StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

How to Maintain Network Security - Essay Example

Cite this document
Summary
This essay "How to Maintain Network Security" focuses on a comprehensive literature review associated with the studies in the past on email security. The research was related to link analysis, text analysis, network analysis, dynamic network analysis, machine learning, and data mining. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.8% of users find it useful
How to Maintain Network Security
Read Text Preview

Extract of sample "How to Maintain Network Security"

Download file to see previous pages

It is the twentieth century when improved communication technologies are invented one after another. The Internet has become a powerful and interactive delivery service providing extensive activities and web services. Organizations expand their resources with the help of the Internet. Websites are created, for informational purposes, advertisement, online shopping, etc. In modernized countries, the Internet is utilized for business: Education purposes Online shopping (Comet, eBay, etc) Blogs (Bloggers, Word Press, etc) Social-Networking (Facebook, Myspace, etc) Information (Advertising) Even today, where every technology interrelated to Information technology involves the ‘.

com’ phenomenon; the Internet is a relatively evolving field, which is constantly changing. Extensive use of computing technology has aided different scale organizations to achieve targets. Information technology evolution has introduced innovations for business processes and communication. Moreover, information technology has rendered a new approach for conducting business on new channels and is proceeding further to add numerous benefits and modernization due to its global reach around the globe.

However, the expandable adoptability has provided new loopholes for threats and vulnerabilities. Organizations are more apprehensive about the security of the network rather than adding functionality. Moreover, massive funds are allocated for network security along with advanced security hardware devices including Hardware Security Modules (HSM), which are deployed to secure mission-critical data. However, frequent updates are required, for firmware and hardware, to keep them updated for potential threats that may disrupt data or perform any security breach.

From time to time, hackers and cyber criminals develop new threats. Even the updated security hardware is not sufficient for securing the network, because there is always a probability of a new threat, which may bypass the security mechanism anytime. Moreover, hackers and cyber criminals also conduct research on security products in order to develop a threat, which may intrude and sidestep the security of these products. The main objectives of a cyber criminal include bank account hacking, and credit card hacking to achieve money.

The uprising of Information Technology has created new trends in doing business and communication. Furthermore, technology has provided a new approach to operating businesses during the past several years and continues to provide numerous benefits as it spreads all over the world. However, with its extensive adoption, threats and vulnerabilities are also growing. Organizations spent vast funds to secure their confidential data and network environment. In addition, hardware security modules are taken into consideration for securing mission-critical data.

However, these modules need frequent updates for virus definitions and new threats, which may disturb the network. Every now and then, new threats are designed and developed by hackers and cyber criminals. In spite of securing the networks and data centers, with the most updated and advanced security modules, there is still a probability of a new threat breaking into the network. In addition, hackers and cyber criminals are exploring efficient codes day by day to advance their hacking tools.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Security Essay Example | Topics and Well Written Essays - 6000 words”, n.d.)
Retrieved from https://studentshare.org/environmental-studies/1410717-network-security
(Network Security Essay Example | Topics and Well Written Essays - 6000 Words)
https://studentshare.org/environmental-studies/1410717-network-security.
“Network Security Essay Example | Topics and Well Written Essays - 6000 Words”, n.d. https://studentshare.org/environmental-studies/1410717-network-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF How to Maintain Network Security

Network Security

network security is complicated but is equally important because it secures the assets of a company and allows it to keep its secretive strategic plans so as to gain competitive advantage.... In the contemporary age network security has become vital for preserving their relationships.... This paper discusses some of the potential threats to network security and the ways to mitigate them.... The paper also renders useful information about network security policing....
9 Pages (2250 words) Research Paper

Network Security

The rapid growth of networking has also come with its own challenges, mainly in the area of network security.... Therefore, network security can be defined as the safety of interlinked systems.... The rapid growth of networking has also come with its own challenges, mainly in the area of network security.... Therefore, network security can be defined as the safety of interlinked systems.... However, since the mid 1980s, networked computer workstations became common and with this came the issue of information and network security....
7 Pages (1750 words) Term Paper

Introduction to Network Security

The paper "Introduction to network security" states that networks from the time of their birth have come a long way.... An account compromise is also another network threat in which the intruder discovers the username and password to one of the accounts on the system.... Another threat to a network system is packet sniffing programs that catch the data packets' data as they travel in the network.... However, viruses require some action by the user to spread, whereas worms, once triggered, spread all over the network and other systems....
9 Pages (2250 words) Research Paper

Data Privacy and Security

This paper will cover the answers to various questions such as how can viruses contaminate computers, how computer systems are hacked by people, how to keep computers secure from online predators.... This essay discusses that at the present computer security has become a very critical issue.... security refers to the technique to discover as well as stop illicit utilization of our secret information or computer.... However, at the present computer security has become a very critical issue....
8 Pages (2000 words) Research Paper

Successful Implementation of Network Security Policies

This paper "Successful Implementation of network security Policies" focuses on the dividing of operation, development, and test systems to reduce the risk of illegal alteration or access.... It tackles overall network security goals and it should be applied to all IT resources inside an institution.... The institution's management must instruct policy development to guarantee that the policies address the network security requirements of all systems operating within the institution....
6 Pages (1500 words) Assignment

The Development of the Internet Protocol Security

The author of the present research paper "The Development of the Internet Protocol Security" points out that with the rise of the internet and increased use of technology it became more difficult for the organizations as well as for individuals to maintain their privacy and secure their data.... Since the utility of internet is increasing consistently, it is becoming increasingly important for the organizations to develop and maintain certain protocols that can help organizations to maintain the secrecy of important information such credit card information, customer data, financial transactions etc....
8 Pages (2000 words) Research Paper

Data Privacy and Security

This paper will cover the answers to various questions such as how can viruses contaminate computers, how computer systems are hacked by people, how to keep computers secure from online predators.... This essay "Data Privacy and security" presented some of the important features of computer security those need to be maintained for the sake of effective security management.... In view of the fact that the use of computer networks has turned out to be persistent, the thought of computer security system extended to point out problems covered in the way of networked use of computers and data resources....
8 Pages (2000 words) Essay

Infrastructure and Security of Information Network

This coursework "Infrastructure and security of Information Network" designs and provides network infrastructure and security logical and physical topographical layout.... The paper the reason for the design of the layouts to the IT experts and to the management team of infrastructure and security systems.... It provides the organization security policy for infrastructure protection through the use of CIA principals.... The section provides a detailed discussion of vulnerabilities of infrastructure and security and provides solutions for the information network....
7 Pages (1750 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us