This website uses cookies to ensure you have the best experience. Learn more

Network Security Essay

1252 words - 6 pages

AIU ENG 107
INDIVIDUAL PROJECT 5
DARRIUS HUGHLEY
12-2-2012

Intro
Even though there are some downfalls with having too strong of a firewall or polices; is not being able to access certain websites, databases, and not being able to access the internet or intranet at all that you normally access. The major downfall of having the proper network security is the cost of it. Examples of expenses are but not limited to software, sonic walls, firewalls, and even a trained professional to maintain it all. When it comes to security you will have to be numb about the expenses of it. Failure to keep your network secure and or well maintained could lead to costly consequences legal wise, and ...view middle of the document...

The Conflicker virus has the potential to hang around for a very long time, or resurface in a slightly different form down the road. Knowing exactly when or where Conficker will rear its ugly head is simply impossible, but you can keep yourself safe by making sure your PC and security software are up-to-date. Hacking is another example and the most common and one of the hardest to prevent. Hackers are computer programmers with nothing but free time on their hands. Hackers have the ability to move through victims firewalls and other forms of security to access their victims personal files and information. They also have the ability to create and spread viruses, worms, Trojans, spyware, adware and malware. For example there was an incident that had happened to a major bank sometime ago. Bank of America has had a cyber attack to happen to them. The attackers had high-end servers that would constantly send packets of traffic to the Bank of America servers, that caused them to pretty much lock up and crash. This caused many users to not have the ability to access their accounts via Internet.
People and businesses are handling more of their business online. Now with the convenience of the Internet people are doing more things online such as transactions. Online shopping is becoming more common now with the Internet. Online shopping has advantages and disadvantages. One of the advantages is that it is convenient and there are greater varieties to choose from vs. going to a store shopping around. The major disadvantage of online shopping is placing your credit card and other sensitive information on the Internet. And anything posted on the web is pretty much up for grabs for anyone. Businesses also perform most of their daily tasks with Internet or Intranet based applications. For example, by doing constant research on E Commerce, I found that the United States is ranked number one in E Commerce. Statistic shows that since the year 2000 the United States has been ranked number one in online shopping. And the top category that everyone is spending most of his or her money on is travel. Also by analyzing the charts and graphs, I have noticed that since the year 2000 E Commerce has been on a steady rise worldwide. And by the way Amazon.com is the top online shopping website. It blows my mind to know that the Internet is not secure at all and yet we are still posting all our information on it like there is no problem. The only thing that is somewhat safe is the Intranet. Businesses use the intranet mostly to perform their everyday tasks.
Proper equipment and maintenance will help with the consistency of the network security....

Other Essays Like Network Security Essay

Computer and Network Security Essay

1798 words - 8 pages following is prohibited: * Causing a security breach to either [Company Name] or other network resources, including, but not limited to, accessing data, servers, or accounts to which you are not authorized; circumventing user authentication on any device; or sniffing network traffic. * Use of the Internet or [Company Name] network that violates the [Name of appropriate policy], [Company Name] policies, or local laws. * Intentionally

Computer Network & Information Security Essay

1478 words - 6 pages do not realize the dangers at hand. This is why users need to learn how to keep their personal computer safe. To achieve a good level of security, there are many important elements that must be taken into account: authentication, access control, data integrity, content protection, etc. Information security can be obtained using methods such as cryptography and network protocols. Computer security is the process of detecting unauthorized use

Information Technology/Network Security Threats

1465 words - 6 pages Protecting systems against various systems threats such as passwords and cracking tools with brute force or attacks into the system by gaining authentication for access rights including a password, policy, to educate the users. SECURITY CONSIDERATIONS IN THE INFORMATION SYSTEM DEVELOPMENT LIFE CYCLE. Each information security environments unique, unless modified to adapt to meet the organization’s needs. The System Development Life Cycle

Recommendations for Wireless Network Security Policy

921 words - 4 pages RECOMMENDATIONS FOR WIRELESS NETWORK SECURITY POLICY Introduction One of the newer technologies being increasingly used in today's business is that of wireless networks. While this technology has the advantages of providing greater user mobility and temporary access, it does have the disadvantage of an intrinsic lack of security. SECURITY THREATS There are a number of types of attack that wireless LANs are vulnerable to, based on

