a transmittal letter

There is an increased demand for internet in the world, which can be attributed to the increased usage of smartphones, personal computers, and cyber cafes, which mainly use routers to provide internet to customers through their phones or personal computers, as well as devices present in the cyber café. This paper provides guidelines for increasing protection on accessible internet sites, as well as the advantages of enhancing internet security and how this can improve business growth.
It combines primary and secondary studies. The purpose is to get cyber café owners as well as internet providers a quality control method as well as how they can increase the number of customers in the business for more income.



The internet provides many benefits. When people use the internet, they get a lot of information they need for business development as well as personal use such as communication with family members through the internet provided at a cyber café or global internet providers.

My research shows that increasing internet safety in cyber cafes through use of internet routers and how this router can be used to provide a firewall due to exposed systems on the internet. Additionally, it will help provide information to people on how they can increase their product



Executive Summary

Purpose and method of this report

Many people nowadays have smartphones, tablets, and PCs. Most of these gadgets use the internet mostly provided by internet providers which may include a cyber café; these people use internet require security when they are using it for the safety of business transactions as well as security for their gadgets when using them in cafes, this may include even privacy. The purpose of this report is to:

Examine the benefits of a reliable internet which is fast.

Recommend ways of improving security in a cyber café from personal safety to internet and data security.

Installation of software programs which will boost the company’s performance



First, I conducted primary research by interviewing a few of the residents around a cyber cafe and also people who often visit cyber café to use personal gadgets to see if they agree with the idea of a secure and reliable internet system. A review of the literature on internet security is provided to show the benefits this community would receive by having a stable internet in cyber cafes.

Second, I also used material from secondary sources such as journals, books, magazines to get a better understanding of the impact that the installation, upgrade and maintenance of the company’s software. Hence achieving secure information and data technology systems in an organization such as the cyber café which is the scope of the study.









Table of Contents

Transmittal letteri

Executive Summaryi

Purpose and method of this reporti

1.0 Introduction1

1.1 Discussion of findings3

2.0 installing company firewall and software4

2.2 Firewall Log Analysis5

2.2.1Unlock the real value of your security devices5

2.2.2 Attractive TCO and rapid ROI5

2.2.3 Meet dynamic business needs quickly6

2.2.4 Productivity improvement for IT / MSSP6

3.0 Recommendations and action steps.6

3.0 Conclusions7

References ……...………………………………………………………………………………...9









1.0 Introduction

A firewall is a computer security device situated between a small business's internal network and the Internet. It can work at either the software or the hardware level to prevent unwanted outside access to the company's computer system. A firewall gives you a single chokepoint through which all incoming and outgoing Internet traffic must pass, allowing you to control traffic, the firewall acts as a guard, identifying each packet of information before it is allowed to pass through. It is one of the most effective forms of protection yet developed against hackers operating on the Internet. (Dhs)

Any individual or small business that uses a computer to connect to the Internet is vulnerable to attacks by hackers. But some computer systems are more susceptible than others. Emery noted that firewall protection is most important for businesses that use more than one computer for Internet access because it is more challenging to secure multiple connections. In contrast, a firewall may not be necessary for a person who uses a single computer in a home office and has dial-up Internet access through a modem. The temporary and unpredictable nature of this type of connection makes it an unlikely target for hackers.

Although firewalls have some potential advantages, they do not provide reliable protection and also have some possible disadvantages. Firewalls cannot protect against computer viruses or data theft by authorized users of a company's computer network. Also, firewalls can be expensive for small businesses to purchase and maintain, and they do require technical expertise for proper installation. Furthermore, firewalls may limit a company's access to some Internet services or make the Internet less convenient or slower for employees to use. (EQ-Inc)

Some small businesses avoid the need for a firewall by using a simple security measure. However, this means that the company's computer network is kept entirely separate from the Internet. One method of air gapping involves accessing the Internet only from a standalone computer that is not connected to the internal network and does not contain any confidential information. Another method includes the running Web servers that outsiders can reach on a secure system belonging to an Internet Service Provider.

There is an increased rate of technology growth in the world; this means that so many people are increasingly using technology mainly to get some information, this may include improvement in the rate of smartphone usage. People including children have smartphones, tablets, PCs which require data to get to the browser, some social sites are also using data services to connect people, this may include what’s app, Facebook and many others which require data services to be accessed.

