StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Features for Helping Secure a Computer Network - Research Paper Example

Cite this document
Summary
"Security Features for Helping Secure a Computer Network" paper investigates various security features such as the use of effective antiviruses, the development of effective firewalls, the use of passwords, and dedicated manipulation of the user interface. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92% of users find it useful
Security Features for Helping Secure a Computer Network
Read Text Preview

Extract of sample "Security Features for Helping Secure a Computer Network"

Computer networking Network security is fundamental in the development and sustenance of an effective computer networks.The process of developing such a network must therefore incorporate various security features that will help secure and maintain the integrity of both the data and the various communication channels. The essay below therefor investigates various security features that help secure a computer network. Such include the use of effective antiviruses, the development of effective firewalls, the use of passwords and dedicated manipulation of the user interface. The discussion further analyses the importance of backup as an operation security strategy that helps avail the data stored in the database in case of an external damage. Introduction Security is one of the most fundamental factors in the installation and maintenance of a computer network. This follows the understanding that the information shared on such computer networks is a key asset to the institutions that develop the information system. Computer networks refer to telecommunication networks that permit computers and other similar media to transfer data thus enabling communication. The interconnection of computers among other appliances such as telephones, fax machines and printers thus creates an information network that facilitates communication either within the organization or on a larger context with third parties outside the organization. The integrity of the data flowing within the information system relies on the security features employed by the information technology department in the organization (Wood, 2010). Security of a computer network requires the incorporation of various technologies as essay below elaborates. Among the various security features used in a network is end-to-end encryption, which is arguably the most effective security tool. While not often considered a security feature, end-to-end encryption is a paradigm that permits data protection through a series of encoding and decoding through appropriate platforms only. This allows for selective access to the information communicated through the network thus maintaining a degree of integrity in the entire communication process. The party that originates the data encrypts to an appropriate format conveyable through the network while the receiving party decrypts the data thereby obtaining the intended message. The process is simple but requires an effective utilization of appropriate resources in order to maintain the fidelity of the data communicated in any network. Furthermore, while end-to-end encryption promises more fidelity, it equally relies other security features of the network in order to maintain the security and integrity of the data communicated in the computer network. Among other security features that sustain the security of a network include network surveillance and network security both of which work concurrently with encryption in most cases thereby safeguarding the security of the network. Computer networks facilitate the sharing of files among other modes of communication. The type of a network depends on its uses and may include intranets such as Local Area Networks and Wide Area Network both of which permit communication within organization and the internet, which connects an organization to other users throughout the world. Regardless of the network type, communication through the networks is multi layered thereby permitting specific levels of access to the organizations’ databases (Simmonds, Sandilands & Van, 2004). This ensures that a manager for example access particular information while a customer access another. Either the connection of the elements in a computer network are wired or wireless, a wired network consists of routers, switches, computers and data cables, which facilitate the flow of data thus enabling communication. Wireless networks on the other hand rely on various technologies including the use of satellite, terrestrial microwave and radio spectrum among many others. Regardless of the technology used in the creation of the network, the security of the information system relies of specific intricate features of the system. Among the security features include the creation of firewalls. Firewalls are among the most effective surveillance techniques used in communication networks. Firewalls are boundaries that prevent external access of the database. They are programs that make it difficult for anyone without the appropriate protocols to enter the networks. Besides their dedicated deterrent of any unwarranted access, firewalls also monitor movement around the network thereby notifying any technician of an attempted entry into the network. This way, firewalls investigate and avail the internet protocol address of every computer that tries accessing the network thus facilitating an investigation into any of an unwarranted access of the network. Another equally effective security measure is the use of password to access a database within the network. Passwords are effective encryptions of digits unknown to the computer platform itself. The computer matches the digits entered by a user of the network to previously saved codes before permitting access to the network. The codes remain unknown to any third party including the computer itself, this implies that for anyone to access the database, they must obtain the password from a user of the network. This improves the security of the network since every user of the network retains a unique password. This limits the use of the network to the permitted users within the organization all of who access various sections of the database thereby maintaining an integrity of both the data and the communication process. Another great source of data interference in any communication network is virus infection. Computer viruses are programs developed and introduced to the network by malicious users who seek to hamper the operation of the network. Different viruses have different effects on both the database and the computer platforms used in the network. Other viruses replicate the data indiscriminately thereby filling the storage media thus corrupting their usability while other auto deletes the databases thereby eliminating the data. Others still convert the data on a database to unknown formats thereby rendering the files inaccessible to the users of the network. To prevent viral infection, the efficacy of a network relies on the installation of antiviruses, effective programs that delete the viruses thereby restoring the functionality of the computers and other similar media used to store the data (Andersen, Balakrishnan & Kaashoek, 2001). Antiviruses are also other effective surveillance features employable on the network. Just as the firewalls, antiviruses stay active and operational throughout the life of the network provided they are update frequently. They therefore maintain a dedicated surveillance of the network often deleting viruses and report the same as they enter the network. As foreign bodies, viruses enter the network only through third party introduction. The users of the network may introduce the viruses accidentally by using infected media such as flash disks among other secondary data storage facilities. The other potential sources of viruses include hackers who seek to either obtain or destroy the information stored on a database or through communication through the internet, which presents an omnipresent source of threat. An updated antivirus will therefore maintain the integrity of the database by deleting the viruses as they enter the network. Another equally effective security feature on a computer network is the user interface. This refers to the platform, always a computer monitor used to access the network. Each user of the network uses a specific interface, which may include a personal computer, a laptop, tablet or even a smart phone. Each of the gadgets named above has a dedicated monitor with various features that influence the usability of both the gadgets and the entire network. Through the customization of the interface, a user ensures a unique access of the network since such users employ strategic features known only to them to permit access of the network. Among the elements of an interface that makes one unique, include the theme colors, images and pictures that may easily represent intricate features of the network known only to the specific user. This way, the access of the network remains a unique affair and any third party who accesses a gadget may not easily navigate the interface in order to access the database. Besides the various security features discussed above, another precautionary feature may save the database and the entire network in the event of an external damage through such calamities as fire, earthquake and theft of instruments among many others. Back up is a precautionary method through which users of the network replicates their databases and stores them in secondary media for use in the case of a destruction of their databases. A backup is a secondary database stored on a secondary media such an external hard drive or even on the cyber space (Wakeman, 1992). This way, the system avails the information in case the original database is corrupt or damaged. In retrospect, the security of a database ensures the efficient use of the computer network. Users of the computer network must therefore employ strategic features to ensure the efficiency of the network and integrity of the data stored on the database through the employment of effective and dedicated security features. End to end encryption of data in the network is one of the efficient and foolproof ways of ensuring the security of the network. References Andersen, D. Balakrishnan, H & Kaashoek, M. (2001). Resilient Overlay Networks. Association for Computing Machinery. Simmonds, A., Sandilands, P. & Van E. L. (2004). "An Ontology for Network Security Attack". Lecture Notes in Computer Science. Lecture Notes in Computer Science 3285: 317–323. Wakeman, I (Jan. 1992). "Layering considered harmful". IEEE Network: pp. 20–24. Wood, J. (2010). "The Darknet: A Digital Copyright Revolution". Richmond Journal of Law and Technology 16 (4). Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Networking Research Paper Example | Topics and Well Written Essays - 1250 words”, n.d.)
Computer Networking Research Paper Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/information-technology/1626303-computer-networking
(Computer Networking Research Paper Example | Topics and Well Written Essays - 1250 Words)
Computer Networking Research Paper Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1626303-computer-networking.
“Computer Networking Research Paper Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1626303-computer-networking.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Features for Helping Secure a Computer Network

