailing of spam, there also exist issues related to privacy of personal information, identity theft (called phishing), and other cyber-threats. We should be aware of what dangers await us in the network and how to defend against them (Zwicky, 2000).
Nowadays, the Internet provides us with an ever wider range of possibilities, new technology or functionality, but thus entails more dangers. Over the years, it has changed the motivation of hackers, there goal, now, is to profit by using targeted, personalized attack. Their main activities include: data theft, destruction of the brand, and gain access to accounts, credit cards and personal information. People who go online for what have become daily activities, send an email, write blogs, post photos and information about themselves on social networking sites, ' not realize all the privacy that may be giving up (Janczewski, 2000). They also fail to fully understand how far they are inviting the deception, embarrassment and damage-perhaps decades to come-when others dredge up "digital dirt." In addition, legal experts warn that although the laws already provide criminal and civil remedies in the event of offensive use of personal information, courts have not yet addressed the different ways the Internet can be harnessed for questionable purposes that invade privacy. Following are the suggested measures for the protection of the company's network ...