Network Security

Improved Essays
In today’s ever changing technological world, network security is a necessity. According to The SANS Institute, a research and educational organization dedicated to “information security training and security certification”, network security is “the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, thereby creating a secure platform for computers, users and programs to perform their permitted critical functions within a secure environment.” ( HYPERLINK "http://www.sans.org" www.sans.org)

There are several ways to physically secure a network, some of which include storing the more vulnerable network devices in a locked room with security access restrictions, installing surveillance cameras, removing unused or unsecured computers from workspaces, and securing printers that may retain sensitive document data in memory. ( HYPERLINK "http://www.techrepublic.com" www.techrepublic.com)

Securing a
…show more content…
Neglecting the human or technological aspect of network security can provide attackers with a vulnerable area to focus their attacks. ITProPortal.com states, “Statistically, we see that machine-driven security coupled with appropriate end-user engagement at the moment of threat identification reduced security professionals’ operational workloads by nearly 90%.” Network security is an absolute necessity and the use of firewalls, anti-malware, intrusion detection and prevention systems, network access control, and 2FA are all technology solutions that can provide high levels of network security when deployed and maintained correctly. Security conscious users are the final key to ensuring the most secure network possible in order to greatly reduce the potential for security

Related Documents

  • Great Essays

    Security Countermeasures

    • 1615 Words
    • 7 Pages

    Internet and wireless devices are necessary to maintain along with monitoring power plants. While the benefits from networks are not in question, the security liability certainly is. As our society becomes increasingly dependent upon networks the loss of that capability will be profound. Moreover, taking into consideration the interlinked communication of all these automated systems unveils the reality of an attack on one system having a cascading and cataclysmic effect. Conversely, the answer to the emerging liabilities appears to reside in the application of cutting edge technology.…

    • 1615 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Malicious code designed to exploit such vulnerabilities are a threat to confidential information Consequently, it is essential that small businesses keep their software and applications up-to-date with the latest patches. Updates to everything from Microsoft Office applications to new operating systems should be routinely checked for and downloaded. These patches and updates can be found on the specific vendor's website and their installation is particularly critical after a new product is released. Educate…

    • 967 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    avoiding such attacks such as Intrusion Detection System (IDS) which is the most popular method of defense [29]. A defense federation is used in [29] for guarding against such attacks. Under this technique each cloud is loaded with separate IDS. The different intrusion detection systems work on the basis of information that is exchange between these systems. In case a specific cloud is under attack, the cooperative IDS alert all other components in the system.…

    • 745 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    There is a subtle difference between security and protection, we will perceive that both of them are extremely close concepts but still not the same. Protection is assured if one has all the necessary security measures as security itself is a type of protection to all the external hazards. Information is a treasure which is immensely worthy to an organization and thus it needs to be protected firmly. It is easy to corrupt, lose and steal thus the measures needed or taken to secure them from irrelevant entries are mentioned as Information Security. The significant step taken by most of the Organizations or firms recently is the use of ethical hacking process or techniques to evaluate the success or failure of their current security measures.…

    • 1032 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Risk Analysis Assignment

    • 1273 Words
    • 6 Pages

    They typically take which sequence of steps? The steps involved in risk analysis are; (1) identifying any potential risks, (2) assessing the risks the risks that are found, and (3) controlling threats to an organization 's IT infrastructure in hopes of lowering or eliminating security threats. Two factor authentication is another method for attempting to block unauthorized access to a system, network, or general sensitive information. Two factor authentication requires "something you know"; a password or PIN, and "something you have"; a card, dongle, cellphone, or other piece of hardware. Finally, it is possible to reduce an attacker 's chances by keeping systems up to date with items such as security patches and system software and hardware…

    • 1273 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Nowadays we hear the word “cybersecurity” a lot but do you ever wonder what does it really mean? According to the department of homeland security, “Cybersecurity is general Internet safety, which includes protection of anything connected to or accessible by the Internet- from networks themselves to the information stored in computers.” The University of Maryland University College defines cybersecurity as a measure that protects our computers, networks, programs and data from unintended or unauthorized access, change or destruction.” You can also think of cybersecurity as a fence that keeps others from manipulating the confidentiality, integrity or the availability of your information without your consent. In the past 25 years, technology has…

    • 1184 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    To protect my company assets from cyber threats/attacks many things must be taken into consideration because there is always a deeper internal issue in what we believe is secure. Risk assessment and risk management are both very important parts of planning to create a safe, secure work environment to protect my employees and company both on the inside and outside of the company. I would assure that my company conducts a risk assessment periodically. This helps to see what has failed in the past versus what improvements and corrective actions have been made to present day. Comparing and contrasting the effects of failures also helps to determine if the current improvement fall into the same category.…

    • 700 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Wireless: Attempt to gain access to the wireless servers and workstation and also gain unauthorized access. Remote access: using generic password or user ID to gain unauthorized systems access. Users’ education in conjunction with scenario-based training is the best defense against Social Engineering attacks. Organization must implement an education program with invigorate network and physical security measures to protect its systems. Also with the use of scenario-based training users of the network can learn how to properly answer or respond to social engineering threats or attacks.…

    • 706 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    4. Use of firewall to safeguard online EHR systems unless they are offline. 5. Use of antivirus and malware protection plays a major role in securing the portal. 6. having data back ups regular interval ensuring its safety will be a responsibility when unexpected things happen around either during natural disaster or intruders hack into system.…

    • 1171 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Security Life Cycle

    • 1189 Words
    • 5 Pages

    Microsoft adopted the security development lifecycle to help to fight against malicious attacks. The SDL entail and include changing a software development organization 's methods and procedures by incorporating controls that direct and guide to superior software security: the purpose of these modifications is to insert clear and precise security checkpoints and security deliverables (Howard, 2005). This has played a critical part in implanting/inserting security and privacy in the software development process by merging a holistic and practical approach (Gregory, 2003). Security and privacy practices are introduced early on and developed and implemented throughout all phases of the development…

    • 1189 Words
    • 5 Pages
    Improved Essays