Increased use of technology has led to an increased rate of cyber-crimes, this may include hacking of a personal account and use it for extortions, people don’t feel safe visiting a cyber café due to increased rate insecurity both on the internet and also from people who attend these cyber restaurants. Children also don’t participate in such places due to the perception they get from their parents; most parents have not embraced the new technology and view it as an enemy to the children.

Improved and installation of software and firewalls in cyber cafes will significantly reduce the rate of crime related to cyber cafes. Children who visit cyber café also checked regularly, and all the computers found in cyber cafes keep in a safe search mode, this ensures they do not see pornographic images rather than studying, the problem of fearing security of their gadgets, as well as their personal information, will be guaranteed. The information people get from the internet is valuable information in business development.

1.1 Discussion of findings

Many of the residents interviewed recognized the importance of the internet in their day to day life, the creation of a secure and reliable network and how it would help improve business to these cyber cafes. Residents would feel safer visiting a cyber café with their gadgets and when assured of these gadgets security. Research shows that developing cyber café security will:

Improve productivity of a customer

Allow people to communicate with their loved ones quickly and better.

Help people gain knowledge through information they get from the use of the internet.

Increase number of customers visiting these cyber cafés to use the internet.

Maintaining data integrity

Reducing the risk of intruder attacks

Improvement of cybersecurity will improve the quality of services offered by a cyber café, this, in turn, will earn them more income as the number of people needing these services will increase due to a high rate of technology growth, this rate of growth is said to be exponential. The price of growth of technology is supposed to be at 8.0 %, over the past five years, technology has created up to 1.6 million jobs globally.

Personal security to customers based on a CCTV camera which even captures sound, this prevents cyber-related crimes such as protection of a client’s property, as well as the safety of the cyber property in general, so when clients see such, the feel more secure which in turn will increase the rate of productivity.

People who visit cyber cafes get a lot of information from the use of internet and data services offered in these cyber cafes help them in improving their businesses which in turn improve their standard of living. Then there are interactions between people in the neighborhood; this can lead to sharing of ideas which will enhance the quality of life due to these social interactions. Children also visit such places when they use internet and data services for their education research; this will expose them to more information from when are young contributing to the rate of growth of technology.(Microsoft)

2.0 installing company firewall and software

Firewall solutions for small business are available as either software or hardware. Software firewalls protect each PC installed. But to protect all your company's computers, each must have a software firewall installed. That can get expensive and be challenging to maintain.

On the other hand, hardware-based firewall solutions for small business protect all computers on your network. A hardware-based firewall is more accessible to administer, too.

The ideal firewall solutions for small business integrate a hardware firewall with software controls into a comprehensive security solution that includes virtual private network (VPN) support, antivirus, antispam, antispyware, and content filtering capabilities.

2.1 Firewall Solutions for Small Business: Benefits

Firewall solutions for small business, when integrated with a comprehensive security device, offer many benefits. Among them are:

Support for changing business needs. The best firewall solutions for small business let you safely deploy new applications. They provide advanced application-layer security for a wide range of applications, including email, voice over IP (VoIP), video, and multimedia programs.

Controlled access to your company's resources. The most effective firewall solutions for a small business block unauthorized access to applications or information assets.

Increased employee productivity. By blocking unauthorized access from hackers, your firewall helps prevent the loss of employee productivity or valuable company data.

Improved business resiliency. The best firewalls prevent disruption of business-critical applications and services due to security breaches.

2.2 Firewall Log Analysis

Gaining network activity insights and keeping abreast of firewall log is a challenging task as the security tool generates a vast quantity of traffic logs. Introducing Firewall Analyzer, an agent-less log analytics and configuration management software that helps network administrators to understand bandwidth utility in their network. Firewall Analyzer is vendor-agnostic and supports almost all open source and commercial network firewalls such as Check Point, Cisco, Juniper, Fortinet, Palo Alto and more,

Unlock the real value of your security devices

Supports an extensive array of perimeter security device logs which include firewalls, VPNs, IDS/IPS and proxy servers

Provides a wide range of reports for external threat monitoring, change management, and regulatory compliance

2.2.2 Attractive TCO and rapid ROI

No additional hardware required, minimal entry cost and maintenance inclusive subscription model ensures a low TCO

Competitively priced. Quick deployment, instant results, reduced IT overhead provides rapid ROI

2.2.3 Meet dynamic business needs quickly

Rapidly transforms perimeter security device logs into actionable information

Generates reports in user-friendly formats like PDF and CSV formats

2.2.4 Productivity improvement for IT / MSSP

From product, deployment to report generation in minutes.

