Professor Name ID # Date Network Security Introduction During the last few decades several technologies have been emerged throughout the whole globe and networking technology is certainly the most amazing achievement in this era. Additionally, the innovations in computer and networking fields have open new ways for the businesses to boost their performance…
Download file to see previous pages...
In this regard, network security comprises the measures a company can take to protect its computer network, and it is a prime concern for every company that uses computers. On the other hand, if a company does not implement appropriate network security then an attacker or opponent can get access and utilize the important or secret data and information, probably causing data destruction or damage, or even the entire destruction of the computer network. In addition, the revolution of internet has modernized our lives. However these technologies as well have introduced some of the severe safety as well as confidentiality problems. These issues can be tremendously devastating for private information. In this scenario network management systems and procedures are used for the effective management of various aspects regarding network security (Kaminsky and Foster; Armoni; Kaminsky and Foster; Bhattacharya and Ghosh). This paper will present a detailed overview of network security, network security policy, importance of network security policy, its implementation and design considerations for network security. At the moment, network security is a hot topic for the organizations as well as individuals. This research is aimed to highlight technology involved in network security, future trends of network security, companies adopting this issue, regulatory issues in network security and global implications. Network Security Policy The security policy is essentially an arrangement, describing in detail the organization’s decisive resources as well as how well they are organized. Additionally, the basic purpose of building a security policy is to offer the employees with a concise summary of the "satisfactory utilization" of some of the business information and resources. In addition, the intention behind this policy is to proficiently describe the allowable rights of users and consequently employing them in protecting the business sensitive and critical information systems. The security plan behaves like a "must interpret" basis of company information for everybody exploiting in some approach, computer and network resources considered as possible targets. However, a high-quality and superbly established security policy ought to tackle a number of these subsequent fundamentals: (Danchev; Kim, Lee and Han; Bakry) How susceptible business data must be managed How passwords and other credentials have to be upheld effectively How to react to a possible safety event, interruption efforts, etc. How to utilize computers as well as internet technology in a safe way How to suitably exploit the business communication infrastructure On the whole, the prime causes following the formation of a safety policy is to set a business’s sensitive data and information security basics. Another aspect is to clarify to employees how they are liable for the security of business resources and assets, and emphasize the significance of taking benefit from protected business communications when the business activities are being conducted through web based technology (Danchev; Kim, Lee and Han; Bakry). The Need of Network Security Policy Since forming a high-quality security policy offers the basics for the flourishing application of security allied activities in the upcoming period. In this scenario, the initial movement in improving a business’s security is the performance of a specific however
...Download file to see next pagesRead More
Cite this document
(“Network Security Research Paper Example | Topics and Well Written Essays - 3250 words”, n.d.)
Retrieved from https://studentshare.org/family-consumer-science/1420972-network-security
(Network Security Research Paper Example | Topics and Well Written Essays - 3250 Words)
“Network Security Research Paper Example | Topics and Well Written Essays - 3250 Words”, n.d. https://studentshare.org/family-consumer-science/1420972-network-security.
This paper discusses some of the potential threats to network security and the ways to mitigate them. The paper also renders useful information about network security policing. Information presented in paper can be used by companies to improve their network security and make the system efficient.
As network vulnerabilities are constantly at a rise, network security vulnerabilities are evaluated in three categories i.e. logical security, internal security and external security. The logical security domain will cover technical controls such as deployment of IDS, Virtual LAN, monitoring violation logs, auditing on domain environment, ISA server and VPN security as well.
5 Threats and Vulnerabilities to a network 6 Threats to a network 6 Types of Vulnerabilities 9 Network Security Policy 10 Firewall 11 Internet Protocol Security 11 References 13 Abstract Networks from the time of their birth have come a long way. Initially, they were only used in large firms and businesses.
In the context of network security definition, it consists of concerns linked to network communication privacy, confidentiality of data over the network, accessing unauthorised classified data, access to prohibited network domains and utilising Internet for concealed communication (Network Security.
According to the research findings, it can, therefore, be said that the functionality of DMZ is similar to a proxy server, as the workstations configured in DMZ interact with the public networks. Furthermore, the most significant advantage of a DMZ is that it protects the local area network domains by segregating the network layer.
In the same way, the Internet is a huge network of numerous small and medium networks. Additionally, the Internet has turned out to be an essential part of our lives and business tasks. Though, these advanced technologies offer a large number of benefits and opportunities but they also cause a wide variety of security and privacy issues.
Generally, smartphones have a wide range of applications the most common of which is business and enterprise purposes. The blackberry, a smartphone designed and distributed by Research in Motion (RIM) limited is no doubt among the leaders when it comes to smartphones.
For that matter, secure routing protocols for ad hoc and wireless sensor networks will be precisely looked at considering their policies and methods geared to help them meet their security necessities. Mobile nodes or computers in ad hoc networks collaborate and send packets to each other hence having them communicate past the direct wireless communication range set for them.
Differentiated Services Field is not set. This byte was originally called the Type of Service (ToS) byte, but was redefined by RFC 2474 as the DS Field. It is used for marking packets for the purpose of applying different quality of service QoS) levels to different packets
According to the report for any given organization, network security involves the introduction of polices that would protect the available network to ensure unauthorized persons do not access or use the organizational information. Consequently, internet security has become one of the most researched aspects of information technology.
10 Pages(2500 words)Research Paper
GOT A TRICKY QUESTION? RECEIVE AN ANSWER FROM STUDENTS LIKE YOU!
Let us find you another Research Paper on topic Network Security for FREE!