risk assessment of network

85 views 3 pages ~ 595 words Print

Organizations have taken great strides in developing their activities over the years. Organizations also recognized the role of operational productivity and success in producing the highest possible outcomes. The availability of secure network equipment is one of the main pillars in achieving performance. A network, according to Curtin (1997), is a structure that connects multiple activities within an enterprise and is enabled by the interconnection of coordinated network devices. Network devices in a team play an important role in ensuring that all processes are interconnected. It provides support to multiple departments, and it plays a significant role in the storage and accessibility of timely information. According to Runhua, Lingjia, Krishna, and Hongxiang (2013), efficient use of the network devices leads to proper utilization of resources. It is therefore essential to have secure and all the network devices efficiently to ensure that the funds are well utilized and organizations goals are achieved.

The network devices need to be examined individually and as a group to identify the various security measures to be put in place to ensure that it is safe. According to Canavan (2001), network devices play an essential role in making sure that organizations assets are secure, that the organization is competitively ahead of its competitors due to efficiency and in making sure that the companies are compliant with the various legal requirements. It is therefore essential to incur the cost and invest resources into an efficient network device.

To ensure that the network devices are secured, crucial processes in the system should be identified to look for ways to set a control measure. According to Canavan (2001), the assets should be classified based on the role they play in the organization, the weakness of each device, the risk that the system is exposed to and the estimated value in case the threat happens. This classification will then be used to identify each risk that the system is exposed to, its effects and the measures available which can be taken. The proposals considered will be implemented accordingly to help secure the network devices leading to smooth running of the organization.

Classification of assets helps the organization determine the role the asset plays in the team and the weaknesses which might cause the asset not to function correctly. It also helps the group be able to evaluate the defect of network design, implementation and how it runs. The value that the assets add to the organization is vital in establishing the areas the team needs to put the control to maximize benefits and minimize losses.

There are various security measures which must be put in place. These security measures are critical in ensuring that all the network devices are working optimally. Adoption of the security measures goes a long way in ensuring that the organization does not incur unnecessary costs. The measures include controls which establish secured access, secured usage, and secure information. Secured access ensures that only authorized personnel can access to prevent hacking of the system. Secure usage ensures that no one uses the system for a purpose which was not intended while secure information ensures that information is kept safe and used in achieving organizations goals only. By implementing these three controls and organization can secure its system and make its operations stable.

References

Canavan, J.E. (2001), Fundamentals of Network Security, Artech House Publishers, Artech House, Boston, MA.

Curtin, M. (1997). Introduction to network security. Kent information Inc.

Runhua Chen, Lingjia Liu, Krishna Sayana, and Hongxiang Li, “Energy-Efficient Wireless Communications with Future Networks and Diverse Devices,” Journal of Computer Networks and Communications, vol. 2013, Article ID 897029, 2 pages, 2013. doi:10.1155/2013/897029

December 21, 2022
Subcategory:

Workforce

Number of pages

3

Number of words

595

Downloads:

61

Writer #

Rate:

4.6

Expertise Computer
Verified writer

JakeS has helped me with my economics assignment. I needed an urgent paper dealing with Brexit. JakeS has been awesome by offering an outline with ten sources that have been used. It helped me to avoid plagiarism and learn more about the subject.

Hire Writer

Use this essay example as a template for assignments, a source of information, and to borrow arguments and ideas for your paper. Remember, it is publicly available to other students and search engines, so direct copying may result in plagiarism.

Eliminate the stress of research and writing!

Hire one of our experts to create a completely original paper even in 3 hours!

Hire a Pro

Similar Categories