2019-01-25T09:30:19+00:00

Risk to information security arising from extending access to the Whitmann Price network beyond the business walls

This paper concentrates on the primary theme of Risk to information security arising from extending access to the Whitmann Price network beyond the business walls in which you have to explain and evaluate its intricate aspects in detail. In addition to this, this paper has been reviewed and purchased by most of the students hence; it has been rated 4.8 points on the scale of 5 points. Besides, the price of this paper starts from £ 40. For more details and full access to the paper, please refer to the site.

Risk to information security arising from extending access to the Whitmann Price network beyond the business walls

Question 1 Risk to information security arising from extending access to the Whitmann Price network beyond the business walls

            Extending the network beyond the business walls increases the number of nodes that will have access to the data available making it more prone for the data to be accessed by more users. Increasing the walls also, means that the organization has created other platforms for other users and with every increase in the number of users the more the higher the level of vulnerability since risks are likely to emanate from all of these areas.

Question 2 primary tool used to minimize risks

            The primary tool used to minimize risks is the use of firewalls. Firewalls block all the unnecessary ports hence preventing traffic arising from unknown ports. Firewalls monitor all the incoming requests to ensure they are from the known webservers. Most firewalls are also coupled with intrusion detection to prevent attacks or any intrusion attempts which have not been authenticated.

Question 3 Information Security Cost        

Information security relies on much more than one’s ability to set specific limitations that might deny one some level of convenience. In real sense, it enables one to limit chances of vulnerability by ensuring the network will only be used for the functions it is required. For example, limiting people to use their phones outside working hours reduces the chance of the phones being stolen, which in essence minimizes chances of exposing the network since an hackers can use these gargets as patient zero.

Security policies and the rationale behind them

The policy of the bring your own device which limits individuals from using their own individual devices in the work place. Using personal devices exposes the organizations network to non trusted malware


100% Plagiarism Free & Custom Written,
Tailored to your instructions


International House, 12 Constance Street, London, United Kingdom,
E16 2DQ

UK Registered Company # 11483120


100% Pass Guarantee

Order Now

STILL NOT CONVINCED?

We've produced some samples of what you can expect from our Academic Writing Service - these are created by our writers to show you the kind of high-quality work you'll receive. Take a look for yourself!

View Our Samples

FLAT 50% OFF ON EVERY ORDER.Use "FLAT50" as your promo code during checkout