Retrieved from https://studentshare.org/environmental-studies/1410717-network-security
https://studentshare.org/environmental-studies/1410717-network-security.
It is the twentieth century when improved communication technologies are invented one after another. The Internet has become a powerful and interactive delivery service providing extensive activities and web services. Organizations expand their resources with the help of the Internet. Websites are created, for informational purposes, advertisement, online shopping, etc. In modernized countries, the Internet is utilized for business: Education purposes Online shopping (Comet, eBay, etc) Blogs (Bloggers, Word Press, etc) Social-Networking (Facebook, Myspace, etc) Information (Advertising) Even today, where every technology interrelated to Information technology involves the ‘.
com’ phenomenon; the Internet is a relatively evolving field, which is constantly changing. Extensive use of computing technology has aided different scale organizations to achieve targets. Information technology evolution has introduced innovations for business processes and communication. Moreover, information technology has rendered a new approach for conducting business on new channels and is proceeding further to add numerous benefits and modernization due to its global reach around the globe.
However, the expandable adoptability has provided new loopholes for threats and vulnerabilities. Organizations are more apprehensive about the security of the network rather than adding functionality. Moreover, massive funds are allocated for network security along with advanced security hardware devices including Hardware Security Modules (HSM), which are deployed to secure mission-critical data. However, frequent updates are required, for firmware and hardware, to keep them updated for potential threats that may disrupt data or perform any security breach.
From time to time, hackers and cyber criminals develop new threats. Even the updated security hardware is not sufficient for securing the network, because there is always a probability of a new threat, which may bypass the security mechanism anytime. Moreover, hackers and cyber criminals also conduct research on security products in order to develop a threat, which may intrude and sidestep the security of these products. The main objectives of a cyber criminal include bank account hacking, and credit card hacking to achieve money.
The uprising of Information Technology has created new trends in doing business and communication. Furthermore, technology has provided a new approach to operating businesses during the past several years and continues to provide numerous benefits as it spreads all over the world. However, with its extensive adoption, threats and vulnerabilities are also growing. Organizations spent vast funds to secure their confidential data and network environment. In addition, hardware security modules are taken into consideration for securing mission-critical data.
However, these modules need frequent updates for virus definitions and new threats, which may disturb the network. Every now and then, new threats are designed and developed by hackers and cyber criminals. In spite of securing the networks and data centers, with the most updated and advanced security modules, there is still a probability of a new threat breaking into the network. In addition, hackers and cyber criminals are exploring efficient codes day by day to advance their hacking tools.
...Download file to see next pages Read More