Retrieved from https://studentshare.org/miscellaneous/1547680-security-network-design
https://studentshare.org/miscellaneous/1547680-security-network-design.
Literature Review reveals that there is more to security than just putting up defences. It also relates to the psychology of security that adds to the threat instead of obviating it. Technologically security measures and intrusion capabilities are advancing alongside each other and the race is yet to be decided. Hence it is imperative to tackle this issue more seriously an in a practical way. A case study has been examined to highlight the most common threat of stealing of data for misuse. The findings show that human carelessness and not giving priority to security measures coupled with psychological factors of not being open and forthright mix to result in huge losses.
Business across the world is embracing Information Technology for collecting and dissemination information. This requires Networks to connect various information centres for transfer of this information. The increase in connectivity provides access to larger and varied resources of data more quickly than ever before, and it also provides an access path to the data from virtually anywhere on the network-based environment (Seleznyov, 2001). The Network is usually on Local Area Network (LAN) which is an arrangement of communication between hardware, software and communication devices in a closed area.
Generally LAN’s connecting devices are located within a 2,000-foot radius for maximum effect. LAN’s generally have higher transmission rate than PBXs and use bus or ring topology. The Network itself may be spread worldwide like the World Wide Web. This arrangement makes it possible for the data (text, voices and graphics images, and more recently video clips) to flow between different types of hardware such as mainframes, PCs, terminals and input/output devices through use of various software.
Since a LAN is spread over a defined work space, however large it may be, it is secured by various means against any external intrusions like viruses and malware. Of course no LAN can be
...Download file to see next pages Read More