This website uses cookies to ensure you have the best experience. Learn more

All About Network Security Essay

873 words - 4 pages

Network security is as important as securing your own home. There are networks all around us and large or small businesses all rely on their computer network to keep running smooth. Network security is not as easy an issue as it sounds. There are many technicalities involved especially when your network is the backbone of your business. Increment in the number of networks brings with it new and lethal security threats. All the important information circulates through your network thus the network security is of paramount importance.
Network Security in general
Network security means any measure taken to ensure that the network is secure and it is not vulnerable to different types of cyber attacks. Efficacious network security includes measures taken to help protect your network from various security threats that can spy on your network or worst, can take over the whole network. It is important to understand all the major threats that are possibly out there that can infest your network and the protective measures that can be taken against them.
Common Network Security threats
Networks can be vulnerable to numerous attacks that can inflict damage in one way or the other. The common threats include:
• Complete Unauthorized access
• Data theft
• Spywares and viruses
• Denial-of-service attack
• Spoofing
• Spamming
These types of attack can potentially infer large amounts of damage and losses if not taken into consideration. Here is some explanation of each above-mentioned attack.
Complete Unauthorized Access
As the name suggests, attackers can gain complete access to a system and can easily control and modify any information to their will. This can be very lethal, as the attack would have all the privileges for that system.

Data Theft
Here the attacker might not have full control of the network but can read or modify some of the information and use it to inflict some sort of damage to the owner.
Spywares and Viruses
These are certain programs that are specifically designed to get into the system and modify or keep track of the information that is circulating the network without the attacker having direct access to your system. These programs have the ability to multiply once getting access to a computer system. Spywares and viruses are the most common form internet threats and can be dealt with easily but if proper security measures are not taken then spywares and viruses can cause considerable amount of damage.
Denial-of-service attacks
This may affect the proper functionality of your network. This can interrupt the services that are intended for the authorized user and can give attacker the opportunities for further future intrusions. In this sort of...

Find Another Essay On All about Network Security

Implementing a New Wide Secure Wireless Network at Brigham Young University Hawaii

2628 words - 11 pages . Future requirements • New campus wide secure wireless network • Network security • Monitoring of network to improve the security • Greater authentication and authorization to campus resources • Deploy 802.1x access control • Support existing infrastructure • Sign-in privacy policy for all users • Identify the offender who violates code of conduct • Select new authentication solution which is capable to work under multi-vendor environment

Project Plan Essay

1849 words - 8 pages -well configuration web server can lead to many security holes for hacker to take advantage to bypass security and take full control of the server. The ABC network design team need to work closely with IT department to configure all the web servers to ensure the system is safe and secure for the public. Database server also need be well consideration for security factor when design the network. Client sensitive data need to be projected because

Network Security

1286 words - 5 pages , inventory management, etc. (Network 1) In a world considered perfect, companies would be able to combine all of their computer systems together both new and old (Network 1). Expenses make it difficult to totally replace old systems with new ones. Beyond the purely financial costs involved, doing so often requires retraining thousands of employees and making changes to long-established systems and processes. The bad thing about many legacy systems

Types of Networks

1351 words - 6 pages protect the integrity, confidentiality, availability etc. and however they have some differences in their classes.. Wireless Networks can be classified into some categories depending on different criteria (e.g. size of the physical area that they are capable of covering and domain of their use).The Wireless network work with almost many kind of area network as we know about them as DAN, WAN, PAN, MAN etc. . 3. SECURITY All security system must

Investigation of Network Security Requirements and their Impact on Performance with the aim of establishing configurations fit for the purpose

1015 words - 5 pages software such as Microsoft project on a server and therefore, enabling every one that has access to the server to use the resource. This saves the organization expenses as they don’t have to buy separate licenses for every user’s computer. However, this great development has led to a number of security threats and challenges in the organization from outsiders through intrusions, once hackers identify a loop hole in the network they can be able to

