Network Security and Why Use It
Security And Why Use It
The security of any network should be taken seriously. A network allows someone to share resources and information with others on the network. Networks allow for distribution of computer viruses, Trojans, human intruders, and employees can damage more than just one computer. To better understand the importance of network security, one needs to think of what might happen if all the data for a company that is stored in their servers vanishes. This scenario would cause losses that the company might never recover. Networks are divided into three main categories Internetwork (internet), Wide Area Networks (WAN) and Local Area Networks (LAN). These three categories of network require security to ensure that no malicious humans gain access, and no viruses attack the network.
To better understand network security, one needs to know what a network is. A network is defined by Hu, Myers, Colizza, Vespignani, and Parisi (2009)
as a grouping of computers and other hardware which are interconnected using communication channels allowing for information and resource sharing. Network security involves protecting a network from any unauthorized access. Preventive measures are undertaken to ensure the security of any network. There are also intrusion detection systems which detect and inform the network administrator of any attempts to break into the network.
Network security can also be defined as the provisions put in place by the network administrator to secure the computer network. There are also policies that can be adopted to ensure no unauthorized access to the network. These policies include username and password requirement before one can gain access to the network, antivirus software to protect against virus attacks, intrusion detection systems to monitor the network and report of any attempted intrusion Schonlau et al. (2001)
, and physical security to protect against theft of servers and network peripherals. With the continual advancement in technology, hackers are inventing new ways of attacking computer network. Therefore, the network administrator will need to keep up with these changes and ensure that their network is protected fully form any kind of attacks.
Once a user is authorized to access a network, they need to be monitored to ensure they do not access files they are not authorized. To ensure this, every network requires a firewall which contains access privileges for every user, thus ensuring that a person does not access files or services they are not authorized to access. The firewall and security measures put in place will ensure there will be no unauthorized access to the network, but if the users who have access to the network are not properly educated this measures will not work. The users need to be taught on the need to keep their passwords safe, need to not share their access credentials with any other person, and not allowing unauthorized users to access their computer network. This training will ensure that the measures undertaken are successful.
WEP security protocol
WEP is the acronym for Wired Equivalent Privacy which is the original security standard for wireless networking. It was intended to provide confidentiality for data just like in the traditional wired network. WEP is recognized by its 10 or 26 hexadecimal digit. It is still widely used, and it is the first choice for security that is presented for router configuration. This security protocol is used for safeguarding wireless computer networks from unauthorized access. WEP provides a security system that is widely supported on the network, and this makes it easy to setup for a home network. Though, it has been proven that it is easily hacked this security protocol is better than not having one at all.
WEP protocol protects data using encryption during transmission. The data packets been sent are encrypted using either a 64-bit, 128-bit, or 256-bit encryption key. Encryption of data protects the wireless links between access points and clients. The encryption key has an initialization vector which is combined into the key for the creation of the final key. The initialization...
Securities Regulation SECURITIES REGULARIZATIONS IN NON-PROFIT ORGANIZATIONS The ensuring of the fact that an organization is working as per regulations and is following the code of conduct, while keeping the interest of the public first, are matters which are becoming more and more complicated with the passage of time. Therefore, it can be said with some emphasis, that today one of the most basic issues of many organizations is the issue of
Security Management Strategies for Increasing Security Employee Retention Design Effective Job Characteristic Model Skill Variety Task Identity and Task Significance Autonomy and Feedback Meeting Expectations Market Competitive Package Strategies for Increasing Security Employee Retention Security employees constitute the most important component of organizational workforce. It is because; they ensure the core survival of organization and its assets. However, the ironic fact is the security employees are considered blue collar workers and their compensation packages are low (Hodson & Sullivan,
Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework
(Gartenberg, 2005) Like all other aspects of business today, security systems often prove to be highly complex and hard (even for the participants) to identify. The culture of an organization is like the culture of a family, a community, or a nation: Because it surrounds the people in it they often have a great deal of difficulty in recognizing to what extent policies and procedures arise from the constraints of culture
Also, it goes without saying that anyone hired in an important position like this one should have a wealth of experience and knowledge pertaining to information technology and information security (Slater, p. 2). The broad spectrum of activities a CSO must engage in Author Tyler Justin Speed explains that while it security staff can be counted on for the most part to protect stored digital data, unless the chief of
With the threat of terrorism remaining so strong in this country it is vital to find new and better ways to protect people and to keep them safe from harm as much as is humanly and technologically possible. Scope of the Study The scope of this particular study is very broad and far-reaching, because there are so many people who are being affected by it now and will be affected by
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now