Network Security: An Issue for Business Data Communication
Computer security and the protection of data has been an issue since the early 1980s when computers became standard office equipment. Company sensitive information is stored on computers. Protecting the access to and integrity of this information has been a key concern for managers and computer specialists alike. The issues in data security have not changed, however the advent of the Internet has made keeping data secure more difficult. The Internet did not change the key issues, just the number of users trying to access the information. Network administrators have been facing these issues for quite some time.
The key security issue facing IT professionals is to protect the system from invaders or intruders known as Hackers. Hackers can be grouped into several categories according to motive. They are Joyriders (who do it for fun), Vandals (who do it to cause harm), Scorekeepers (who compete for the challenge of hacking), Spies (who wish to steal information), and others who accidentally access information (Singel, 2001). Hackers access networks in a variety of ways including stealing passwords, making their system appear to be a friendly system, and remotely changing or turning off security protocols.
Network security measures are expensive to implement and maintain. The IT professional must constantly weigh the level of security afforded by the current system against rising costs. The objective of this project will be to survey the latest network security advances and examine their current applications. They will be examined in terms of security levels, vulnerabilities, ease of use and cost to implement and maintain. The advantages and disadvantages of these applications will be examined as well as their suitability to specific needs. It will also examine the current and projected needs of the Network security field and make predictions as to where the field of IT security will go in the future.
This research will be of greatest benefit to the person wishing to enter into the field of Network Security. It will also benefit the CEO or business manager who is ultimately responsible for balancing budget with company needs. It is necessary for anyone in a management position to understand and keep abreast of the most current security measures, technology and techniques. This project will take a look at the current status of network security and future trends and needs. This project will compare and contrast the latest and most current advances in this field.
Firewalls, passwords and encryption are tools used to provide the security of the data. These security techniques are currently the primary techniques for data protection. However, these techniques are not failsafe and can slow the speed of the computer. The computer must be secure, yet remain usable. This is the balance that IT professionals must try to achieve. They must maintain a secure system, yet make certain that the system is not slowed in the process.
Data backup is an important issue in data security. No one will argue the necessity of having the data backed up in case of a catastrophic event. However, restricting access to this information in a network infrastructure can be difficult. Typically, a separate server is designated for this purpose. A firewall acts as a gatekeeper, which either allows or disallows information to pass based on preset criteria. A separate server can be set up for this purpose called a proxy server. In this situation, the proxy server acts as a firewall. DMZ is a relatively new net architecture, which allows not only an entire network to be secured, but allows the company to build a secure network inside the main network. There are data backup difficulties with this type of system, especially concerning the backup of data on a server located outside the DMZ network (Atempo, 2001). This system allows the administrator to set access for each user in the network.
Public networks are an especially problematic area as far as data security is concerned. Systems such as JANET are designed to be user friendly and extremely tolerant. Security was not built into some...
This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are:
Network Security for a Medium Sized Company: Network security is an important component for all companies including small and medium sized firms because very few businesses can operate without a network of computers. The network of computers facilitates improved communication in order for the company to improve its profitability or productivity. However, the improved communication between computers is also associated with some inherent risks such as malware and unauthorized access. The
Network Security: Past, Present and Future The work of Curtin (2007) states that a network is defined as "any set of interlinking lines resembling a net, a network of roads -- an interconnected system, a network of alliances." Quite simply a computer network is a system of computers that are interconnected. There are seven layers of communication types identified by the International Standards Organization (ISO) Open Systems Interconnect (OSI) Reference Model
Even though there is always some form of a risk involved in the coding technique together with the deployment methods of a website, some technologies such as PHP and MySQL form some of the worst aggravators of online website security. The loopholes that exists in the use of these technologies results in some of the worst hack attacks and security breaches ever experienced in the field of web design. The
Despite its clear benefits and advantages in terms of ease of use and cost effectiveness, there are certain risks associated with wireless networking. These risks are discussed further below. Review of the Literature. Security Risks Associated with IEEE WLAN 802.11. The applications for wireless communication technology continue to develop and expand; today, at least, the 802.11b is the standard of choice for wireless router communication used with network installation (Gonazles & Higby
Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now