StudentShare solutions
Triangle menu

Network Security - Essay Example

Nobody downloaded yet

Extract of sample
Network Security

But with this ease of information access comes the issue of security. With the increase of information flow, there has been an increase in the number of attacks on information by hackers. Attacks such as Denial of Service (DoS) Attacks, Spoofs, Sniffing, etc. have increased with the increase in the availability of hacking tools which are free of cost. Valuable information is lost in the process. For example, if a customer buys a product of a particular organization through their web-site and a hacker presents himself as the organization and receives the money from the customer, valuable information such as the ID of the customer, his credit card numbers, his passwords are all stolen by the hacker. Therefore such information has to be transferred securely over the Internet. Encryption is the most common way of securing valuable information while transmitting over the Internet (Rahman, 2003). Networks are secured in a different manner. They are secured using tools called "Firewalls". Whenever transactions or information between a customer and an organization are being carried out, a particular pattern is followed. Firewalls recognize and allow only these transactions or processes to be carried out and block out all the unrecognized patterns. By implementing Firewalls, most of the attacks from the hackers can be kept out. Securing a network just does not happen. There are many issues to be considered when making policies for network security. The three main issues back in the earlier days were Confidentiality, Integrity and Availability. Due to the advances in the technologies, these issues have been mostly resolved. But in the present day Networks, other issues have appeared. These issues will eventually result in the breaching of confidentiality, integrity and availability thereby defeating the cause of coming up with Network Security policies. We can ask the following questions to resolve the recent issues related to Network Security:


Should Identity Manager be put back to the User

Identity Control from the top down approach has traditionally been imposed by all Enterprises and Governments. But this has resulted in resilience from the users. Users have always found it difficult to cope up with the time constraints resulting from the above mentioned approach. This approach looks increasingly antiquated for the present day user needs. Microsoft's Kim Cameron once noted that: "A system that does not put users in control will - immediately or over time - be rejected" (Dean, 2006). This is true because users expect real fast response and do not like to waste their time in waiting for a response from the requested network or system. Identity Control being at the Server side is the key to ensuring trusted relationship for billions of business transactions all over the world. Identity Control being at the server side makes it possible for the replying Network to ensure that the keys constructed are secure. Since the control will be present with the server, no user will have chance of even attempting to break the key and steal the information being transferred. At the macro level, the advantages that accrue in the form of innumerable applications and services, ...Show more

Summary

Network Security is one of the most highly debated topics in the present day world. Network Security has many dimensions. Securing any network is like securing a country's access points with several defense mechanisms. Network Security has become a very essential part of each and every network present on this planet- be it the Internet which we use or the LANs (Local Area Networks) and MANs (Metro Area Networks)…
Author : leuschkegarrett
Network Security essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Network Security"
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

Network security
However, there are many challenges that organizations have to overcome for securing the information on the network as well as in the servers. Certified skilled professionals, certified vulnerability assessment tools, incident response management teams and other relevant staff plays a significant role for protecting and detecting potential threats and vulnerabilities that may or have compromise the network to gain access to business critical information of the organization.
8 pages (2000 words) Essay
Network Security
Lacking data integrity and security of information, no company can survive attempts of organized intrusion and related cyber crimes like information theft and spamming. Moreover, network security is highly necessary to protect the computers from malware like Trojan Horse and Phishing software that are capable of recording and sending out sensitive inputs directly to the hackers when connected with Internet.
4 pages (1000 words) Essay
Network Security
Physical device security in terms of redundancy implies the placing of a copy of the original device in a location where it is safe from malicious attackers. In this case, if the primary system fails, the redundant system in the other location could start functioning in its place.
5 pages (1250 words) Essay
Network security
The basic purpose of implementing a computer network is to allow a number of staff members to enter and update data simultaneously. This paper presents an analysis of a network security for the Athlete’s Shack (TAS), which runs its business through a chain of sporting goods’ stores.
5 pages (1250 words) Essay
Network security
This dream of a foolproof secure network system can only be realized when the computer hardware is 100% compatible with the policy of security protocols. The following check list helps out the situation
6 pages (1500 words) Essay
Network Security
With this opening to the RSA system, the attackers extracted the information until they obtained access to their targeted system where the data files were stolen. According to the details of the
4 pages (1000 words) Essay
Network security
This process is achieved using encryption algorithms that are used to generate keys for encrypting and decrypting data. Technical security controls are used to provide control mechanisms within systems to as to mitigate potential security
2 pages (500 words) Essay
Network Security
This work is intended to compare the two internet security packages such as Kaspersky and Norton internet securities. According to the survey conducted by Kaspersky Lab, 91% cyber attacks have been
8 pages (2000 words) Essay
Network Security
According to many opinions, it is in the interest of many national governments to establish a clear legal structure at the European level that would strike the right balance between personal data protection and the processing of
3 pages (750 words) Essay
Network security
The components include large flat panel televisions and surround sound systems of varying scale and complexity and huge range of peripheral devices that are with the system. As of now, the VAC has internal chain of supply, which is networked using
3 pages (750 words) Essay
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Click to create a comment