StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Information Security - Research Paper Example

Cite this document
Summary
Fundamental Issues in Network Security Introduction Before going into the discussion regarding fundamental issues in network security, let us get a better understanding of what network security actually is and why is it important in the present world. A computer network is a collection of computers connected to each other through LANs or WANs in order to carry out different business transactions…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
Information Security
Read Text Preview

Extract of sample "Information Security"

Download file to see previous pages

The progress in the field of information technology has been favorable because it has brought various benefits for the users all around the world. However, along with many significant benefits, the advancement in information technology has also created various issues related to the security of computer networks. These network-related issues need to be tackled properly in order to make the internet world safe and secure. Literature Review regarding Current State of Network Security Kaminsky (2010) asserts, “Network security comprises the measures a company takes to protect its computer system”.

It is evident from the above statement that network security deals with the protection of information stored in the computer systems. There are various issues associated with the current state of the network security. Douligeris and Serpanos (2007, p.94) show their concern about network security by saying that current mechanisms of network security do not handle the threat of worm attacks properly. Leynes (2010) states, “Worm is a malicious code or software that spreads from one computer to another using the network highway”. . Maiwald (2004) state that current state of network security cannot be called purely safe from all sorts of threats.

Although virus and worm attacks have decreased considerably, yet the companies need to address information theft issue, which is the top network security concern these days (Batten, 2008, p.24). Network administrators also hold the responsibility to create new mechanisms for the security of networks. McFarlane (2010) asserts, “There is no doubt that network administrators are today dealing with much more sophisticated network and computer security threats than they did a few years ago”. Network administrators still need to do more in the field of network security.

Laet and Schauwers (2005, p.3) state, “Currently, network administrators often spend more effort protecting their networks than they spend on the actual setup”. Reaves (2010) in an article states, “Steps need to be taken to ensure that user access to the network cannot compromise the entire network”. Lynn (2009) asserts, “In today's threat landscape, the most secure network infrastructures implement not a single network security technology, but a multilayered comprehensive security strategy”.

Fundamental Issues and Concerns for Network Security There exist many fundamental issues related to network security, which are of significant importance for the successful advancement in the field of network security. Some of the core fundamental issues include authentication, access types, and authorization. Let us discuss these issues in some detail. Authentication Authentication of the user logging onto a network is one of the fundamental issues related to network security. Biometrics and passwords are generally used to

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Security Research Paper Example | Topics and Well Written Essays - 1250 words”, n.d.)
Retrieved from https://studentshare.org/family-consumer-science/1404699-information-security
(Information Security Research Paper Example | Topics and Well Written Essays - 1250 Words)
https://studentshare.org/family-consumer-science/1404699-information-security.
“Information Security Research Paper Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/family-consumer-science/1404699-information-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Security

Computer Information Security Certification

This paper ''Computer Information Security Certification'' has provided an analytical discussion and evaluation of various certifications in Information Security and presented the work that the certified individuals are mandated to perform.... Computer Information Security Certification Cisco Certified Internetwork Expert (CCIE) certification is offered by Cisco.... Introduction Computers systems and networks face many security threats such as unauthorized access and intrusion....
8 Pages (2000 words) Research Paper

Information Security Program Survey

Information Security Program Survey (Name) (University) (Date) Information Security Program Survey Introduction The National Aeronautics and Space Administration (NASA) is the United States' agency to manage the nation's aerospace research, aeronautics, and other civilian space programs.... Since the NASA needs to manage highly sensitive data, information, strategic plans, and space programs, the organization pays particular attention to its Information Security program....
4 Pages (1000 words) Essay

Successful information security management

Successful Information Security management involves an amalgamation of prevention, detection and response in order to deploy a strong security defense.... hellip; A system should also be able to counter incidents and raise proper procedures in case an Information Security incident occurs.... Information Security incident handling takes a stride forward in the Information Security management procedure.... Security incident management facilitates the development of security incident handling and planning including preparation for detection and reply to Information Security issues....
9 Pages (2250 words) Research Paper

Information security legislation

This realization is increasing in the wake of increasing theft occurrences and other Information Security… Organization currently need standards, in the past many organization mostly tended to use a single Information Security standard for example BS 7799 part 2 (an Never the less, times have changed and the recent past has seen a lot of regulations and legislation which impacts Information Security.... (Purtell, 2007) Information Security is an organization problem, and not a technologically one....
19 Pages (4750 words) Essay

Information Security Management Standards

This report "Information Security Management Standards" discusses the system that my organization has settled upon, highlighting all its features and how this new security plan will ensure that the organization does not lose or have data distorted from an invasion or crushing of the system.... This forces the organization to constantly refresh the Information Security systems every often to ensure that the system is not compromised (Humphreys, 2008).... To that effect, the organization funded research into the most appropriate Information Security system, with all the desirable security features....
13 Pages (3250 words) Report

Information Security Measures

"Information Security Measures" paper states that a risk assessment approach is necessary for the development of systems with an acceptable level of risk.... nbsp; The study has been planned in several stages; review of relevant literature; study of architectures and measures in computing systems; a case study of security issues within a specific system; and recommendations for good practices for Information Security.... Information Security is not about looking at the past of an attack faced; neither is it about looking at the present with the fear of being attacked; nor is it about looking into the future about the uncertainty that might befall us....
5 Pages (1250 words) Coursework

Information Security Audit Tools

As the paper "Information Security Audit Tools" states, when audit systems are adopted, they assist to prevent the attacks and reduce their associated consequences.... elow shows Information Security management.... : Information Security management.... These risks can be prevented by installing Information Security to protect the organization's software from intruders.... Thus, this paper will seek to discuss, in detail, some of the Information Security audit tools....
10 Pages (2500 words) Literature review

Key Information Security Issues

This case study "Key Information Security Issues" presents the case scenario of Jack Doe that represents most of the internet users who are unaware of the presence of online attackers.... Furthermore, it demonstrates the usefulness of Information Security in an organization.... At times the acronym CIA is used regarding Information Security to refer to confidentiality, integrity as well as the availability of data.... With that, this report will detail key Information Security issues concerning Jack's handling of his work information, associated attacks, risks, impacts of attacks, countermeasures, and mitigation effects of the countermeasures....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us