Verified Document

Technologies Designed To Secure Networks From Cyber-Attacks Essay

¶ … Technologies Designed to Secure Networks from Cyber-Attacks In this paper, I examine different approaches to security designs intended to protect the integrity of the information contained on network databases in light of recent technological developments. Traditionally, network security has been designed either to protect the database of the network or to protect the specific applications that are executed upon the network. However, in the last decade, the implementation of Web services has proliferated, enabling the automated discovery and transfer of information according to various standards. Therefore, the types of exchanges of information have grown in complexity, creating a condition in which different forms of network authorization must be instituted in order to preserve the integrity of the database while allowing for the transfer of multiply defined documents between and among endpoints both within the network and outside of the network. End users, for instance, who interface with aspects of a database through Web services and their applications...

In response to this requirement, the best security practice is a multi-layered design that integrates network-level securities with application-level securities.
Network security has traditionally been conceptualized according to competing models, both of which are designed to protect the information contained on network databases. One approach attempts to protect the information from unauthorized access through securities implemented at the database level; meaning, a layer of security is established, which regulates access to network. This form of security can become rather complex depending upon structure of the database, because securities can be designed to protect its various aspects. Individual cells, for example, can be protected according to specific protocol (McGee, Vasireddy, Xie, Picklesimer, Chandrashekhar, Richman,…

Sources used in this document:
The network security measures implemented by firms in order to protect data related to their information management processes has undergone major alterations over the past decade. The exchange of information in the form of business documents, which originally assumed the form of Electronic Data Interchange (EDI), has steadily grown more complex as the nature of information exchange has become increasingly specified. In order to declare the types of informational transactions occurring between and among applications and endpoints, new markup languages have been forged, such as SGML and its successor XML, which can be used to declare the information types contained in transferred documents (Swart et al., 2007). The nature of information exchanges among businesses and agencies has further been restructured by the standardization of Web service technologies, which allow networks possessing different databases to discover one another and exchange information with one another through automated processes that are structured according to standards that are typically established by consortia.

Implementing Security in a Web Service Rich Environment

The proliferation of Web services has created an environment that requires
Cite this Document:
Copy Bibliography Citation

Related Documents

Technology Issue in Information Assurance
Words: 3012 Length: 10 Document Type: Term Paper

S. Department of Defense (DOD) uses over two million computers and more than ten thousand local area networks, most of which are linked to, and vulnerable to attack from, users of the larger Internet. (2008, p. 276) These increasing threats correspond to the growing reliance on information systems to manage the entire spectrum of modern commerce and energy resources, making the disruption of a single element in the integrated system a

Cyber Espionage
Words: 4895 Length: 16 Document Type: Case Study

Abstract Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This qualitative case study research explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state

Network Vulnerabilities That Avionics Are
Words: 2859 Length: 10 Document Type: Research Paper

In this manner, it makes network management and filtering a lot easier. Even though SPF can protect the network infrastructure against certain attacks that are known to exploit the weaknesses that are inherent in the various network level protocols, it can never provide protection at application level. The application defense needs more awareness of the content of the payload. Circuit Proxy Firewall (CPF) This type of firewall operates by relying as

Network Security
Words: 1437 Length: 4 Document Type: Case Study

Network Security for a Medium Sized Company: Network security is an important component for all companies including small and medium sized firms because very few businesses can operate without a network of computers. The network of computers facilitates improved communication in order for the company to improve its profitability or productivity. However, the improved communication between computers is also associated with some inherent risks such as malware and unauthorized access. The

Cyber-Citizen, USA Cyber-Citizen USA the
Words: 5130 Length: 20 Document Type: Research Paper

The fact that industrial control systems may be vulnerable to infiltration by other citizens, or international parties puts laws pertaining to intersection of systems transmission at the forefront of priorities for us all. At present, telecommunications interference of private citizens holds an up to a five-year prison sentence by U.S. federal law. How cyberterrorism is addressed, when the stakes are heightened, leaves a whole host of opportunities for citizens, and

Information Technology Management
Words: 3413 Length: 10 Document Type: Term Paper

Network Security Management From the onset, it is important to note that for data to flow from one computer to another, such computers should be interconnected in what is referred to as a network. With such interconnectedness comes the risk of data interception and it is for this reason that network security is considered crucial. In the recent past, the number of corporations that have experienced attacks on their computing resources

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now