Mamadou Diallo’s Expanded definition of computer Network Simulation and Network Security Auditing in A Spatial Context of An Organization (CNSNSASCO)

To: Prof. Ellis
From: Mamadou Diallo
Date: 03/26/2021
SBJECT: Expanded definition of Computer Network simulation and Network security auditing in A Spatial Context of an Organization (CNSNSASCO)

Introduction

Computer networking is the current mode of operation for most organizations today. The flow of information within and outside organizations is done using computer devices. The growing concern for the use of computer networking is data security and computer simulation. Some of the commonly used terms that address computer network security include Breach, firewall, and malware. A breach is a term used to refer to when a hacker has successfully accessed complete control of a computer device or a network. A Firewall is a software program that is put in place to prevent any corrupt or unauthorized access to a computer system or network. Finally, our main focus area, malware, refers to that malicious software that corrupts and destroys a computing device or network.

Definitions

The term malware is a broad description of specific malicious programs that include viruses, trojans, worms, and spyware(Bazrafshan et al., 2013). Although there is more malicious software affiliated with malware, we will focus on the four examples named above. The four are the most common types of malware that affect the network of an organization. Some of this malware can originate from within the organization, usually known as micro threats, or can come from outside the company, usually known as macro threats. Most of the macro threats come from competitors, government regulations, technological changes, and customer’s changes in taste and preferences. The micro threats originate from malicious persons inside the company or outside persons like hackers and crackers who might infect computer devices and networks with viruses, trojans, and worms.

Context

A computer virus is a malicious program that corrupts data in a computer. A computer virus, just like a human virus, can transfer itself from one computer to another. Computer viruses are dangerous to any organization and can make a company cone’s normal operations to a stand-still. When a computer virus finds its way into a company’s network, it might lead to a series of problems. A computer virus can erase important data from the company’s website, and it can also steal and manipulate secure information from the organization’s network(Misra et al., 2014). A virus can freeze the normal functions of a computer, which will alter the effectiveness of the device in the company. Therefore, to prevent a network from being infected by a computer virus, most companies have opted to use anti-virus programs and set up strong firewall systems to prevent the virus from affecting the computer network.

A trojan horse malware is a computer malware that allows hackers to access a computer using a back door like the historical trojan horse in the Greek stories that was used deceptively to lead to Troy’s fall. A trojan horse malware comes in the form of a computer application or program that the user downloads or installs in their device, unknowing its hidden intention (Nari & Ghorbani, 2013). The malware may pop-up as ads or emails that were not expected and once, they have been opened or installed in the device, they can be used by cyber thieves or hackers to breach the system or computer network. Therefore, employees who handle computer devices in an organization should be advised not to open any unnecessary online files or applications using its devices. 

A worm is a computer is malware that replicates itself to other computers in the same system. A worm is one of the most common malwares in computer network security. Unlike a virus, a worm can make copies of itself to other computers in the network, but a computer virus requires a host to move from one computer to another. A worm focuses on exhausting a shared network’s bandwidth and hard drive (Bazrafshan et al., 2013). Therefore, making copies of itself can fill up the hard drive with unnecessary files that will cause the network to overload and eventually collapse if unattended.

Additionally, a computer worm can steal and manipulate data in a system. Usually, a worm finds its way into a system through spam files and emails that were not expected. Therefore, IT experts advise staff to avoid using and opening up unexpected files using the company’s computers.

Spyware is another type of malware used to spy on the user without the user’s knowledge. Cyber thieves can use spyware malware to steal information from a device and corrupt data from a shared network while using the user’s data. Spyware malware is so malicious that hackers can use it to incriminate someone using their personal information(Misra et al., 2014). Spyware can track down someone’s personal information, including social media content, credit card statements, and identity. Therefore, when one realizes that spyware malware has infected their device, they should use anti-spyware removal software to ensure that their devices are free from foreign eyes.

Working Definitions

In conclusion, malware is one of the commonly used terms in computing today to address the aspect of computer network security. Therefore, since cybersecurity has become one of the main concerns in most organizations, it is necessary to address these malware issues and develop solutions to prevent such infections in organizations’ computer networks.

Reference

Bazrafshan, Z., Hashemi, H., Fard, S. M. H., & Hamzeh, A. (2013). A survey on heuristic malware detection techniques. IKT 2013 – 2013 5th Conference on Information and Knowledge Technology, 113–120. https://doi.org/10.1109/IKT.2013.6620049

Misra, A. K., Verma, M., & Sharma, A. (2014). Capturing the interplay between malware and anti-malware in a computer network. Applied Mathematics and Computation, 229, 340–349. https://doi.org/10.1016/j.amc.2013.12.059

Nari, S., & Ghorbani, A. A. (2013). Automated malware classification based on network behavior. 2013 International Conference on Computing, Networking and Communications, ICNC 2013, 642–647. https://doi.org/10.1109/ICCNC.2013.6504162

Summary of Andrzej J. Zaliwski “Computer Network Simulation and Network Security in a spatial Context of an Organization”

TO: Professor Jason W. Ellis.

FROM: Mamadou Diallo

Date: 03/03/2021

SUBJECT: 500-Word SUMMARY of Article about Computer Network.

Competition in the current world’s business organizations has been a helping factor to push many of them to advancement. Businesses operate under the micro and macro environment. The two environment types act as forces toward the scope of changes within the organization. Zaliwski (2005) wants to communicate to such organizations concerning the Computer Network Simulation (CNS) and Network Security Auditing (NSA) that would follow the spatial pattern. In the article, Zaliwski (2005) informs that the micro issues require immediate attention from the management system. The disruption of the business organization operations by macro-threats such as the government and the competitors is under check by the law and customs. However, the micro-level of threats involves those who are not satisfied by the laws and rules that govern the procedures. An example is the computer network threats. Therefore, the suggestion would be to have professionals who have the skills to manage the computer networks that, from the nature of the current system, must wipe out its complexity of the security-related software and easing of the security auditing methodologies. Zaliwski (2005) reports that the complexity of the system and the hardness of the methodologies make it uneasy for the staff to apply it. The proposal does not neglect that the security model must align to the policies and the procedures of the organization and working hand in hand with the organizational structure (Zaliwski, 2005). Although security systems are critical to the organization’s operations, they need to be simple for usability and easy to interact with. Besides, it needs to be cheap and involving an effective and less expensive laboratory. The use of the laboratory, in this case, is research and teaching sessions for the advancement of security system related to the computer network.

As per Zaliwski (2005), the possible method to arrive at the goal is to create a virtual computer network in a physical lab. That would mean a shortening of the physical computer chains that would have added expense to the system. The system would work with open source, commercial and rare solutions. Also, the system would require graphical network visualization. It would help the professionals to understand the data connections (Zaliwski, 2005). Besides, software for network design and administration and the management part would be necessary for the system to be effective. There is no other system that would work better except the one that involves three sub-systems. They include the spatial models, the repositories, and the virtual networks (Zaliwski, 2005). The entire system would require three computers where one would serve as the host for all virtual machines. The User Mode Linux is the creator and maintenance operator of the computer. The second would connect to the virtual world, while the third would design and keep data for auditing purposes. The system that Zaliwski (2005) describes is a lightweight one and simple for the professional use. Also, the system is cheap and affordable from the micro-business firms and the teaching departments. The auditing methodologies would be simple, unlike the existing systems that keep the professionals scratching their heads. Therefore, the solution is to move the network lab from physical to virtual.

Reference

Zaliwski, A. J. (2005). Computer network simulation and network security auditing in a spatial context of an organization. Informing Science: International Journal of an Emerging Trans discipline2(7), 159-168.