Essay about Network Security

5816 Words Jul 26th, 2014 24 Pages
CRAM Exclusive
Essay Sample
Fundamental Principles of Network Security By Christopher Leidigh White Paper #101 Executive Summary Security incidents are rising at an alarming rate every year. As the complexity of the threats increases, so do the security measures required to protect networks. Data center operators, network administrators, and other data center professionals need to comprehend the basics of security in order to safely deploy and manage networks today. This paper covers the fundamentals of

middle of document…

Since there is no such thing as “the only way to approach security”, it is left up to the reader / implementer to best judge what measures are appropriate.

The people problem
People are truly the weakest link in any security schema. Most people are not careful about keeping secrets such as passwords and access codes that form the basis for most secure systems. All security systems rely on a set of measures employed to control access, verify identity and protect disclosure of sensitive information. These measures usually involve one or more “secrets”. Should a secret be revealed or stolen

2005 American Power Conversion. All rights reserved. No part of this publication may be used, reproduced, photocopied, transmitted, or stored in any retrieval system of any nature, without the written permission of the copyright owner. www.apc.com Rev 2005-0

3

then the systems that are protected by these secrets can be compromised. It may seem like a terribly obvious statement, but most systems are compromised in very basic ways. Leaving a Post-It note with a system password stuck to the side of a computer monitor may seem foolish, but many people in fact do such things. Another example, which is only slightly less obvious, is
CRAM Exclusive
River59317Game

Related Documents

  • Network Security Essay

    Intrusions Network attacks cause organizations several hours or days of downtime and serious breaches in data confidentiality and integrity. Depending on the level of the attack and the type of information that has been compromised, the consequences of network attacks vary in degree from mildly annoying to completely debilitating, and the cost of recovery from attacks can range from hundreds to millions of dollars. Designing the Security Infrastructure The objective of network security is to protect

    Words: 1561 - Pages: 7
  • Network Security Essays

    A firewall is like a border sentry. A firewall is like a gateway and is often called a “security gateway.” A firewall is like a traffic control device. A firewall is a filtering device that enforces network security policy and protects the network against external attacks. A packet is a unit of information that is routed between one point and another over the Internet or any other network. The packet header includes information such as source, type, size, and origin and destination address. As a

    Words: 15363 - Pages: 62
  • Network Security Essay

    Thus, companies must enact security policies and instate safeguards that not only are effective, but are also perceived as effective. Organizations must be able to adequately communicate how they plan to protect their customers. In addition to protecting their customers, corporations must protect their employees and partners from security breaches. The Internet, intranets, and extranets enable fast and effective communication between employees and partners. However, such communication and efficiency

    Words: 3879 - Pages: 16
  • Network Security Essay

    that areconnected to corporate networks or the Internet. Even more malicious are Distributed Denial of Service (DDoS) attacks in which an attacker compromises multiple machines or hosts. According to the 2001 Computer Security Institute (CSI) and FBI "Computer Crime and Security Survey," 38 percent of respondents detected DoS attacks, compared with 11 percent in 2000. Historically, password attacks, attacks in which a perpetrator gains unauthorized access to network passwords in order penetrate

    Words: 1526 - Pages: 7
  • Final: Security and Network Essay

    not limited to outside malicious users but also legitimate users engaged in illegitimate activity. Based on the above description you are to provide a recommendation of how you would address each of the following ABC Healthcare’s computer network security requirements. Note, whereas cost is typically an important factor, this is not a consideration for this case analysis. Therefore, you do not need to include cost estimates. Your solution should have the “right feel”, despite the lack of depth

    Words: 3269 - Pages: 14
  • Essay on Network Security

    Once these holes were discovered, securing the network became a priority. Each of the seven layers in the OSI model has it’s own weaknesses and this must have it’s own method of security. In an article in Certification magazine regarding network security, Kevin Song stated “There are a variety of ways to classify security vulnerabilities and attacks. It is worthwhile to briefly examine them by OSI layers. The vast majority of vulnerabilities exhibit themselves as application-layer vulnerabilities

    Words: 2635 - Pages: 11
  • Network Security Plan Essay

    It is recommended that the new permanent staff posts be assigned to the Computing Service department and based within one of the existing central support teams. Additional central support team resources would be drawn from the following:   * Network team - at least 2 members * Central team – at least 2 members Responsibilities The primary responsibilities of the Core team would be to maintain the day to day operation; provide advice, monitor for incident alerts and reports, manage incident

    Words: 3365 - Pages: 14
  • Essay on Novell Network for Company Security

    These can be locks, people or physical barriers that stand in the way of a desired location or object. Computer security uses much of the same utilities. Passwords take the place of keys, security analysts take the place of guards, and firewalls take the place of physical barriers. Passwords and firewalls are the two most common ways to secure a computer system. The organizations in this century more increasingly depend on data communication for the daily business communication, database information

    Words: 3398 - Pages: 14
  • Network Security and Ethical Hacking Essay

    There was no need for security at the time as there was no perceived threat from within as everyone was trusted and as the Internet did not exist there was no externally posed threat either. Once LANs became linked up and WAN links were the norm plus the birth of the Internet and an increase in LAN exposure to working professionals (Non IT personal) there became a need to safeguard the network not only from external threats but also internal threats as well.i It’s worth mentioning that the need

    Words: 5259 - Pages: 22
  • Five Network Security Breaches Essay

    (2012), “social engineering is a technique for breaching a system’s security by exploiting human nature rather than technology” (p.6). This attack could have been prevented by either of the two companies involved if they had an education program in place for their employees on how to recognize and prevent social engineering exploitation. The theft of Naoki’s account could also have been prevented if PayPal or GoDaddy had better security policies in place. For instance, an assistant at PayPal should under

    Words: 1569 - Pages: 7