StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The most important threat to network security - Assignment Example

Cite this document
Summary
With the ever advancing technology, these parties have opted to embrace authentication as one way of securing their information against malicious internet…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.7% of users find it useful
The most important threat to network security
Read Text Preview

Extract of sample "The most important threat to network security"

Authentication is a Threat in Network Security Number) May 7, (Faculty) Authentication is a Threat in Network Security Network security has risen to be a matter of prime concern to private network users, organizations and the military as well. With the ever advancing technology, these parties have opted to embrace authentication as one way of securing their information against malicious internet users. One thing that many people fail to take into consideration is that authentication itself is the most important threat in network security and we are just about to find out how in this study.

“Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be.” (Rouse 2000-2015). Authentication works on the principles that the presented data must match the data that is already in the database and this is where it can also be turned into the main threat. Featuring authentication as a major threat in network security is based on the fact that user access is granted based on database information. The authentication system can grant access to about anyone who provides similar data to the one pre-stored in the database system.

Therefore the person does not have to be the real owner of the information in order to access it. This information could have been phished, eavesdropped or generally illegally obtained from a target victim. Now, authentication proves to be an important threat as it used by almost everyone across the globe and is thus a gateway through many secured systems. From the above discussion we can conclude that authentication remains to be a living matter in internet security. As technology gets better and more advanced, malicious internet users exploit the slightest weaknesses in authentication systems using the very advanced technology meant to provide protection.

ReferenceRouse, M. (2000-2015). Authentication. Tech Target. Retrieved on: May 7, 2015. Retrieved from: http://www.searchsecurity.techtarget.com/definition/authentication

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The most important threat to network security Assignment”, n.d.)
The most important threat to network security Assignment. Retrieved from https://studentshare.org/information-technology/1693688-the-most-important-threat-to-network-security
(The Most Important Threat to Network Security Assignment)
The Most Important Threat to Network Security Assignment. https://studentshare.org/information-technology/1693688-the-most-important-threat-to-network-security.
“The Most Important Threat to Network Security Assignment”, n.d. https://studentshare.org/information-technology/1693688-the-most-important-threat-to-network-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF The most important threat to network security

Practical UNIX Security

CVE's common identifiers make it easier to share data across separate network security”.... In spite of securing the networks and data centers, with the most updated and advanced security modules, there is still a probability of a new threat to intrude into the network.... Moreover, hardware security modules taken into consideration for securing highly classified data.... The goal is to provide common names for all publicly known security threats and exposures....
8 Pages (2000 words) Assignment

Importance of Information Security

Name: Title: Course: Tutor: Date: Importance of Information security The internet is a global collection of networks accessible by various computer hosts in varied ways.... Information security has been inherently recognized as interdepartmental and interdisciplinary and quickly rising to be inter-organizational.... There are important concepts in as far as information security is concerned, namely; availability, integrity and confidentiality....
4 Pages (1000 words) Essay

Cyber Threats

With cybercrime becoming a threat to many organizations, there are many threats that have been recognized and pose to be a threat to the normal operations of an organization.... With cybercrime becoming a threat to many organizations, there are many threats that have been recognized and pose to be a threat to the normal operations of an organization.... ARP poisoning Address Resolution Protocol spoofing, also referred to as ARP flooding, or ARP poisoning/ARP poison routing is a mechanism that is employed when one wants to attack an Ethernet wireless or wired network....
5 Pages (1250 words) Assignment

The Myths of Negotiating Dark Networks

In the report “The Myths of Negotiating Dark Networks” the author takes a critical view of the emergent paradigm of “dark networks” within international relations, which emphasizes the threats to international security from global networks of terrorism, drug and nuclear materials smuggling, and insurgency.... The Myths of Negotiating Dark Networks Mette Eilstrup-Sangiovanni and Calvert Jones (2008) take a critical view of the emergent paradigm of “dark networks” within international relations, which emphasizes the threats to international security from global networks of terrorism, drug and nuclear materials smuggling, and insurgency....
2 Pages (500 words) Article

Rapid Freight Converged Network Security

?network security firewalls & VPNs.... hellip; Implementation of the system introduces some security challenges.... The network will also enable ease of monitoring all aspects of the organization while reducing challenges in security (Paul, 2011).... mplementation of the system introduces some security challenges.... Intrusion Detection and Prevention software (IDS and IPS) will further enhance overall security by scanning entire network to identify and report signatures or suspicious traffic arrays (Gregory et al, 2007)....
2 Pages (500 words) Case Study

Enigma Security Services - Most Important Threats and Assets

The following provides some of the most important threats that the company needs to attend to immediately.... As such, the company admits 1000 persons into the company on a daily basis that can be a source of threat to the operations of the company, especially on its IT security systems.... The paper "Enigma Security Services - most important Threats and Assets" describes that the processes of setting up security policies for the company must be in line with the legal provisions, as well as uphold the rights, freedom, and privileges of the staff at the company....
12 Pages (3000 words) Coursework

Important and Critical Data of Business

Establishing suitable information service level agreements from service providers, security policies and procedures are essential for any DRP.... The paper 'important and Critical Data of Business' focuses on information which is the lifeblood of today's business organizations, and loss of data means loss of business services and loss of revenue.... Therefore it is necessary to backup important and critical data of the business.... Backup plan: Backup plans are an essential part of any company's disaster recovery plan for backing up important business information....
9 Pages (2250 words) Term Paper

The IT Infrastructure of the Pharmacy Business

IT security should focus on aspects such as network security, physical security as well as data security (Olzak, 2010).... The paper 'The IT Infrastructure of the Pharmacy Business' focuses on Information security which is a particular approach of protecting confidential data within a computer security system.... hellip; The author of the paper states that business units in the present day context have been under high alert with regard to their security towards information from cybercriminals....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us