StudentShare solutions
Triangle menu

Network Monitoring - Essay Example

Not dowloaded yet

Extract of sample
Network Monitoring

This essay is based on the primal reasons for government to regulate and examine information gathered or communicated by individuals either within the country or without. In line with the thesis statement, this essay is essentially centred at providing information/evidence as to why the government should be solely in charge of networks that keep the various communications within a country. To form a valid argument, we will examine the United Kingdom's pursuit to control information.
The United Kingdom government has always been faced with the need to secure information within the country mainly to help ensure that no threat is forthcoming at least not through the communication networks. This has been a debate for a long time and has seen the two main parties in the Kingdom draw various opinions. While the labour party wanted the formation of a single database for storing individual communications, the conservatives wanted a monitoring system which would ensure information is filtered; only that information which poses a threat to the people is stored. This they said was due to two facts; one, the government would infringe on the privacy of individuals something that had been done in the past but which they wanted a departure from.
Of concern however is not how the politicians fought for the balance between security and privacy but the main point I want to draw is that they all agreed on the need to monitor information; notably, for the sole reason of security. In the same way, the United Kingdom government through its home secretary found the need to monitor information. The following part thus gathers the various parts of concern for these individuals and examines the information handled within and without the government quarters to help cement the need to monitor information.

PART TWO-Government and Networks
Government and Information
Understanding the above discussed network components will help in the discussion of the government's need to secure networks for the purpose of security promotion and maintenance; especially, with the growing threats of terrorism, fraud cases and other major scandals. (Barret et al 2006)
These have caught the government either unprepared or have overwhelmed government forces due to the extent and level of the technology used.
This necessities that the government prepares fully for such occurrences or situations and since it is usually not possible to harness the entire human knowledge and make use of the same in developing government networks, it is then important for it to ensure that the information and methods used by these outside developers is monitored or regulated. Notice that the use of outside developers means those that are not part of the government.
The other point of concern is that the corporate as well as the entire private sector has embarked in developing powerful technological equipments which enable the coding and encoding of data transported to allies of these companies or entities. If this is not monitored, then the security of the nation is likely to be in jeopardy as this information if not traced or decrypted, may contain matters likely to affect the well being of the society.
Thus in conclusion, the government is definitely the one to control the amount of data that flows within the networks as it is the ...Show more

Summary

Computer networking is essentially an engineering related discipline which involves the study of computer systems and devices and how they relate to each other ensuring that there is communication between them. Computer networks basically entail a connection between communication devices which enable the exchange of data.
Author : vicentaheller
Network Monitoring essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Network Monitoring"
with a personal 20% discount.
Grab the best paper

Related Essays

Internatioanl Logistics - Monitoring
Furthermore, when the products supplied by a made available to the company later than expected, the company may end up losing a lot in cash, reputation and may even face litigations which could otherwise be avoided. In order to avoid such circumstances, every business needs to monitor its suppliers.
4 pages (1000 words) Essay
Design and security of a small businness network - case study
(Ramig 2010). I.T soft needs a computer network, which will support all the requirements that are analyzed for fluent business operations, as well as abide with the future trends of emerging technologies. The network devices and computing equipments have to be reliable and extendable, in order to cope up with extra nodes if the staff increases.
9 pages (2250 words) Essay
Network Management System
Additionally, different people have different views about network management. In addition, to run a business effectively it is necessary for the IT managers to make sure that the corporate IT arrangement (composed of locations, departments as well as services) is carrying out tasks effectively.
2 pages (500 words) Essay
Best Practices for Network Security is the Topic
Individuals and organizations use networking technology in their daily use of devices such as computers to perform their tasks (Hui et al, 2012). Considering the threats posed in networking, network security has emerged as a top concern among many users of computers and internet.
11 pages (2750 words) Essay
Network Security Essay
The fact is, however, that routers are vulnerable to unauthorised infiltration and can, under these circumstances, be compromise. If routers are compromised by an attacker, the attacker/hacker is subsequently in a position to disrupt network operations, compromise data and inflict substantial financial loss on the entity/network in question.
32 pages (8000 words) Essay
Network Management & Security
This type of network will satisfy their future needs appropriately as they can add in other offices and routers to handle future demands. For instance, the following diagram shows how the network itself would be served wherein you have all the individual computers attached to the corporate LAN including any terminals, peripheral devices, etc.
10 pages (2500 words) Essay
Security - Network Design
Network security has assumed paramount proportions as intrusions are on the rise, whether accidental or malicious, and the research problem raised in the paper are to investigate the preventive methods in this
54 pages (13500 words) Essay
Five network management categories making up the FCAPS model
Remote network monitoring has become one of the well-known forms of network management. Remote monitoring (RMON) is defined as the specification for exchanging network
2 pages (500 words) Essay
Monitoring of users
monitoring computers will prevent downloading of pirated software or any software that may crush the computer, corrupt important files that are stored in it; thus reducing its life’s span. Having understood the importance of having a controlled monitor user, College of North
3 pages (750 words) Essay
Monitoring
If the employer does not communicate such policies to the employee, then they have no right to monitor the internet usage of the employees. However, in most states, employers do not have an
1 pages (250 words) Essay
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Rate this paper:
Thank you! Your comment has been sent and will be posted after moderation