StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Aspects of Network Security Management - Essay Example

Cite this document
Summary
The essay "Aspects of Network Security Management" focuses on the critical analysis of the comprehensive overview and analysis of some of the main aspects of network security as well as its management. The new technology has evolved to a huge extent…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.9% of users find it useful
Aspects of Network Security Management
Read Text Preview

Extract of sample "Aspects of Network Security Management"

NETWORK SECURITY Network Security In the present era the new technology has definitely evolved to a huge extent. New business and corporate management systems are offered to perform business operations in diverse areas of the corporation. In this scenario internet along with information systems have turned out to be an essential part of our lives as well as other working areas. However these systems also encompass some of the grim security and privacy related issues. These issues can be extremely dangerous for personal information or details safety and seclusion. In this scenario network management systems and procedures are used for enhanced handling and management of various aspects regarding network security. Network Security encompasses the actions that an organization or else business implement to protect its computer system, plus it is a prime concern proposed for each business in which computers are utilized to a great extent. Compromised network security risk means that a business opponent otherwise a hacker can gain access to the sensitive or vital information, which results in entirety destruction business or personal information pertaining to a particular system or data loss. Suitable network security is attained when a user has to experience a number of security layers before being capable to get right of entry to the desired business or any information network. It is assessed that more layers of network security result in the more secure network as well as working environment (Laudon & Laudon, 1999; Ray, 2004; Kaminsky, 2010). This paper will present a comprehensive overview and analysis of some of the main aspects of the network security as well as its management. At the present, network security has become a hot topic that demands a massive public and organizational awareness. This paper is aimed to proficiently evaluate and analyze some of the core issues regarding the network security, its main concerns and possible solutions to manage and protect the network security. New technology supported computer systems have turned out to be a vital part of our life especially for the business however network security vulnerabilities are incredible so as to we typically get frightened as well as listen to frequently. Present network security issues are everywhere whether it is a computer system being utilized in a big business/organization or else it is a private workstation. In case of network security every computer requires to be secured as of the computer network dangers as well as security dangers. Every time when we use the new computer system we are having some sort of security risks plus dangers like revealing of personal information, credit card theft, identity theft, hacking, data outflow, virus attacks, Denial of Service attacks and data corruption. We also have made willingly unsecured to diverse threats of network security such as various viruses and a lot of other security problems. The biggest issues and risks presently seen are about the personal information hacking or in other words we can presume the hacking of financial matters (NetworkSecurityThreats, 2010; Turban, Leidner, McLean, & Wetherbe, 2005). To analyze network security issues a research carried out by the event administration and security information suppliers netForensics, has revealed that 80 percent of IT executives anticipate network-abided dangers that has augmented all through the year 2010 and 2011, 85 percent of IT executives are observing that their corporate network security location is turning out to be more and more harder and complicated (Schwartz, 2010). There are lots of security aspects that can create serious problems in addition to security dangers for the network structures. Below these problems will be discussed in detail (Curtin, 1997; Rhodes-Ousley, Bragg, & Strassberg, 2003; Sudin, Tretiakov, Ali, & Rusli, 2008). The biggest and main network security problems that can be seen in network security aspects are known as DoS attack or Denial-of-Service attacks. This type of network security attack is taken as the most serious, worst, and harder to tackle network security attack. In this type of network security attack a huge number of networks traffic is sent toward our business network server that makes it dump (inability to provide response to any arriving request). This type of network security attack disables the operational power of the network and makes it useless for business working plus operations (Curtin, 1997; Hughes, 2009). Another security challenge is unauthorized access to the network. This type of risk can happen both from inside as well as also from outside of the organization. In this type of network security attack a business faces illegal or un-authorized access to the business network that leads to possible damage or else theft of business private or personal data. The basic intention of these attacks is to gain a way to some resource that our network system should not offer the intruder in a simple way. The possible reason of such attacks is weak and easy password or clashes among internal staff (Curtin, 1997; Hughes, 2009). The data diddler is probably the most horrible kind of network security attack, as in reality the Data Diddling attack involves burgle which may perhaps not be observed instantly. So in this type of attack, the invader or attacker modifies the original contents of information with the wrong one that leads to possible drastic outcomes for the business as well as for several individual (Curtin, 1997). The data destruction is another type of security threat. This type of attack is involving some type of virus as well as worm attack into the network security system that leads to higher damage to the business or personal data files. So in this type of attack an attacker sends some sort of spy-ware, virus or worn to the host system that lead to destruction of all data residing in that particular system (Curtin, 1997; Hughes, 2009). Another type of security threat is known as virus attack. In this type of network security attacks the nasty programs called virus attacks the systems and destroys the overall data plus contents of the system. In this type of attack a virus program enters to the system and causes a huge destruction to data as well as information files (Karygiannis & Owens, 2002). One of the major intentions of an illegal network security access attack is to set up application software on the host computer or some sort of network system. The worm is a type of