Why Is Network Security Important?

Improved Essays
Network security has been at the head of some stories in the news. Security is an aspect of the technology field that should be considered at all times. Not only can personal security be breached, the security of others can be affected as well. For example, the incident with the retail company Target, (Vijayan 2014) retailer 's failure to properly segregate systems handling sensitive payment card data from the rest of its network. In this paper, network segment security aspects will be discussed on why they are important, who can be affected, and what can you as a someone entering the Information Technology field do to make yourself an asset which will help your placement and skills while working. Finally, what training will be beneficial to help ensure your work and security will not be compromised.

Network Segment
…show more content…
What is a network segment? (LINFO 2005) Defines a network segment as a portion of a computer network that is separated from the rest of the network by a device such as a repeater, hub, bridge, switch or router. This means that the computers and/or other equipment like a server is not directly connected to the internet. Network Segment security places devices into the network so that there is not a direct link to the internet for others to have access to the information. Hubs, bridges, switches, and routers act in different manners to direct that information traffic so it makes gaining access to the computer(host) or server much more difficult. That being said, there is no such thing as a computer that is 100% secure. In regards to the security of a network, having network segmenting is essential to help protect your information on the

Related Documents

  • Superior Essays

    The identity infrastructure is contained within Active Directory, which provides security, authentication, and authorization of identities (Training Solutions, 2014). The DHCP and DNS service are also provided to ensure reliable name resolution, and dynamic IP address assignment to the network devices that require dynamic IP address assignment. Finally, there are storage devices that contain a hybrid solution of storage area networks (SAN), and network attached storage (NAS).…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Every business owner should consider the below points before setting up a network and also businesses might get expanded or changed in future. Long term investments should be considered here for future growth as well. So we should have a proper planning before we establish. Number of Users – Number of network users, printers, scanners, servers, data centers and security measures. Types of Equipment – Highly sophisticated equipment that should be capable of handling large networks and flexibility for expanding the networks for future purpose.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Abstract: With a specific end goal to outline and fabricate the secured network system, numerous elements must be thought seriously about, for example, the topology and position of hosts inside of the system, the determination of equipment and programming innovations, what's more, the cautious arrangement of every part. My paper will be an examination of the issues percentage in outlining a safe Local Area Network (LAN) and a best's portion practices proposed by security specialists. I will examine securing a LAN from network's perspective. [1] Introduction: With most complex innovations, there's not one size-fits-all arrangement regarding the matter of network administration. The needs and assets of every one of a kind association will relate…

    • 877 Words
    • 4 Pages
    Great Essays
  • Decent Essays

    Nt1330 Unit 1

    • 360 Words
    • 2 Pages

    These days’ security is a critical factor of I.T whether it be protecting physical devices or information. What are some basic examples of ways to provide physical security for a server? What can be done about logical security? Security in the critical factor for everything related to internet.…

    • 360 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    Cyber Ark is an enterprise application cyber security company based in Israel with offices worldwide. The United States headquarters is in Newton, MA. with regional sales offices in Ft. Lauderdale, Houston, Las Angles and Chicago. The company is well known in the IT Security Company with a quality product designed to secure data in the enterprise as well as the cloud.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    This also helps to detect strange traffic running across the servers 3. Secure Workstations: Creating user log in set ups so that only the corresponding person can access the network from a work station help to prevent lower security level personnel from gaining access. 4. Secure the Network: Access level assignments…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Opening Statement Written policies provide a means of security within organization. It establishes the regulations that all faculty must adhere to in order to protect important company and client information. The organizational policies should be read by and signed by each employee as a consensus that all regulations will be followed once joining the organization. And, for those who are current employees, to keep abreast of any amendments made to current policy, so that all employees are in compliance. These policies should be kept in an accessible place for everyone to read, so no one will be left out of the loop.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    This includes shredding all paperwork that contains unnecessary confidential health information, checking the fax number before sending confidential information by fax, using closed door and privacy curtains when discussing health information with a client, and keeping medical records attended to at all times. Confidential health information that you see or hear yourself must be kept to yourself and look only at that medical information you need to do your particular job. If employees come to the healthcare facility for care, their information needs to be as protected as anyone else’s medical records. Security safeguards need to be in place at all times. Some ways to do this include the following: *…

    • 1016 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Why is Credentialing and Network Management Important for a Health Plan? Credentialing and Network Management plays a vital role in the success of Health Care Management as we see it today. ABCBS as a health plan has been a name trusted throughout the years by our members and consumers and I believe that part of that trust comes from knowing that ABCBS has put in place a diverse group of providers available to meet each need. Health Plans must ensure that providers meet certain criteria and guidelines in order to be a participating provider.…

    • 668 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    7/A. P2: Explain the principles of information security when protecting the IT systems of organizations 7/A. P3: Explain why organization must adhere to legal requirements when considering IT system Security. 7/AB. D1: Evaluate the effectiveness of the technique used to protect organisations from security threats whilst taking account of the principles of information security and legal requirements. Principles of information security…

    • 1392 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Importance Of Safeguards

    • 1515 Words
    • 7 Pages

    Nevertheless, keeping the ICS network separated from the corporate network or any other public network using firewall, routers and VPN appliances will allow this separation to take place as longer as strict policy and procedure is followed, knowing that today’s attackers target insiders within a network and employ them as point of compromise; qualified personnel is trained, device are configured following the state-of-the-art standards, and firmware and software are…

    • 1515 Words
    • 7 Pages
    Great Essays
  • Superior Essays

    As from the previous case study, each friend decided to purchase a laptop for themselves. In which they will be using Wi-Fi network from home, school and when they are working from restaurants that have free Wi-Fi hot spots. Each network might seem a reliable and secure way to navigate the internet, but at times there can be a risk from a malicious website where a person’s identity can be stolen. The intruder can access someone’s device from many things such as downloading a file from the wrong website, or even being connected into a Wi-Fi hot spot, thinking that it is from the restaurant. Now I will explain the following concepts that can help secure and maintain a computer.…

    • 1361 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    A literature review allows a researcher to present the findings and viewpoints of other researchers in order to build on existing knowledge (Onwuegbuzie, Leech, & Collins 2012). This allows the researcher to build a solid foundation in which to further sustain their work and demonstrate the credibility of sources used. By the use of Google Scholar, EBESCOhost and proQuest I reviewed the literature pertaining to cyber awareness, cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness.…

    • 2302 Words
    • 10 Pages
    Great Essays
  • Improved Essays

    These days Internet has made it easier to send and receive accurate data from any destination, which is a rapid development. There are different transmission media to transfer the data to destination such as social sites, emails, file sharing sites, etc. Also, it might be easier to modify and misuse the significant data by hacking. There are many approaches to transfer the data securely to the destination without any modifications like cryptography and steganography.…

    • 1064 Words
    • 5 Pages
    Improved Essays