You can think of network security as an insurance policy in a dangerous new world. In the good old days of centralized processing, is all you had to do was simply lock the computer room door and restrict entrance access. Those days are long gone in light of decentralized processing, the internet and vast communi-cation networks. Personal data and transaction security through networks is of paramount concern when processing through the expanding networks held by government and private enterprises. Network security in itself refers to a collection of tasks or plans that are implemented to ensure data privacy. An overall plan is enacted with security profiles enacted on a multilevel structure allowing various types of access to only those individuals who have a legitimate need for that data. This includes protecting the networks and data from terrorist attacks, natural disasters, hackers, thieves, company spies and disgruntled employees. The security system must accurately identify users who are allowed to gain access to the data and quickly weed out ones who are not. The security system must also be flexible constantly responding to new threats be it an unhappy employee or new computer virus with the intent of data destruction. Network and data attacks can come from many sides and take on many stealth forms and this only increases the need for a flexible and comprehensive security system.
In an electronic age where personal and financial information constantly flows through communication systems, network security must be a top priority.
PERSONAL INFORMATION ABOUT YOU TRAVELING ON NETWORKS
Network security must a top priority because of all the juicy information out there on individuals. Your credit cards numbers can be a critical secret as thieves can obtain them and go out on a buying spree on the internet. Your medical records are another critical information area. From medical records, not only can wrongdoers get medical information about you but really good tidbits like psychological problems you're encountered and maybe even your sexual orientation. Lesser types of juicy intrusions involve trespassing into grocery store discount card purchases. While this may seem quite minor, it is not. Do you really want strangers to know all of the huge purchases you've made of booze and cigarettes? Do you want people to know you're a boozing smokestack? What about your credit bureau? Boy, if your credit bureau gets mixed up, that could keep you from getting a house. It could keep you from a lot of things. Your dreams could fade away, all because of fraud. Quite clearly, network security in today's information age is of paramount concern.
THE MANY FACES OF ATTACKS
The first and easiest types of network attacks comes from hackers. Hackers are people typically using a home computer to gain access to systems they shouldn't be in and indeed the access is usually illegal. Hackers more and more...