This website uses cookies to ensure you have the best experience. Learn more

Elements Of Network Security Essay

1606 words - 6 pages

Elements of Network Security

Introduction
The primary objective of a network security system is to, in a cost effective manner, balance convenient access to legitimate users and inaccessibility to attackers. In a nutshell, the goal is to prevent connectivity to anyone intending to cause harm to the network. The harm to which this paper refers can come in the following forms:
1. Application-level security threats, such as e-mail viruses and attachments.
2. Threats to network infrastructure devices.
3. Theft of network connectivity services.
4. Unauthorized access from internal and external sources.
5. Denial of service attacks.
Using a proper network security strategy reduces and, in some cases, even avoids the listed harmful attacks from occurring on a network (Gary, T., et al, Mar. 2002). This paper will discuss such a strategy used by the Los Angeles Department of Water and Power (LADWP), as well as the strategy's three primary elements: prevention, detection, and recovery.
Prevention
Surprisingly, the most common threat to a company's information assets does not come from the sly and cunning computer hacker that is glamorized by Hollywood movies, but from human error, inappropriate disclosures, and sheer carelessness on the part of the company's employees. Hackers who do intentionally tamper with the company's network often do so because they are tempted by assets they know are poorly protected. Weak security policies present the image that a company does not truly value its assets, which in turn attracts the petty thief and curiosity seeker. Therefore, the preventive element of any network security system should include a strong and enforceable security policy for its employees to follow, re-enforced by a form of technical protection (Control Data, 1999).
Firewalls, antivirus programs and packet filtering devices are used to protect access to the network at the LADWP. But these tools alone do not provide adequate system security – a policy for system users, as mentioned above, that is based on the identification and prioritization of threats and assumed threats helps to maintain the network's health. The key feature of the policy is an ongoing training program that teaches all users the importance and value of including safe system user practices in their daily routine. Users are more likely to follow security practices if they understand the purpose of the practice and the consequences when these practices aren't used. Added to the training is a physical and electrical restriction of access to sensitive information and areas to users who have no business purpose for using such access. To ensure that the preventive measures are functioning effectively, regular audits of the security policy are performed. Log-on IDs are checked to verify their validity, and the users' activities are monitored to determine if the policies are being followed.
Detection
The next element of a network security system is system violation...

Find Another Essay On Elements Of Network Security

Intorduction To IT Security Essay

1201 words - 5 pages , logical, or social nature , a plan that will outline the company’s approach to risks that will affect security will need to be developed. Targeting key areas of the network and developing countermeasures to provide solutions to the potential risks. Taking into consideration all the elements of risk management, identifying, analyzing, and assessment of risks using admonition can play a part in answering some of the questions that can arise. Whether

Corporate Network Management Essay

2150 words - 9 pages threats are usually the greatest source of security problems. Outsiders amount to between only 1 to 6 per cent of concerns. Many types of insider security threats do create substantial risks for organizations (Melford 1993). Network management can help manage internal issues but network management cannot act in a smart manner to solve problems without external operations from network staff. Within recent weeks, the Heartbleed SSL vulnerability

Computer Network Management

1391 words - 6 pages . The elements of the network are the equipment, databases, and connections. Insuring that these components work seamlessly together is the function of network management. Proactive maintenance uses an alarm monitor to create trouble tickets to dispatch personnel to the site of the problem. The network management system should act as a monitor for both security and control. There are three main architectures that a network management system

Bead Bar Network Paper

1507 words - 6 pages manage and control all the functions of the network. In Bead Bar, the concentrator should be located at the head office of the company. The cable used with this will be optic fiber cable.The justification for Bead Bar is that in using the star topology, Bead Bar must concentrate its security on the hub. Even if a node does not function the entire network will not be affected. This is important because maintaining the connectivity of the Bead Bar

Security in the Business Environment

1919 words - 8 pages are required when you send sensitive data outside of a trusted network. The SMF does not consider mandates for conversations about the same sensitive information. The following elements are within the scope of this SMF: • Developing security leadership and methods of assessing security risks within the overall enterprise security blueprint • Identifying strategic and tactical components (policy and plans, respectively) • Providing a

