¶ … networking and TCP/IP and internetworking. Also discussed are risk management, network threats, firewalls, and also more special purpose network devices. The paper will provide a better insight on the general aspects of security and also get a better understanding of how to be able to reduce and manage risk personally at the workplace and at home.
In today's world, the Computer has become a common feature in any organization anywhere in the world. This may be due to the fact that a computer can be accessed by anybody who knows how to handle it and also because it can store a lot of information both confidential and general. A computer is connected through a physical network that allows a person or many persons to share any information necessary. (Conceptual Overview of Network Security) Though network security in Information Technology is an issue that has been discussed endlessly, implementation has definitely taken a back seat in this part of the world. There is a lot of discussion on how an unauthorized stranger can access a persons emails and files; on how the management of a company has a need to keep track of employee activities through the monitoring of the network but the fact remains that there is great fear of a virus infection and not every company has done anything regarding network security for the protection of the company. The action, if any, is taken as a reaction to a threat of a virus attack, since viruses are extremely common in these parts of the world. The companies involved keep not even records of such attacks. Hackers have been known to take over persons or a company's bank accounts or even stealing database from its database server that is the sole property of the company. This proves that it is better to be prepared in the event of such an attack. (Network Security - a functional approach)
Body of the Paper
Networks among computers are generally made to share resources such as printers, folders, etc., and within an organization, networks are used for more efficient cooperation between the various departments by the use of e-mail, instant messaging, etc. A local area network can make available folders and other documents to any user on the other side, through a server. In fact, any number of users can avail a single printer; the printer can be shared from one computer on the network and users can print their work without even having to rise from their seats and walking to the computer. (Network Security - a functional approach) The fact is that though they have to get up to collect their printouts, they do not have to copy their work onto a diskette and then carry it to the printer and than get their work done. This type of extra work can easily be avoided in this day. In other words, computer networks make operations easier; communications easier, cut down on expenses and dramatically improve productivity. But all this improvement does not come without a hitch! It entails an increased security risk and the need for definitive measures to be taken to combat this risk. (Network Security - a functional approach)
However, the only problem that may arise is that the information must be accessible to the person for whom it is intended. Anyone who gains access to information from the computer can read and modify it very easily. This is where computer security is needed. Computer security prevents unauthorized persons from gaining illegal access to information that has been stored on the computer while network security protects any one from retrieving information being transmitted through the network. (Conceptual Overview of Network Security)
In the past, network security was considered as a very complicated subject that was handled only by experts in the field. But as more individuals got themselves accustomed to the using of the network, it became essential that they all have a basic knowledge of networking. A network can be defined as a set of interlinking lines that was similar to the net, like a network of roads or an interconnected system or a network of alliances. It is important that to understand the various principles of network security that we have a basic knowledge of computer networks. In the last twenty five years odd, a lot of different kinds of networks and network protocols have been made distinct, out of these the emphasis to be laid upon in this summary is that of two networks, that are...
Network Security for a Medium Sized Company: Network security is an important component for all companies including small and medium sized firms because very few businesses can operate without a network of computers. The network of computers facilitates improved communication in order for the company to improve its profitability or productivity. However, the improved communication between computers is also associated with some inherent risks such as malware and unauthorized access. The
Network Security: Past, Present and Future The work of Curtin (2007) states that a network is defined as "any set of interlinking lines resembling a net, a network of roads -- an interconnected system, a network of alliances." Quite simply a computer network is a system of computers that are interconnected. There are seven layers of communication types identified by the International Standards Organization (ISO) Open Systems Interconnect (OSI) Reference Model
Network Security History and Evolution of Network Security: The term 'Network Security' refers to the concept of the creation of a 'secure platform' based upon which the user of the computer or of a program within the computer are allowed to perform only those specific tasks that are allowed within the parameters dictated by the security network of the computer, and banned from performing those that are not allowed. The tasks include
Conclusion The purpose of this discussion was to examine the network security measures that are available. The research found that the proper configuration provides the first line of defense as it relates to securing a network. In addition, firewalls serve an essential role in securing networks against outside intrusions. The research also indicates that anti-virus software, encryption software and biometrics allow organizations to secure networks in a more comprehensive manner. There are
The main lesson learned from viewing the tutorials and programs is the ease and flexibility of configuring each specific session to the unique needs of an audience. Feasibly these technologies could be used for creating highly unique and tailored learning experiences for students who were learning through online universities only for example. The ability to tailor all forms of digital content, from music and video to drawing boards and
Network Security: An Issue for Business Data Communication Computer security and the protection of data has been an issue since the early 1980s when computers became standard office equipment. Company sensitive information is stored on computers. Protecting the access to and integrity of this information has been a key concern for managers and computer specialists alike. The issues in data security have not changed, however the advent of the Internet has
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now