computer program that conceals its existence as of the user/administrator of the system for an extensive time. The worm will carry out operations regarding whatever directions specified to it through its creator or in general known as cracker. This type attacks are used for information theft as well as Data Diddling (Hughes, 2009). Now this paper discusses some of the main techniques and methods for an effective safety and security management for the network: One of the best and most effective techniques used today is the encryption that conceals the original contents of information through employing some key. In this way the hacker or security breaker cannot be competent to perceive or view business or else personal information because of its unreadable format (referenceforbusiness, 2010; Turban, Leidner, McLean, & Wetherbe, 2005). Another main biggest network security management tool is "firewall" which is a software protection program used by a lot of businesses. This type of network security management tool helps in case of effective handling plus management of the network security issues. In this scenario this system scans all the incoming traffic to a network and gives warning and then stops any illegal network security contravene (referenceforbusiness, 2010; Shelly, Cashman, & Vermaat, 2005). In case of network security management antivirus systems performs a great role. This type of application scans the data as well as traffic in the system and then protects the system from any possible attack which can take place from external as well internal sources (Shelly, Cashman, & Vermaat, 2005)1. In case of network environment management needs to protect the business or corporate network through use of some identity and access management technique. In this situation they can use strong password and unique username based access to the network (Novell Solutions, 2010). For the implementation of some enhanced techniques for the network, there is need of an effective framework for such protection management design application. Below is a comprehensive and stepwise framework for the network security management application: Secure At this stage we lock our communication networks by an arrangement of corroboration, firewalls, encryption and constant scrapping of system weaknesses (HP, 2010). Examine In this condition of network security management area we uphold a safe network that have to frequently screen the status of safety methods, willingness, plus event management methodologies (HP, 2010). Test This stage is about the testing and evaluation of potential network security attack. In this connection we test for friendly user or else attacker that can contravene the network safety. Here we test for the competent network areas and check that whether the present program can cause some destruction to our network (HP, 2010). Enhance In this stage of network security management we enhance the overall working of the system as well as network through disabling the possible threat plus provide some feasible solution in case of neutralizing the potential attack on user security (HP, 2010). In conclusion, this paper has presented a comprehensive analysis of some of the prime areas as well as issues of the network security and its management. This paper has discussed a comprehensive overview of some of the main aspects of network security issues, their possible impacts along with technologies ad diverse techniques to neutralize these dangers. I hope this paper will be helpful in getting a better overview of a number of key aspects of network security management and handling. References 1. Curtin, M. (1997, March). Introduction to Network Security. Retrieved December 03, 2010, from Interhack.net: http://www.interhack.net/pubs/network-security/ 2. HP. (2010). Network Security Threats. Retrieved 12 02, 2010, from http://docs.google.com/viewer?a=v&q=cache:ZkkqKPK8EncJ:www.score.org/downloads/HP_BC_Network%2520Security%2520Threats.doc+network+security+threats&hl=en&gl=pk&pid=bl&srcid=ADGEESg9LhQAfhpIWoI_5RrT-1vfFWM1xep3cPLoU03WGsyC5MhFEgFuttoXHAvy0pCtdKlvLxXK-fSgaxE 3. Hughes, J. (2009, February 20). What Types of Network Security Attacks are Perpetrated? Retrieved December 02, 2010, from OpenXtra.co.uk: http://www.openxtra.co.uk/articles/network-attacks-types#ixzz171U9tvpn 4. Kaminsky, A. (2010, September 18). What is Network Security? Retrieved December 02, 2010, from WiseGeek.com: http://www.wisegeek.com/what-is-network-security.htm 5. Karygiannis, T., & Owens, L. (2002). Wireless Network Security 802.11, Bluetooth and Handheld Devices. National Institute of Standards and Technology. 6. Laudon, K. C., & Laudon, J. P. (1999). Management Information Systems (Sixth ed.). New Jersey: Prentice Hall. 7. Microsoft. (2010). Common Types of Network Attacks. Retrieved December 02, 2010, from http://technet.microsoft.com/en-us/library/cc959354.aspx 8. NetworkSecurityThreats. (2010, May 0). Network Security Threats Explained. Retrieved December 04, 2010, from http://networksecuritythreats.org/network-security/network-security-threats-explained/ 9. Novell Solutions. (2010). Identity and Security. Retrieved December 02, 2010, from http://www.novell.com/solutions/identity-and-security/ 10. Ray, R. (2004). Technology Solutions for Growing Businesses. New York: American Management Association (AMACOM). 11. referenceforbusiness. (2010). COMPUTER SECURITY . Retrieved 12 2, 2010, from http://www.referenceforbusiness.com/encyclopedia/Clo-Con/Computer-Security.html 12. Rhodes-Ousley, M., Bragg, R., & Strassberg, K. (2003). Network Security: The Complete Reference, 1st edition. New York: McGraw-Hill Osborne Media. 13. Schwartz, M. J. (2010, June 25). Network Security Threats Increasing. Retrieved Decmber 04, 2010, from InformationWeek.com: http://www.informationweek.com/news/security/vulnerabilities/showArticle.jhtml?articleID=225701500 14. Shelly, Cashman, & Vermaat. (2005). Discovering Computers 2005. Boston: Thomson Course Technology. 15. Sudin, S., Tretiakov, A., Ali, R. H., & Rusli, M. E. (2008). Attacks on mobile networks: An overview of new security challenge. Electronic Design, 2008. ICED 2008. International Conference (pp. 1-6). Penang: IEEE. 16. Turban, E., Leidner, D., McLean, E., & Wetherbe, J. (2005). Information Technology for Management: Transforming Organizations in the Digital Economy (4th ed.). New York: Wiley. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Network Security Essay Example | Topics and Well Written Essays - 1500 words - 2, n.d.)
Network Security Essay Example | Topics and Well Written Essays - 1500 words - 2. https://studentshare.org/information-technology/1746037-network-security
(Network Security Essay Example | Topics and Well Written Essays - 1500 Words - 2)
Network Security Essay Example | Topics and Well Written Essays - 1500 Words - 2. https://studentshare.org/information-technology/1746037-network-security.
“Network Security Essay Example | Topics and Well Written Essays - 1500 Words - 2”. https://studentshare.org/information-technology/1746037-network-security.
  • Cited: 1 times

