StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Network Security Principles - Essay Example

Cite this document
Summary
NETWORK SECURITY PRINCIPLES Network Security Principles Author Author Affiliation Date Network security is a set of rules and regulations that a business organization must follow in order to protect its computer system. At the present, network security is a major concern for each business in which computers are utilized to a great extent…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.6% of users find it useful
Network Security Principles
Read Text Preview

Extract of sample "Network Security Principles"

Download file to see previous pages

In other words, in order to ensure network security computer users must follow security plan or guidelines (Laudon & Laudon, 1999; Kaminsky, 2010; Ray, 2004). In the past few years several technologies have emerged throughout the whole globe and networking technology is without doubt the most amazing achievement in this era. On the other hand, security has turned out to be a challenging task for present network administration. In fact, the advancements of information technology have also offered a lot of benefits for the negative minded people.

Now they have a wide variety of tools and technology which they can use to get illegal access to a network. In this scenario, it is essential for an organization to implement strict security policy. However, if an organization fails to put into practice an effective network security then an attacker or competitor can get access and use the important or secret data and information, probably causing data destruction or damage, or even the entire destruction of the computer network (Kaminsky & Foster, What is Network Security?

, 2011; Armoni, 2002; Bhattacharya & Ghosh, 2009). It is an admitted fact that the emergence of the Internet has modernized our lives. On the other hand, it has as well introduced some of the severe safety and confidentiality issues. These issues can be tremendously devastating for private information. Hence, in an attempt to effectively deal with these issues organizations use network security rules and measures (Kaminsky & Foster, What is Network Security? , 2011; Armoni, 2002; Bhattacharya & Ghosh, 2009).

As discussed above to deal with network security threats and an organization must implement an effective security policy. This policy should be an agreement, explaining in depth the organization’s decisive resources and how sound they are organized. In fact, the fundamental aim of creating a network security policy is to provide the organizational employees with a brief outline of the "acceptable usage" of some of the business information and resources. Additionally, this policy is also intended to adeptly illustrate the permissible rights of workers and as a result employing them in securing the data and information.

In actual fact, a security plan works like a "must interpret" fashion of business information for everyone exploiting in any form, computer and network resources are believed to be possible targets. On the other hand, a high level and excellently created security policy is supposed to tackle some these subsequent fundamentals: (Danchev, 2003; Kim, Lee, Han, & Kim, 2009) How vulnerable business data must be organized and managed How passwords and other credentials have to be maintained securely How to respond to a possible security issue, disruption efforts, etc.

How to make use of resources such as computers and the Internet in a better way How to properly make use of the business communication infrastructure In general, the most important reasons following the creation of a security policy is to establish an organization’s private data and information security basics. Another aspect is to inform to workers how they are responsible for the security of business resources and assets, and give emphasis to the implication of taking benefit from secured business communic

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Security Principles Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1448769-how-can-you-incorporate-network-security
(Network Security Principles Essay Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/information-technology/1448769-how-can-you-incorporate-network-security.
“Network Security Principles Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1448769-how-can-you-incorporate-network-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Security Principles

Information Security

Fundamental Issues in network security Introduction Before going into the discussion regarding fundamental issues in network security, let us get a better understanding of what network security actually is and why is it important in the present world.... hellip; network security is a strategy that is used to protect computer networks from different sorts of threats by identifying the potential threats to the networks and then applying the most appropriate measures to combat the identified threats....
5 Pages (1250 words) Research Paper

Networks and Security

Networks & security Customer Inserts His/Her Name Customer Inserts Grade Course Customer Inserts 17th April, 2012 Question 1 Confidentiality is the act of non-disclosure of information to unauthorized persons or individuals.... This mechanism is effective in ensuring security of the data sent is highly secured.... Random nonces are effective in providing adequate security especially when sending repeated messages over the same network.... The main purpose of random nonce is to provide encryption and data security for messages or records....
3 Pages (750 words) Assignment

The System Design and Implementation Process of the Network

The network security officer should ensure that the user accounts.... hellip; Research has shown that most organization's network security is compromised due to the failure to observe the security policy.... These are network topology, the protocol, internet connection, and network security.... Besides, it should ensure maximum security to the company's information system assets.... The paper "The System Design and Implementation Process of the network" looks into the user account management....
6 Pages (1500 words) Assignment

The Assumption from the Network Diagram

Another assumption from the topology would be the company is using an out dated network security policy.... Other assumption shall be there no security measures which have been employed in the network thus the numerous attacks and defacing.... It uses access lists and other methods to ensure the security of the private network.... Proxy is another security measure that can be deployed.... It would also have all the servers well placed in order to ensure data security, availability, integrity and confidentiality...
5 Pages (1250 words) Case Study

Week 6 Case Study 2 Submission

Cryptography and network security, principles and practice.... One of the principles of PKI is to establish a trust hierarchy (U.... With the current trends in technology, there is the emergence of complex systems, automated business transactions, and e-commerce applications that need the installation of complex and rigorous security measures.... Public key cryptography is a security technology that is known for… For the Software Company to achieve this security assurance there must be careful planning for the infrastructure....
2 Pages (500 words) Assignment

Is DES cipher not security anymore

?Cryptography and network security: principles and practice.... This is further compounded by the fact that while it may have cost EFF $250,000 to successfully crack DES in 1998, it can now Is DES Cipher not security Anymore?... Insert (s) Is DES Cipher not security Anymore?... I agree with EFF that Data Encryption Standard (DES) cipher is not anymore security.... 3), DES may still provide security if used in situations involving no real threats such as when encrypting files on a family PC....
1 Pages (250 words) Essay

The Strategies Applied in Computer Security

… Computer SecurityIntroductionSeveral businesses are required to allow authorized access from distinctive security domains.... This is simply because new data applications exists, which introduces very complex to data security administrators.... The Computer SecurityIntroductionSeveral businesses are required to allow authorized access from distinctive security domains.... This is simply because new data applications exists, which introduces very complex to data security administrators....
8 Pages (2000 words) Assignment

Security in Wireless Network

Issues of network security are currently becoming essential as society is in the movement towards the age of digital information.... The emergence of the security protocol as well as IT Governance has played a great role in ensuring network security (Xiao, Shen, X, & Du, 2011).... The system of network security relies on the protection layers and comprises numerous constituents including security software and networking besides appliances and hardware....
8 Pages (2000 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us