Network Security Essay

1161 words - 5 pages

The internet and its technology have brought many advantages and disadvantages for information system of businesses, whether public or private. There is no denying that the business world will move further and further into the cyber world, where information are available just by a click of a finger. No matter how large of a scale a business is, private restaurant or large Banking Corporation, the truth is every single one of these business is at risk. Risk of losing trade secret and risk of losing employee’s confidential data are some of a few risks that a business must address. These risks originally come from sources calls vulnerabilities and threats. Vulnerabilities in plain definition ...view middle of the document...

For example, a person who wants to log into a system must provide their ID and then authenticate him or herself by providing a password. Authorization comes after authentication. Authorization grants permission or authority for an individual toward accessing certain information after they have authenticated their identity. For example, an administrator of a networking company will be able to access to users’ database and a regular employee will not have the same privileges. Authorization however is consider a double edges swords because it raise the issue of insider threats and data theft. Insider threats are individuals that work inside of the organization that can potentially cause harm to that organization. Insider threats are actually the biggest risks that a business will ever encounter. According to a research by Andrew P. Moore and Dawn M. Capelli, 65% of insider’s threats are current employees of the organization and 80% of them has already accepted job offer from a competing organization. 63% of these insider threats case involve in trade secrets. These statistics raise a big question for organization and even small business on how to deal with their own employees. These organizations must continuously monitor their employees on a daily basis by using security camera and event log that can be installed in a computer system. Before hiring a certain individual, a business has to check his or her background to ensure he or she doesn’t involve in any cyber-crime. Treating employee well and know how to handle employee’s firing are essential actions that an organization must learn to adapt.
Integrity of information is to ensure that piece of data cannot be altered or compromised. Why is this component important for any kind of business nowadays? Imagine an attacker sends a malicious virus to a system of a bank and it corrupts files regarding to accounting information. Since banking information involve a lot with money data, this attack can cause major problem for that bank. A malicious virus is a computer program that can disrupt file and cause further harm to the information system as a whole. Back in 2000, a virus called “I Love You” has worldwide infected information of thousands of people. According to an article written by Larry Seltzer, the virus disguise as an attachment in emails that were sent to its receiver. Once the attachment is open, the virus overwrites itself onto music files and document files, which violating integrity of data. As a business owner, one should be concern that these viruses will have great potential to corrupt important data that potentially declines profits. Such threats must be...

Other Essays Like Network Security

Computer and Network Security Essay

1798 words - 8 pages following is prohibited: * Causing a security breach to either [Company Name] or other network resources, including, but not limited to, accessing data, servers, or accounts to which you are not authorized; circumventing user authentication on any device; or sniffing network traffic. * Use of the Internet or [Company Name] network that violates the [Name of appropriate policy], [Company Name] policies, or local laws. * Intentionally

Computer Network & Information Security Essay

1478 words - 6 pages do not realize the dangers at hand. This is why users need to learn how to keep their personal computer safe. To achieve a good level of security, there are many important elements that must be taken into account: authentication, access control, data integrity, content protection, etc. Information security can be obtained using methods such as cryptography and network protocols. Computer security is the process of detecting unauthorized use

Tgt2 Apps in Network Security Challenge

1035 words - 5 pages A. Integrity of Network Security Introduction New security policy created for e-mail will ensure e-mails are used for business purpose and limits personal usage of e-mails. Policy also permits Softsearch to monitor employee’s e-mails if required. Controls implemented by e-mail policy will help prevent confidentiality breach. However, e-mail policy does not govern attachments within e-mails. Policy should be enhanced to include e-mail

Recommendations for Wireless Network Security Policy

921 words - 4 pages RECOMMENDATIONS FOR WIRELESS NETWORK SECURITY POLICY Introduction One of the newer technologies being increasingly used in today's business is that of wireless networks. While this technology has the advantages of providing greater user mobility and temporary access, it does have the disadvantage of an intrinsic lack of security. SECURITY THREATS There are a number of types of attack that wireless LANs are vulnerable to, based on

