StudentShare solutions
Triangle menu

Network Security - Essay Example

Nobody downloaded yet

Extract of sample
Network Security

Logical security is protects the device from non-physical attacks. An attacker uses data elements to make a non-physical attack. Redundancy in this case would be to make a copy of the data used by the device. (Malik, 2003, p. 35). For any secure system, redundancy is significant. There are two ways to achieve device redundancy in a networked device. Firstly, we can use the routing mechanism. Secondly, we can use redundancy protocol. (Malik, 2003, p. 39). These are ways of obtaining on site redundancy. A server which is a network device can also be made redundant. The redundant server can be located at the same place as the original or primary server or it can be placed off site. The major advantage of making off site redundancy is that any disaster that had affected the primary server would not affect the redundant server. However, off site device redundancy is expensive due to extra costs that include housing costs and real-time communication links that are needed to support the mirroring operations. (Stewart, 2011, p. 112). Part 2 Business Continuity Planning (BCP) is a planning that helps to identify the internal and external threats an organization is exposed to and as a consequence providing an effective recovery and prevention mechanism that does not damage an organization’s competitive advantage. The purpose of Business Continuity Planning is to allow the organization to continue its business or in other words it protects the business life of an organization. Business Continuity Planning results in the formation of a Business Continuity Plan. The process of conducting BCP is summarized as follows: 1. Project Planning: Parameters of project planning and resources to be utilized are identified. 2. Risk Analysis and Review: The internal and external threats, to which an organization is exposed to, are identified especially risks related to the geographic location. 3. Business Impact Analysis: The critical operations of the business unit are evaluated and resources that are needed to operate them are identified. 4. Recovery Strategy: Temporary recovery guidelines are created for the business units that are exposed to the period between a predictable disaster and ready for normal operations. Alternative recovery strategies are also planned and important data and information of the business units are copied and stored in a safe location. 5. Plan development: Right people to conduct the recovery operation are identified and methods to notify these people are established. Methods to evaluate the operational impact and recovery activation are also determined. Steps to minimize the risks and the restoration of the system to normal after attack are also created. A Business Continuity Plan is the milestone of this phase. 6. Training: The employees that were identified to be involved in the recovery process are made to understand the BCP. 7. Testing: A fake situation is created to test the BCP and evaluate it to ensure its working. 8. Maintenance: The plan is updated on a frequent basis with change in business. (Heng, 2004, p. 2). Part 3 A Disaster Recovery Planning is a planning that results in a document called the Disaster Recover Plan which “explores how a network recovers from a disaster that could either damage its data or hinder and stop its functioning. An organization’s financial auditors need this document as a company’ ...Show more

Summary

Network Security Part 1 A large corporation is supposed to have a large volume of data and information that needs to be protected from any kind of theft and any kind of loss due to natural disasters. A large corporation should implement device security: physical and logical which is a form of network security in order to protect its data and information…
Author : sconsidine
Network Security essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Network Security"
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

Network security
However, there are many challenges that organizations have to overcome for securing the information on the network as well as in the servers. Certified skilled professionals, certified vulnerability assessment tools, incident response management teams and other relevant staff plays a significant role for protecting and detecting potential threats and vulnerabilities that may or have compromise the network to gain access to business critical information of the organization.
8 pages (2000 words) Essay
Network Security
Lacking data integrity and security of information, no company can survive attempts of organized intrusion and related cyber crimes like information theft and spamming. Moreover, network security is highly necessary to protect the computers from malware like Trojan Horse and Phishing software that are capable of recording and sending out sensitive inputs directly to the hackers when connected with Internet.
4 pages (1000 words) Essay
Network security
The basic purpose of implementing a computer network is to allow a number of staff members to enter and update data simultaneously. This paper presents an analysis of a network security for the Athlete’s Shack (TAS), which runs its business through a chain of sporting goods’ stores.
5 pages (1250 words) Essay
Network Security
It deals with stopping attacks on a network from outer entities such as hackers and from non-intentional attacks. As more and more networks are being introduced every single day, the implementation of network security has become very important. The interconnection of networks has made flow of information easier between organizations or individuals (Curtin, 1997).
5 pages (1250 words) Essay
Network security
This dream of a foolproof secure network system can only be realized when the computer hardware is 100% compatible with the policy of security protocols. The following check list helps out the situation
6 pages (1500 words) Essay
Network Security
With this opening to the RSA system, the attackers extracted the information until they obtained access to their targeted system where the data files were stolen. According to the details of the
4 pages (1000 words) Essay
Network security
This process is achieved using encryption algorithms that are used to generate keys for encrypting and decrypting data. Technical security controls are used to provide control mechanisms within systems to as to mitigate potential security
2 pages (500 words) Essay
Network Security
This work is intended to compare the two internet security packages such as Kaspersky and Norton internet securities. According to the survey conducted by Kaspersky Lab, 91% cyber attacks have been
8 pages (2000 words) Essay
Network Security
According to many opinions, it is in the interest of many national governments to establish a clear legal structure at the European level that would strike the right balance between personal data protection and the processing of
3 pages (750 words) Essay
Network security
The components include large flat panel televisions and surround sound systems of varying scale and complexity and huge range of peripheral devices that are with the system. As of now, the VAC has internal chain of supply, which is networked using
3 pages (750 words) Essay
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Click to create a comment
Contact Us