The Importance of Digital Security

network Threats Routers, switches and firewalls make up the infrastructure of network.... The paper aims the importance of digital security.... Organizations are at a greater risk and more prone to digital security threats than individuals, as hackers find it more rewarding breaching their security boundaries.... The most essential need of every single organization is the digital security.... Most importantly, the effective internet security has become a dire need for any kind of organization, small, medium or large which use the information technology and web based services to carry out their work in an easy and effective manner....
14 Pages (3500 words) Essay

Network Security

Jackson's book takes a very specific approach to computer network security at all levels.... The author gives a large overview of Jackson, Chris "network security auditing", Harrington Jan "network security: A Practical approach", Douglas Comer “Computer Networks and Internets” and other works on the topic of network security.... Current annotated bibliography includes Winkler Vic "Securing the Cloud: Cloud Computer Security Techniques and Tactics", Chey Cobb "network security for dummies", Cole Eric "Networking security bible", Donahue Gary network Warrior" and other books on the stated topic....
18 Pages (4500 words) Annotated Bibliography

Network Security Risk Assessment

The hardware within information systems includes the physical aspects of the system such as computer components and the related equipment.... The necessity of the company assets is revealed by their role in helping the company to make its supply chain management business possible.... he increasing complexity of information systems has resulted to information security threats .... The increasing complexity of information systems has resulted to information security threats which have infringed the right of individuals to privacy of information....
9 Pages (2250 words) Term Paper

Network Security and Its Business Impact in Educational Institutions

This dissertation "network Security and Its Business Impact in Educational Institutions" analyzes that the business impacts of combined wireless and wired network security in educational institutions.... The benefits associated with the usage of a combined network are better speed.... The research is set in colleges in the context of improvising the security of the college network.... network security has become a major issue in the business world....
56 Pages (14000 words) Dissertation

Computer Information Security Certification

This paper ''computer Information Security Certification'' has provided an analytical discussion and evaluation of various certifications in information security and presented the work that the certified individuals are mandated to perform.... computer Information Security Certification Cisco Certified Internetwork Expert (CCIE) certification is offered by Cisco.... Moreover, it is offered to computer professionals globally.... To earn this certification one ought to have four years experience in information technology and computer field although not necessary in high tech position....
8 Pages (2000 words) Research Paper

Forensic Computing and Identity Theft

The crimes include misuse of computer systems, attacks on computer systems, using a computer system to work against another system, failure of a computer system, and the list continues.... This essay "Forensic Computing and Identity Theft" discusses identity theft and respective computer forensics techniques and investigation.... Forensics is the structured procedure of gathering, examining, and showing facts and evidence to the court of law, and thus, forensic computing is defined as 'the discipline that combines elements of law and computer science to collect and analyze data from computer systems, networks, wireless communications, and storage devices in a way that is admissible as evidence in a court of law'....
16 Pages (4000 words) Essay

Network Security and Growing Problems Protecting your Privacy

he typical hacker that finds ways to steal private information are not industry IT or IS professionals but enthusiast that are technically savvy enough to understand the inner workings of a computer and software language to control them.... In the last decade, federal governments like the FBI and other organizations have supported the Cyber command battling computer intrusions to fend of attacks network systems.... he problem with network systems security is how easy a hacker can access your system to gain what the criminal is targeting....
18 Pages (4500 words) Research Paper

Key Distribution Schemes for Wireless Networks

Wireless network SecurityKey Distribution SchemesIntroductionWireless network security is critical and they must have sufficient security similar to their wired counterpart.... However, wireless networks security is far more complicated than wired since Wireless network SecurityKey Distribution SchemesIntroductionWireless network security is critical and they must have sufficient security similar to their wired counterpart.... This is because wireless transmitted data can be breached while in transit without physical contact with network devices....
14 Pages (3500 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us