Information Technology/Network Security Threats

1465 words - 6 pages Protecting systems against various systems threats such as passwords and cracking tools with brute force or attacks into the system by gaining authentication for access rights including a password, policy, to educate the users. SECURITY CONSIDERATIONS IN THE INFORMATION SYSTEM DEVELOPMENT LIFE CYCLE. Each information security environments unique, unless modified to adapt to meet the organization’s needs. The System Development Life Cycle

Netw420 Cisco Network Management System

661 words - 3 pages Cisco Network Management System NETW-420 Enterprise Network Mgmt Professor Introduction Cisco uses the International Organization for Standardization network management model which defines five functional areas of Network management. The model consists of Fault Management, Configuration Management, Performance Management, Security Management, and Accounting Management. In this paper we will cover the models five functional areas

Assignment Information Use Paper

671 words - 3 pages is data network, I will start off with data network, and my duties are determine what the organization needs in a network and computer system before it is set up. Also install all network hardware and software that need upgrade and repairs before the every one comes in. also I maintain the network and computer system security and ensure that all system is operating correctly. I collect data in order to evaluate the network or system performance

Security Manager’s Role and Responsibilities

1100 words - 5 pages a security manager for the Hospital security manager, network security manager for an information technology company, and a private security manager. Each of these individuals’ roles is crucial to protecting the security needs of their particular organization in their respective fields. Hospital Security Manager The hospital risk manager main task is to stop situations that may cause lost or liability to the hospital. The main

Wireless Network: Is it right for you?

358 words - 2 pages equipped with a wireless network card though.But be advised that although security is not a huge concern among people with wired networks, it must be with a wireless one. In a wireless network, someone could just park their car outside your home or office and start using your network if you don't have proper security measures in place. To prevent this, put a password on your network and then you are all set.

Deterring Network Attacks

961 words - 4 pages Deterring Network Attacks Brandon Curtis Post University Network Security is vital in today’s age of evolving technology, weather the security is for a wired or wireless network. No matter the size or type of network, security should be taken seriously at all times. Any data sent over a network that is not safe, unless the network is secure and encrypted and secured by all necessary means. A recent data breach occurred

Ntc 411 Week 5 Individual Assignment

1045 words - 5 pages As utilization of network, technology evolves so does security issues surrounding it. The growing demand of E-commerce on the internet continues to set infinite risks of being attacked. Security is paramount for safe and secure E-commerce sites. As properly installed and maintained firewall continue providing security, it is not adequate to provide defense against intrusion. For adequate defense against intrusion, Additional security appliances

Related Papers

Network Security Essay

1016 words - 5 pages Network security Network Security Installing firewall or anti-virus software on enterprise workstations can help prevent some of the security problems the Internet can cause; but not everything. By understanding the different Open Systems Interconnect (OSI) levels and security threats involved with each one of them, it is easier to plan a strategy to combat security problems. Purpose and Scope To cover all areas I have listed the

Network Security Essay

1925 words - 8 pages reason alone that supporters of international law believe that a comprehensive treaty of cyber security would prove to be more beneficial and open than would the use of military force. In their opinion this would lead to a more open and trusting internet for communication and commerce. O’Connell defines two terms in her article that in essence classifies theses types of threats. First there’s computer network exploitation (CNE) which centers on

Network Security Essay

1252 words - 6 pages AIU ENG 107 INDIVIDUAL PROJECT 5 DARRIUS HUGHLEY 12-2-2012 Intro Even though there are some downfalls with having too strong of a firewall or polices; is not being able to access certain websites, databases, and not being able to access the internet or intranet at all that you normally access. The major downfall of having the proper network security is the cost of it. Examples of expenses are but not limited to software, sonic walls

Network Management And Security Essay

2244 words - 9 pages (Name) (Instructors’ name) (Course) (Date) Network Management and Security A telecommunication Management Network, commonly known as TMN, is an infrastructure that provides interfaces for connection between several types of operating systems and telecommunications equipment, so as to manage the telecommunication service and network. This is from Glenn Warnock and Nathoo Amin (215). Also, it enables the functioning of the management