Essay about Network Security

5816 Words Jul 19th, 2014 24 Pages
CRAM Exclusive
Essay Sample: Page 2
Since there is no such thing as “the only way to approach security”, it is left up to the reader / implementer to best judge what measures are appropriate.



The people problem

People are truly the weakest link in any security schema. Most people are not careful about keeping secrets such as passwords and access codes that form the basis for most secure systems. All security systems rely on a set of measures employed to control access, verify identity and protect disclosure of sensitive information. These measures usually involve one or more “secrets”. Should a secret be revealed or stolen



2005 American Power Conversion. All rights reserved. No part of this publication may be used, reproduced, photocopied, transmitted, or stored in any retrieval system of any nature, without the written permission of the copyright owner. www.apc.com Rev 2005-0



3



then the systems that are protected by these secrets can be compromised. It may seem like a terribly obvious statement, but most systems are compromised in very basic ways. Leaving a Post-It note with a system password stuck to the side of a computer monitor may seem foolish, but many people in fact do such things. Another example, which is only slightly less obvious, is
CRAM Exclusive
River59317Game

Related Documents

  • Network Security Essay

    ABSTRACT : This paper describes the basic threats to the network security and the basic issues of interest for designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers INTRODUCTION Over the past few years, Internet-enabled business, or e-business, has drastically improved efficiency and revenue growth. E-business applications such as e-commerce, supply-chain management, and remote

    Words: 1526 - Pages: 7
  • Network Security Essay

    ABSTRACT : This paper describes the basic threats to the network security and the basic issues of interest for designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers INTRODUCTION Over the past few years, Internet-enabled business, or e-business, has drastically improved efficiency and revenue growth. E-business applications such as e-commerce, supply-chain management, and remote

    Words: 1561 - Pages: 7
  • Network Security Essay

    Importance of Security The Internet has undoubtedly become the largest public data network, enabling and facilitating both personal and business communications worldwide. The volume of traffic moving over the Internet, as well as corporate networks, is expanding exponentially every day. More and more communication is taking place via e-mail; mobile workers, telecommuters, and branch offices are using the Internet to remotely connect to their corporate networks; and commercial transactions completed

    Words: 3879 - Pages: 16
  • Network Security Essays

    CHAPTER Firewall Fundamentals 2 T o some network administrators, a firewall is the key component of their infrastructure’s security. To others, a firewall is a hassle and a barrier to accomplishing essential tasks. In most cases, the negative view of firewalls stems from a basic misunderstanding of the nature of firewalls and how they work. This chapter will help dispel this confusion. This chapter clearly defines the fundamentals of firewalls. These include what a firewall is, what a

    Words: 15363 - Pages: 62
  • Essay on Network Security

    Network Security In today’s world, with so many ways to gain unauthorized access to someone’s computer system, network security is very important. Almost every company has been a victim of a virus attack, hackers, or some other form of unauthorized access to their network. In this paper, I will discuss various methods that those who want this access use and ways they can be prevented. Many people feel that because they use passwords their files are secure and can’t be hacked. They

    Words: 2635 - Pages: 11
  • Network Security Plan Essay

    which exposes an organizations external services to the internet. Adding an additional layer to the security LAN will help the organization against any outside hackers. Another issue found was that the company did not have secure remote access to their computers while away from the organization. Granting access on a per-user basis only to those who have a bona fide need to access the network remotely. Implementing a remote access to the organizations computers while keeping it secure via firewalls

    Words: 3365 - Pages: 14
  • Five Network Security Breaches Essay

    Five Network Security Breaches Network breaches are an ever-present and growing threat to network security. There are many ways that such breaches can occur, and the following material will analyze five case studies. The issues to be addressed will include, what went wrong, how could it have been prevented, and what measures could be instituted to prevent a reoccurrence. Naoki Hiroshima’s Twitter Handle Naoki Hiroshima was the owner of a rare Twitter handle of just one letter, @N. The handle is

    Words: 1569 - Pages: 7
  • Final: Security and Network Essay

    and worms are growing more pervasive and damaging, and ABC Heathcare’s stakeholders are demanding more flexible access to their systems. The healthcare industry is experiencing significant regulatory pressures that mandate prudent information security and systems management practices. Furthermore, the continued pressure to reduce cost requires that management focus on streamlining operations, reducing management overhead and minimizing human intervention. The regulatory focus at ABC Healthcare

    Words: 3269 - Pages: 14
  • Essay on Novell Network for Company Security

    Novell Network for Company Security As today's businesses increase in sizes, there is a more demanding need for an increase in security needs. Many businesses today have to answer the question of, "When do I know that have too much security and which network system is more secure for my company?" To answer this question many points of views have to immerge with the best compatible solution. Companies should consider involving many systems such as cost management, and security management

    Words: 3398 - Pages: 14
  • Cryptography and Network Security Essay

    different forms. There are many cryptographic algorithms. There are a numerous amounts of different types of cryptography. All these different types of cryptography have reasonable uses in the world. One key area where cryptography is used is in network security. HISTORY & TYPES OF CRYPTOGRAPHY The history of cryptography is outstanding. Cryptography has been dated back to 1900 B.C. when an Egyptian scribe used non-standard hieroglyphs in an inscription. Cryptography is the art of protecting information

    Words: 1264 - Pages: 6