StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Information Infrastructure - Essay Example

Cite this document
Summary
While the protection of network infrastructures through the utilization of a wide-range of IT software and hardware solutions is an incontrovertible imperative, the physical securitization of networks is as important. Indeed, from a personal perspective, the physical dimension of network security comprises nothing less than the firs line of defense against attacks…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.8% of users find it useful
Information Infrastructure
Read Text Preview

Extract of sample "Information Infrastructure"

Download file to see previous pages

The Internet is an amalgam of thousands of interconnected networks. Some of these networks are vast global networks like Worldcom (MCI) or Cable & Wireless while others are small local networks like a corporation. The individual networks that compose the Internet are commonly called autonomous systems (AS) and number roughly 12,000 active AS'S with 22,000 assigned and roughly 65,000 AS'S possible (Gao 2001). The task of trying to provide a minimum level of security for all these networks is a daunting effort, but one that has been increasingly highlighted as an economic imperative (Lakhina et a1 2002).

The implication here is that despite its depiction by Internet engineers as an "amorphous cloud" (Kostas et al. 1998), has a definite physical structure and hierarchy. In the simplest sense, the Internet is a network - or, more accurately, a network of networks. The Internet is composed of a wide variety of small, medium and large networks that all interconnect to different degrees to give the seamless impression of one big machine to the end-user (Kostas et al. 1998). . Kabay (2005) provides us with a rudimentary framework for the stated by highlighting the obvious importance of location, whether geographic or within the organization.

As regards the geographic aspect, networks should be positioned in a safe neighbourhood, as in one which does not have a high breaking, entry and burglary incident rate, and which is, further, not position in a vulnerable accident area, as in near an airport or by a highway. The implication here is that the first step towards physical security lies in the geographic location of the entity's network system.Within the parameters of location, the second consideration is the location of the network/server within the organization itself.

As Kabay (2005) contends, the network should be positioned for maximum security and, at the same time, easy access. Maximum security implies placement in low risk areas, as in areas which are not vulnerable to external or internal threats. At the same time, the identified maximum security area cannot be such that access to it is problematic (Kabay, 2005).Upon resolution of the location question, physical security issues need to resolved. As noted in the Little Black Book of Computer Security, under no circumstances should unauthorized personnel ever be given the opportunity to access the network, or ICT facilities.

Most obviously, this means that employees should keep doors closed at all times and should an employee step out, he/she must make sure that he/she has closed the door behind him/her. Even though this may sound as an unnecessary statement of the obvious, the fact is that employees often forget this basic rule and, as a result, leave

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Infrastructure Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Information Infrastructure Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/miscellaneous/1501296-information-infrastructure
(Information Infrastructure Essay Example | Topics and Well Written Essays - 1000 Words)
Information Infrastructure Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/miscellaneous/1501296-information-infrastructure.
“Information Infrastructure Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/miscellaneous/1501296-information-infrastructure.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Infrastructure

The contribution of measurement and information infrastructure to TQM success

It was based on the gathered information from the companies on: Customer satisfaction; employee satisfaction; and, process performance.... In the first study in 1992, they had 113 firms which gathered very little information to make judgments of the business impact of TQM....
7 Pages (1750 words) Article

The Nature of Investment in Information Infrastructure

This essay discusses that the more strategic the nature of investment into Information technology infrastructure development, more it will deliver long-term positive benefits.... etalco has largely remained a very conservatively operated company with little or no focus on aligning the various independent information....
3 Pages (750 words) Essay

Cyber Attacks in the United States

Today, USA is heavily dependent on “Information Infrastructure”,this includes information systems, networks, and communication systems.... Since Information Infrastructure is increasingly critical to daily affairs, it has become a growing target for disruption and destruction by terrorsist movements and adversaries of USA.... Cynthia G Wagner, in her article “Countering Cyber Attacks”, reveals that the “Information Infrastructure” is at risk because it is so extensively networked; meaning that damage in one spot launches a chain reaction of problems everywhere....
1 Pages (250 words) Essay

National Counterintelligence

The nation's vital information, infrastructure, military forces, and a wide range of U.... In the paper “National Counterintelligence” the author focuses on a key priority of the National Counterintelligence Strategy Report, which is to prevent spies from corrupting U....
1 Pages (250 words) Essay

Technology

Making a Powerful Connection: The Health of the Public and the National Information Infrastructure.... Making a Powerful Connection: The Health of the Public and the National Information Infrastructure.... Making a Powerful Connection: The Health of the Public and the National Information Infrastructure.... Health Communication and Health information Technology.... ov/2020/topics-objectives/topic/health-communication-and-health-information-technology?...
1 Pages (250 words) Annotated Bibliography

Systems Thinking for Design and Implementation of Infrastructure Systems

This paper ''Systems Thinking for Design and Implementation of Infrastructure Systems'' tells that The design, development, introduction, and use of any Information Infrastructure are usually socio-technical processes that involve intensive negotiations.... It offers a language to describe an Information Infrastructure.... Actor-network theory is relevant in the design and implementation of an infrastructure system because it is grounded on simple observations....
7 Pages (1750 words) Essay

Emerging Technology - The Development of Technology and Information Infrastructure

… The paper "Emerging Technology - The Development of Technology and Information Infrastructure" is an outstanding example of an essay on information technology.... The paper "Emerging Technology - The Development of Technology and Information Infrastructure" is an outstanding example of an essay on information technology.... The development of technology and Information Infrastructure has greatly impacted how companies operate.... With the introduction of information Technology (IT) most businesses have been globalized, they are now able to do business internationally; they are not limited to the areas of their establishment....
8 Pages (2000 words) Essay

Importance of Surveillance in the Media and Digital Labor

The big question from the audience and industries is who controls the media Information Infrastructure.... In a situation where the society is authoritarian, people in power may take advantage of information accessed illegally in the social networks to oppress and benefit individually.... Most of the information communicated in the commercial sector is recorded, stored, and finally used to manipulate commercial online activities without the knowledge or consent of owners....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us