CHECK THESE SAMPLES OF Aspects of Network Security Management

Network Security Risk Assessment

network security Risk Assessment network security Risk Assessment Introduction Advancement in technology has resulted to the development of innovative computing systems which have facilitated the functions of various organizations and institutions.... The hardware within information systems includes the physical aspects of the system such as computer components and the related equipment.... Therefore there is need for PDI to train its personnel on the legal, social and ethical aspects of information security and privacy....
9 Pages (2250 words) Term Paper

Advances in Wireless Networks

Seeing the growing importance of computer networks in today's modern world, the management of University of Iland has decided to implement a new and more sophisticated network technology structure to better manage university tasks and operations.... Seeing the growing importance of computer networks in today's modern world, the management of University of Iland (UoI) has decided to implement a new and more sophisticated network technology structure to better manage university tasks and operations....
10 Pages (2500 words) Essay

Network Security setup

ecuring organization's data from external threats has been one of the major goals of network security since the inception of the TCP/IP protocol that generated the internet.... Running Header: network security setup Part Security layers outline for Richman investment IT infrastructure domain ... network security, Firewalls, and VPNs.... The magnitude and nature of network traffic8.... In order to ensure security at this domain, the switches, firewalls, routers, proxies as well as the communication encryption are imperative aspects of enhancing security for this particular domain....
7 Pages (1750 words) Research Paper

Network Security And Management

In'network management,'fault management'is the set of functions that detect, isolate, and correct malfunctions in a telecommunications network, compensate for environmental changes, and include maintaining and examining'error'logs, accepting and acting on error'detection'notifications, tracing and identifying faults, carrying out sequences of diagnostics tests, correcting faults, reporting error conditions, and localizing and tracing faults by examining and manipulating'database'information....
3 Pages (750 words) Article

Wireless Network Security

This paper, Wireless network security, discusses various issues and aspects of security-related features in wireless networks.... The primary goal of this research is to present a comprehensive discussion of various features included in wireless network security.... This paper will discuss topics like wireless network security tools, their advantages, and directions.... In this scenario, wireless network security is a promising topic that covers a lot of critical features....
7 Pages (1750 words) Research Paper

Infrastructure and Security of Information Network

The security policies will include password controls, operating systems, and hardware security management.... pplications of CIA Triad Principals in Information network security Policy ... We have various types of network vulnerabilities present in the network components, the configuration vulnerabilities, the technology vulnerabilities and security policy vulnerabilities.... thical aspects of Information Network ... The paper the reason for the design of the layouts to the IT experts and to the management team of infrastructure and security systems....
7 Pages (1750 words) Coursework

A Guide to Computer Network Security

The author of "Establishing The Effective Security Measures" paper discusses the threats to communication networks, the role of encryption in network security, the benefits of network security, authentication, and access control, informing the users of the need for network security.... The benefits of network security ... Among the most elementals tasks of network security within the technological environment is risk mitigation.... Thus, mitigation is an elemental benefit of network security. ...
10 Pages (2500 words) Assignment

Penetration Testing in Network Security

Particular emphasis has been laid on the main stages, tools, and techniques used in the implementation of network security through penetration testing.... Hackers have come up with well-strategized techniques for accessing organization network systems and cause extensive harms without notification (“An overview of network security”, 2000).... ??An overview of network security analysis and penetration testing”, 2000.... This report "Penetration Testing in network security" presents corporate organizations to maintain their integrity and avoid revealing confidential data to third parties; penetration testing of the corporate network has to be perfectly conducted by the network administrators....
10 Pages (2500 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us