Real-time alerts to security events enable IT to respond instantaneously to security threats(Cisco)

Types of firewall

Fortunately, there are many free firewalls available. The most popular include:

Zonealarm

Online Armor Firewall

Ashampoo Free Firewall

3.0 Recommendations and action steps.

Recommendations for installing a firewall and software include:

To prove that improvement of security is a worthy investment and how it will increase the number of customers in a café due to these developments.

Request locals to show support by using the internet from cybercafes due to increased security.

People can meet in cyber café for video streaming as most cyber cafés have a conference room with a secure data connection, this will significantly help in doing business (Umuc)

Transactions even from abroad at the comfort of the neighborhood.

People usually meet in such places; this is an increase in social welfare among people, this promote community development in general, and also improve security in the Neighborhood as people know each other, they can discuss businesses to friendship.

Cybersecurity referred to as information technology security focuses on protecting computers, programs, networks, and data from unintended or unauthorized access, change, or destruction.

Government agencies, corporations, the military, financial institutions, hospitals, and other groups collect, process, and hold a great deal of confidential information on computers and transmit that data across networks to other computers. With the growing volume and sophistication of cyber attacks and cyber crimes, ongoing attention is required to protect sensitive business and personal information, as well as safeguard national security.(Brighthub)

3.0 Conclusions

Improved and installation of software and firewall have led to the improvement of data security and provision of a reliable security system. People are feeling more secure visiting cybercafes to use data service, and internet services such as the wireless security, use of the internet provide people with information, this leads to an improved system of looking information to improving their businesses.

People will enjoy quality services offered by these cyber cafes due to improved quality of the services provided be cyber cafes; this person includes children who also visit such places to get some information about something. Old people also visit cyber cafes to get some information; this can consist of an email message or filling of taxes, they get help from cyber cafe through the support of people who work in this cyber and they also assure them of security and confidentiality of the information they get.









Cyber café security will also lead to an increased number of clients visiting cyber cafes to acquire information which helps in their self-development, mostly regarding business development, this, in turn, the cyber café into a business venture where they even become internet providers to locals.

The use of firewalls assists the company to secure the system from intruder attacks, e.g., Hackers. The firewall also ensures the consistency of data and integrity in that authenticated user are the only people who can access the data of the cyber café.





References

About Cyber Security | Umuc. (n.d.). Retrieved from http://umuc.edu/academic-programs/cyber-security/about.cfm

Firewalls - Advantage, Type, Disadvantages, Cost. (n.d.). Retrieved from http://www.referenceforbusiness.com/small/Eq-Inc/Firewalls.html

The Benefits Of A Firewall - Free Solutions - Bright Hub. (n.d.). Retrieved from http://www.brighthub.com/computing/smb-security/articles/28699.aspx

Firewall Solutions For Small Business - Cisco. (n.d.). Retrieved from http://www.cisco.com/c/en/us/solutions/small-business/resource-center/secure-my-

Software Installation And Maintenance - Msdn.microsoft.com. (n.d.). Retrieved from https://msdn.microsoft.com/en-us/library/bb742420.aspx

Software Installation Can Improve With Standard Actions. (n.d.). Retrieved from https://www.openmakesoftware.com/software-installation-pre-built-actions/

Cybersecurity Overview | Homeland Security. (n.d.). Retrieved from https://www.dhs.gov/cybersecurity-overview











Deadline is approaching?

Wait no more. Let us write you an essay from scratch

Receive Paper In 3 Hours
Calculate the Price
275 words
First order 15%
Total Price:
$38.07 $38.07
Calculating ellipsis
Hire an expert
This discount is valid only for orders of new customer and with the total more than 25$
This sample could have been used by your fellow student... Get your own unique essay on any topic and submit it by the deadline.

Find Out the Cost of Your Paper

Get Price