Tgt2 Apps in Network Security Challenge

1035 words - 5 pages A. Integrity of Network Security Introduction New security policy created for e-mail will ensure e-mails are used for business purpose and limits personal usage of e-mails. Policy also permits Softsearch to monitor employee’s e-mails if required. Controls implemented by e-mail policy will help prevent confidentiality breach. However, e-mail policy does not govern attachments within e-mails. Policy should be enhanced to include e-mail

Network Administration Portfolio

884 words - 4 pages daily business transactions for large and small organizations are vital to their success. Unscheduled disruptions resulting in the failure to process these daily business transactions can be costly, and potentially disastrous. This essay will describe some of the possible gains, and drawbacks one may face when installing/upgrading a network. Advantages Employees want the ability to have access to all files, and services whenever needed

Information Security In Business Organizations

3793 words - 16 pages organization itself.The essay sets off with a critical review of the term security in the context of information systems, which illustrates the treats and risks arising from extensive use of information systems. Then, through a case study of banking giant Citibank, the essay addresses which security measures and how security managements are conducted to subdue threats and risks by Citibank in securing its information system and business. In the end of

The Biggest World

570 words - 3 pages MURTADA AL NAKHLI NOV, 15 ESSAY 2 The Biggest World Some people in their daily lives spend a lot of hours on the internet networks. According to the A new Pew Internet & American Life Project report says 73 percent of Americans say they use the Internet, up from 66 percent in January 2005, with a lot of the increase coming from those over 50.Using the internet has been becoming part of our lives, we cannot live without it. The

Voip Final

819 words - 4 pages Telecommunications Management NetworkWeek 8 : Week 8 - Final Exam ------------------------------------------------- Top of Form Time Remaining: |    | Page:  1  2  3  | Essay Questions (20 points each) Question 1. 1. (TCO3) In regards to Securing IP Telephony, what are the most common types of security risks to data networks today? (Points : 20)               | Question 2. 2. (TCO4) What makes coaxial cable popular among

Unit 1 - Information Security Policy

2151 words - 9 pages establish a plan to secure the technology both the network and computers . A security policy is the plan developed with instructions from senior leadership instructing decision makers in the organization on how to protect the organization’s assets (Mattord & Whitman, 2012). There are various components of a security policy which include, statement of policy, equipment usage and access control, prohibited uses regarding equipment, who manages the

Social Isolation

1033 words - 5 pages beneficial activities, such as emotional support, companionship and opportunities for meaningful social engagement and social networks, have an influence on depressive (VicHealth 2005). Having a good social network will help people to find a sense of belonging, a sense of security, the recognition of self-value, as well as the positive psychological state, which in turn will be beneficial to mental health. Secondly, the connection of social isolation and

Related Papers

Network Security Essay

1925 words - 8 pages reason alone that supporters of international law believe that a comprehensive treaty of cyber security would prove to be more beneficial and open than would the use of military force. In their opinion this would lead to a more open and trusting internet for communication and commerce. O’Connell defines two terms in her article that in essence classifies theses types of threats. First there’s computer network exploitation (CNE) which centers on

Network Security Essay

1016 words - 5 pages Network security Network Security Installing firewall or anti-virus software on enterprise workstations can help prevent some of the security problems the Internet can cause; but not everything. By understanding the different Open Systems Interconnect (OSI) levels and security threats involved with each one of them, it is easier to plan a strategy to combat security problems. Purpose and Scope To cover all areas I have listed the

Network Security Essay

1161 words - 5 pages find solutions to mitigate these threats by eliminating vulnerabilities of their system in order to reduce risk of their information and information system. Information security addresses the three following components: confidentiality, integrity and availability, which are the main goal for business toward protecting their information and information system. Confidentiality is basically to ensure no confidential data, such as customers’ data or

Network Management And Security Essay

2244 words - 9 pages (Name) (Instructors’ name) (Course) (Date) Network Management and Security A telecommunication Management Network, commonly known as TMN, is an infrastructure that provides interfaces for connection between several types of operating systems and telecommunications equipment, so as to manage the telecommunication service and network. This is from Glenn Warnock and Nathoo Amin (215). Also, it enables the functioning of the management