Corporate Network Management

2150 words - 9 pages that corporate network management must be seen as a positive benefit to the business and not as a continual expense. The supporting articles will also provide sound evidence that networking is crucial to a business’s processes and production which can be seen from the OpenSSL Heartbleed Security vulnerability fiasco (Nieva 2014) or the QANTAS Amadeus system failure (Heasley 2012). Networks in organisation are dynamic and complex entities which

Network Security

1567 words - 6 pages example, network security is used to protect the money you have at your bank. More and more things are being tracked on computers, it's essential to understand how to protect it from getting into the wrong hands. Who are we protecting ourselves from? It's an unfortunate thing to think about but we are protecting ourselves from ourselves. Although it seems like this is all new, we have always protected ourselves in one way or another

Computer Network Management

1391 words - 6 pages localization, fault correction, testing, and trouble administration. Performance management provides preventative maintenance, capacity planning, and statistical analysis. Security management controls all network security information, to provide prevention, detection, containment and recovery, and security Administration. Accounting management collects the information about the clients’ usage of the services to keep track of billing. Tariffs, pricing

Steps To Effectively Respond To A Security Incident And Threats On A Wireless Network

1172 words - 5 pages the network. Encryption and passwords If the PDA's and laptops support encryption, then, by all means, use it. Theses devices are accessing your company's information, and you need to make sure to safeguard it. If the device doesn't support passwords, it doesn't belong on your network. Preach E-mail protection Educate users about security best practices, and urge them to be vigilant about e-mail and attachments. While they should know better

Soboat Technology Inc.: Information Sercurity Plan

2272 words - 10 pages Officer will be responsible for the following for their part in the security awareness program: • Ensuring security policies, procedures, and standards are in place • Providing basic security support for all systems and users • Advising owners of computer resources • Advising systems development and applications owners in the implementation of security controls • Educating users with comprehensive information about security controls • Providing on

Network Security Practices

810 words - 3 pages understanding on what their part is when it comes to information security. To think that security professionals can handle this task alone would be foolish, it is up to everyone to have good security practices and follow then at all times. To fully protect any network there are some key areas that should be looked at keenly to see if security procedures are being followed or if a security person will need to take a closer look at: 1

Similar Essays

The Iranian Nuclear Threat To Israeli National Security: Similar To Real Estate, It’s All About Location

1157 words - 5 pages Section 4: Iranian Nuclear Proliferation Program Discovery (2002 - January 20, 2014) For at least the past twenty years, the vast majority of world powers, or at least the UN Security Council, has felt that Iran has not been entirely honest about the purpose of their continuously growing nuclear programme, as well as what it entails. Some of the world powers were nervous out about the possibility that Iran was seeking to build a nuclear bomb

This Essay Is About Secruity Risk List Four Possible Security Risks That The Bank And The Clients Are Facing In The Present Network Setup. Explain Clearly Why These Security Risks Exist

1481 words - 6 pages normally is not private at all. Once a VPN connection is successfully established, the client is connected just as if it were actually inside the network. A VPN connection can be used for connecting to just about any resource inside a network, such as a mail server, Web server, or database.c. List three (3) security measures that are needed to protect the client's banking transactions. Explain clearly why these security measures are needed and in

Intorduction To It Security Essay

1201 words - 5 pages protect the network. Ensure that we continually update our policies and procedures keeping up to date with the latest security updates. An effective training program to ensure that all users are being trained properly about the dangers to the network and what to do in the event of a potential threat, as well as setting a standard for all to comply with. Implementation of these aspects can have an enormous effect on a company’s strategy for “IT

Network Design Essay

1566 words - 6 pages quickly. Regardless of the type of server, a fast network connection is critical, since all data flows through that connection”(Server). In conclusion, when designing a network, couples of items are essentials to have such as fundamental goals, a drawing or diagram, the hierarchical Network Design, IP addresses, routing protocols, and Servers. The Fundamental goals are scalability, availability, security, and manageability. When it