Get premium membership and access questions with answers, video lessons as well as revision papers.

You are a manager in one of the leading accounting firms in the country. You have been registered as a network user on the company's...

      

You are a manager in one of the leading accounting firms in the country. You have
been registered as a network user on the company's local area network (LAN) which
enable you to send memos by electronic mail. You are however concerned about the
security of the LAN.
Required:
(i) Explain four administrative controls that should be implemented to guarantee
the network security. (6 marks)
(ii) Describe two methods or techniques used to secure the electronic mail
messages being transmitted through the network.
(iii) Explain three policy issues that should be put in place to reduce virus-rom
attacking your network.

  

Answers


gregory
(i) Administrative controls that need to be implemented:
1. USE OF COMPETENT PERSONNEL
This reduces the risk of data being lost or equipment being damaged due to
incompetence.
2. ROTATION AND DIVISION OF LABOUR
Network control functions should be separated and duties rotated on a regular basis.
Division of labour ensures that the network control is performed effectively.
Rotation of duties reduces the risk of sabotage by staff members since such an
attempt would require that the staff member be in charge of the given duties for a
considerable period of time.
3. AUDIT TRAIL REVIEW
Audit trails should be reviewed periodically by operations management to detect any
unauthorized network operation activities.
4. DOCUMENTATION AND REVIEW OF STANDARDS
Network operation standards and protocols should be documented and made
available to the operators and should be reviewed periodically to ensure compliance.
5. MONITORING
Network access should be closely monitored and reviewed by system engineers to
detect unauthorized access.
(ii) Techniques used to secure e-mail messages:
1. DATA ENCRYPTION
The e-mail messages could be encrypted (converted into a coded form) by a code before
being sent. At the receiver‘s end, the messages are decrypted before being read. This
technique would prevent eavesdropping.
2. DIGITAL SIGNATURES
This works together with the principle of data encryption to guarantee authenticity of e-
mail messages and thus avoid falsified sender‘s identities. The sender adds a digital
signature to the message being sent. A digital signature is issued by certificate authorities
which certify the credibility of an individual communicating over the Internet. Digital
signatures thus provide assurance that the sender of a message is really who he claims to
be.
o Policy issues
Antivirus software should be installed on all the computers on the network to detect
and cleanout viruses.
Floppy disk drives could be disabled to reduce the risk of viruses being brought to the
computer through diskettes.
Have vendors run demonstrations on their machines and not the company‘s machines.
Allow no disk to be used until it has been scanned on a stand-alone machine that is
used for no other purpose and is not connected to your network.
Update virus software scanning definitions frequently.
Write protect all diskettes with .EXE or .COM extensions.
Enforce a rule of not using software without first scanning the shareware thoroughly
for a virus.
Scan any new commercial software before it is installed since commercial software is
occasionally supplied with a Trojan horse.
Create a special master boot record that makes the hard disk inaccessible when booting
from a diskette or CD-ROM. This ensures that the diskette or optical media cannot
contaminate the hard disk.
gregorymasila answered the question on November 22, 2017 at 10:44


Next: On coming back from a fact finding mission about a company in need of automating its sales department, your supervisor hands over a report to...
Previous: 1.2 liters of hydrogen gas produced at room temperature and pressure when 3.27 g of zinc was used.Determine the...

View More Computer Science Questions and Answers | Return to Questions Index


Learn High School English on YouTube

Related Questions