What Is Network Security

631 words - 3 pages What is network security? It relates to any activity done that applies some kind of network protection. Specifically, these activities protect the ability to use and rely on, integrity, and safety of your network and data. It protects against threats such as spyware, malware, identity theft, denial of service, and viruses. It also prevents unauthorized people from being a disturbance or doing damage to a network system. Network security is used

Networking and Management

4169 words - 17 pages networking, the integrated services (IntServ) architecture is an architecture that specifies the elements for the guaranteeing of quality of service (QoS) on the network. For instance, IntServ can be used to allow sound and video to be sent over a network to the receiver without getting interrupted. IntServ specifies a fine-grained Quality of service system, in contrast to DiffServ's coarse-grained system of control. In the IntServ architecture, the

All about Network Security

873 words - 4 pages Network security is as important as securing your own home. There are networks all around us and large or small businesses all rely on their computer network to keep running smooth. Network security is not as easy an issue as it sounds. There are many technicalities involved especially when your network is the backbone of your business. Increment in the number of networks brings with it new and lethal security threats. All the important

4. Comprehensive understanding of legal, social, economic effect of eBusiness. - school assignment - Ebusiness

2692 words - 11 pages SOCIAL MEDIA & WEB DESIGN GROUP COURSE CODE: 5M0828 Module : eBusiness Studies Module Code: 5N1369 ASSIGNMENT 2 – 25% eBusiness Studies Student Name: Fatimo Oladele Year: 2017/2018 CONTENTS OF ASSIGNMENT 2: 1. Comprehensive awareness of network safety, practical eBusiness application indicated. · A Network definition · Why security of data and networks is important for eBusiness: · E-business infrastructure · Network Security way to keep your

The Republic of India

936 words - 4 pages in the field of cyber security. What happened in the past? The roots of Internet can be traced back to the efforts by the Defense Advanced Research Projects Agency (DARPA) of the US Department of Defense (DOD) to create a network for communication that would endure a nuclear exchange between the two superpowers. The network was subsequently used in the field of academics as a means of communicating and collaborating on research projects. In

Network Design

1566 words - 6 pages plan, and create a project plan. In addition, fundamental Design Goals are also important. Fundamental Design Goals consist of scalability, availability, security, and manageability. Scalability on the word of SCTE websites is a “Scalable network designs can grow to include new user groups and remote sites and can support new applications without impacting the level of service delivered to existing users”(Introducing Network Design

Similar Essays

Overview Of Network Security Essay

1050 words - 4 pages Network Security is the protection of the computer’s network though out the entire infrastructure. It can protect very important information and computer files to help prevent theft, spyware, malware, viruses, and more. Depending on if you have a public or private network, can determine what type of security settings you need for your network. All people are different on what they want to have secured or not, but most people do not know how to

World Of Network Security Infirmities Essay

1708 words - 7 pages World of Network Security Infirmities Network security is a very broad subject for me. I started out in telecommunications field as a Radiomen in United States Navy in 1992. Security was always the main mandate for my job field. I was required to have a security clearance and safeguarding equipment and information for which I had access to. The job area always had all types’ of electronic devices like computers, transmitters, receivers

Investigation Of Network Security Requirements And Their Impact On Performance With The Aim Of Establishing Configurations Fit For The Purpose

1015 words - 5 pages software such as Microsoft project on a server and therefore, enabling every one that has access to the server to use the resource. This saves the organization expenses as they don’t have to buy separate licenses for every user’s computer. However, this great development has led to a number of security threats and challenges in the organization from outsiders through intrusions, once hackers identify a loop hole in the network they can be able to

Computer Crimes Need To Be Prevented And Halted Through Increased Computer Network Security Measures As Well As Tougher Laws And Enforcement Of Those Laws In Cyberspace

3335 words - 13 pages programer may change the program so that all the fractions of the cents left over go into his account. This type of theft is hard to detect because the books balance. The sum of money can be extremely large, when taken from thousands of accounts over a period of time.'Phone Phreaks' were the first hackers. They are criminals that break into the telephone system though many various mean to gain free access to the telephone network. Since