This paper concentrates on the primary theme of Risk to information security arising from extending access to the Whitmann Price network beyond the business walls in which you have to explain and evaluate its intricate aspects in detail. In addition to this, this paper has been reviewed and purchased by most of the students hence; it has been rated 4.8 points on the scale of 5 points. Besides, the price of this paper starts from £ 40. For more details and full access to the paper, please refer to the site.
Question 1 Risk to information security arising from extending access to the Whitmann Price network beyond the business walls
Extending the network beyond the business walls increases the number of nodes that will have access to the data available making it more prone for the data to be accessed by more users. Increasing the walls also, means that the organization has created other platforms for other users and with every increase in the number of users the more the higher the level of vulnerability since risks are likely to emanate from all of these areas.
Question 2 primary tool used to minimize risks
The primary tool used to minimize risks is the use of firewalls. Firewalls block all the unnecessary ports hence preventing traffic arising from unknown ports. Firewalls monitor all the incoming requests to ensure they are from the known webservers. Most firewalls are also coupled with intrusion detection to prevent attacks or any intrusion attempts which have not been authenticated.
Question 3 Information Security Cost
Information security relies on much more than one’s ability to set specific limitations that might deny one some level of convenience. In real sense, it enables one to limit chances of vulnerability by ensuring the network will only be used for the functions it is required. For example, limiting people to use their phones outside working hours reduces the chance of the phones being stolen, which in essence minimizes chances of exposing the network since an hackers can use these gargets as patient zero.
Security policies and the rationale behind them
The policy of the bring your own device which limits individuals from using their own individual devices in the work place. Using personal devices exposes the organizations network to non trusted malware