Free

The most important threat to network security - Assignment Example

Comments (0) Cite this document
Summary
With the ever advancing technology, these parties have opted to embrace authentication as one way of securing their information against malicious internet…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
The most important threat to network security
Read TextPreview

Extract of sample "The most important threat to network security"

Authentication is a Threat in Network Security Number) May 7, (Faculty) Authentication is a Threat in Network Security Network security has risen to be a matter of prime concern to private network users, organizations and the military as well. With the ever advancing technology, these parties have opted to embrace authentication as one way of securing their information against malicious internet users. One thing that many people fail to take into consideration is that authentication itself is the most important threat in network security and we are just about to find out how in this study. “Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be.” (Rouse 2000-2015). Authentication works on the principles that the presented data must match the data that is already in the database and this is where it can also be turned into the main threat.
Featuring authentication as a major threat in network security is based on the fact that user access is granted based on database information. The authentication system can grant access to about anyone who provides similar data to the one pre-stored in the database system. Therefore the person does not have to be the real owner of the information in order to access it. This information could have been phished, eavesdropped or generally illegally obtained from a target victim. Now, authentication proves to be an important threat as it used by almost everyone across the globe and is thus a gateway through many secured systems.
From the above discussion we can conclude that authentication remains to be a living matter in internet security. As technology gets better and more advanced, malicious internet users exploit the slightest weaknesses in authentication systems using the very advanced technology meant to provide protection.
Reference
Rouse, M. (2000-2015). Authentication. Tech Target. Retrieved on: May 7, 2015. Retrieved from: http://www.searchsecurity.techtarget.com/definition/authentication Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The most important threat to network security Assignment”, n.d.)
The most important threat to network security Assignment. Retrieved from https://studentshare.org/information-technology/1693688-the-most-important-threat-to-network-security
(The Most Important Threat to Network Security Assignment)
The Most Important Threat to Network Security Assignment. https://studentshare.org/information-technology/1693688-the-most-important-threat-to-network-security.
“The Most Important Threat to Network Security Assignment”, n.d. https://studentshare.org/information-technology/1693688-the-most-important-threat-to-network-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF The most important threat to network security

Network security

...capture signals in the air such as router. The wireless networks can be accessed illegally for wrong purposes such as retrieval of personal information, theft, hacking and damaging data. For securing wireless networks, wireless intrusion prevention systems and wireless intrusion detection systems are used. Wireless networks are gaining popularity day by day and because of its extended usage, the security threats to wireless networks are a crucial issue. All the malicious means to access wireless networks need to be analyzed so that proper preventive steps can be taken for the provision of...
50 Pages(12500 words)Dissertation

What is security Why network security is important

.... In spite of securing the networks and data centers, with the most updated and advanced security modules, there is still a probability of a new threat to intrude into the network. In addition, hackers and cyber criminals are exploring efficient codes day by day to improve the hacking software, in order to breach in to classified information, banks, online websites etc. As the threats and vulnerabilities are infinite, no one can memorize them in order to take a measured approach, the initial step is to identify the vulnerability type. An organization named as CVE (Common Vulnerabilities and Exposure) provides a database...
9 Pages(2250 words)Coursework

Network Security

...the networks and data centers, with the most updated and advanced security modules, there is still a probability of a new threat to break into the network. In addition, hackers and cyber criminals are exploring efficient codes day by day to advance the hacking tools, in order to breach in to classified information, banks and website customer details, etc. In the end, the mission critical data is compromised, resulting in harsh losses for organisations. Electronic Mail (Email) provides a communication method that is widely adopted. Furthermore, confidential and sensitive information often travels through this communication mechanism. Consequently,...
24 Pages(6000 words)Essay

Network Security

...between an optimistic user practice as well as having admittance to business sensitive data across the corporate (Global Crossing; Daya; Mukherjee; NetworkTutorials). Conclusion Networking technology is certainly the most amazing achievement in this era. Additionally, the network security has become a challenging job for the companies. Normally, network security encompasses rules and regulations and measures a company can apply to protect its computer network, and it is a prime concern for every company that uses computers. In addition, if businesses do not implement appropriate network...
13 Pages(3250 words)Research Paper

Network security

...their staff members. The staff members must have knowledge of network security such as what is network security, why it is important and how should it be implemented. They should be provided with tips, guidelines and manuals. The staff must be trained regarding latest emerging security threats, viruses and their effects. They should also be trained regarding how to deal with these threats. Update Passwords Staff members should keep their username and password safe and do not share with any other person. They should regularly change their passwords and do not set their passwords as their names and data of...
5 Pages(1250 words)Essay

Network Security

...the device, and also render it unusable by locking all its functional operations. Reference List BlackBerry Overview, viewed 3 April 2013, http://na.blackberry.com/. BlackBerry Supporforums, 2009, Java Development, viewed 3 April 2013 Network-API-alternative-for-legacy-OS/ta-p/614822> Defense Information Systems Agency 2011, Blackberry Technology Overview (For Blackberry Enterprise Server 4.1.X & 5.0.X), Version 1, Release 3. Government of Canada 2002, Personal Digital Assistant Vulnerability Assessment (PDA VA) (ITSPSR-18), IT Security Products/ systems Report, Communications Security Establishment (CSE). Granetto, P 2009,...
7 Pages(1750 words)Essay

Network Security

...? Case Study on Network Security Bryant Wiersema American Public Case Study on Network Security Introduction The Internet has become a staple of the business world today. It is because of this that a company should remain continually up to date with the latest and most efficient security measures. With the dramatic growth in network reliance also comes the opportunity for illegal and malicious activity. One of the major computing challenges in today’s economy is the task of adequately securing a network - ensuring sensitive data is not compromised. Vulnerabilities due to designs flaws,...
3 Pages(750 words)Case Study

Network security

..., and hackers etc. the security policy’s most immediate and permanent requirement is eternal vigilance. Some online merchants are hesitant to ship to international addresses because of the reasons that there are always physical risks attached with the IT infrastructures due to fires and floods. There are threats to the data posed to the software, files, data basis, by the viruses, Trojan horses, software bugs, server crashes, credit and payment frauds, and malicious attacks by inside or outside of business and human error of deletion of data by unskilled employees. An e-commerce business organization might not want to report being the target...
6 Pages(1500 words)Essay

Network security

...Network security s of Learning Discuss the term confidentiality as it applies to data. How can data confidentiality be assured on a network? Data confidentiality entails allowing authorized users to access particular data, while preventing unauthorized access of data by intruders. When access eavesdrops into particular data, the principle of confidentiality will not hold. In networks, encryption is the principle techniques of maintain data confidentiality. This process is achieved using encryption algorithms that are used to generate keys for encrypting and decrypting data. 2. Explain the concept of technical security controls. What are some the major components that make up technical control? Technical security controls are used... to...
2 Pages(500 words)Essay

Attack metholodgies ( network security )

...and eavesdropping The spoofing and eavesdropping network attack methodology comprises of the computer system hackers and pirates configuring and then installing programs that either mimic or copy the information flow into the computer network security system [9]. Once the data has been mimicked or copied, it can then be easily retrieved by the hackers, and used to access the other important information related to the network security system. This threat is most especially targeted at computer network security systems with activated broadcast network...
7 Pages(1750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic The most important threat to network security for FREE!

Contact Us