This website uses cookies to ensure you have the best experience. Learn more

Overview Of Network Security Essay

1050 words - 4 pages

Network Security is the protection of the computer’s network though out the entire infrastructure. It can protect very important information and computer files to help prevent theft, spyware, malware, viruses, and more. Depending on if you have a public or private network, can determine what type of security settings you need for your network. All people are different on what they want to have secured or not, but most people do not know how to prevent people or things from getting in their network. “You must have a general understanding of security terminology and specifications as it relates to configuring hardware and software systems.”(Roberts, Richard M. 599). That quote states that by knowing and understanding security terms and specifics, you can
The protection of your network requires a level of network security. If you do not have security on your network, then you are capable of being hacked or receiving malware, spy, virus, and lots more. There are many programs or applications that can help detect and prevent strange activities on your computer, but there is also ways that you can help prevent anything from happening. Creating a password for your network is a good start toward protection of your computer. Try to make the password something only you would know, and maybe throw some numbers in there as well to maximize protection. It is good to know who all is on your network and internet; because if someone were to log on to your internet from a distance, they could plant viruses and other things into your files on the network. Quite a bit of problems occur in network when file sharing takes place in a work place to copy or manage files. Most of the time when this happens, no one sets the security setting up themselves, and so that automatically sets the security setting to minimal or less. This is a perfect chance for someone to sneak into the network and do terrible things to the files within the network. So be sure to manage the network file share setting to a high security setting that is most secure to your liking. The same goes for your firewall, be sure you manage your firewall setting to block out suspicious activity. One of the most, if not the most, problems with intrusion and theft is act of giving personal information to someone that is not who you think they are. This is also known as Social Engineering. Social engineering (according to Networking Fundamentals) is “a term used to describe the manipulation of personnel by the use of deceit to gain security information” (Roberts, Richard M. 600). This is one of the causes of identity theft and the plantation of spyware and malware. Never give your information out to anyone unless you’re absolutely sure who it is. It will help prevent identity theft and the plantation of damaging applications onto the computer.
Instead of security setting, there are lots of other things that people can do to prevent other people or things getting into your network. You can prevent malicious...

Find Another Essay On Overview of Network Security

Overview of the Cognitive Network Technique

2062 words - 8 pages Cognitive Network is a technique which is used to improve the spectrum utilization. Current network scenario is experiencing the huge spectrum scarcity problem due to the fixed assignment policy so in this method great amount of spectrum remain unused. To overcome this limitation the spectrum allocation must be in dynamic manner. In this report the spectrum allocation is discussed thoroughly. Interference is the most important factor that needs

Computer crimes need to be prevented and halted through increased computer network security measures as well as tougher laws and enforcement of those laws in cyberspace

3335 words - 13 pages programer may change the program so that all the fractions of the cents left over go into his account. This type of theft is hard to detect because the books balance. The sum of money can be extremely large, when taken from thousands of accounts over a period of time.'Phone Phreaks' were the first hackers. They are criminals that break into the telephone system though many various mean to gain free access to the telephone network. Since

Overview On The Department Of Homeland Security

628 words - 3 pages Homeland Security leverages resources within Federal, state, and local governments, coordinating the transition of multiple agencies and programs into a single, integrated agency focused on protecting the American people and their homeland. More than 87,000 different governmental jurisdictions at the federal, state, and local level have homeland security responsibilities.Those agencies making up the Department of Homeland Security are housed in

An Overview of American Security After September 11

1791 words - 7 pages values and priorities; a confidence in Washington’s capacity to translate its material resources into intended outcomes; and a sense of threat, sufficient to justify institutional adjustment at home and pre-emptive action abroad.” National Security in Cyberspace How it does or does not support Brown’s hypothesis about U.S. relative decline and the transition from unipolarity to polyarchy in the National Security in Cyberspace? Realizing the US

Intorduction To IT Security

1201 words - 5 pages Introduction to IT Security (ITM 431) Module #1 Case Assignment The Oxford American Dictionary of Current English defines admonition as "to reprove. Urge. Give earnest advice to. Warn". Understanding this how do we employ admonitions systems to information technology to make it more useful in-regards to Network and system security? Using admonition software we are attempting to create an environment that will either prevent

Implementing a New Wide Secure Wireless Network at Brigham Young University Hawaii

2628 words - 11 pages Introduction Brigham Young University Hawaii Campus wants to implement a campus wide secure wireless network. In their existing system there are some network security flaws such as rouge access point (Easily accessible open network), anyone can access and capture important information of users. We have been hired by the BYU-HAWAII to design and install a wireless network solution for the university. EXISTING SYSTEM Users-3000 User type-Students

Information Security Credentials

1389 words - 6 pages one of the newest certifications in the information security discipline today. Whitman and Mattord (2005) stated that "The SCP certification provides two tracks: the SCNP (Security Certified Network Professional) and the SCNA (Security Certified Network Architect). Both tracks are designed for the security technician and have dominant technical components, although SCNA also emphasizes authentication principles. Also, even though both SCNP and

LAN Requirements - Network Infrastructure for 150-bed Maternity Ward - Capella University, IT2250 - Research Paper

677 words - 3 pages 1 LAN REQUIREMENTS LAN Requirements ############ IT2250 – Introduction to Networking U01A1 LAN Requirements Capella University ############ Project Overview The Chief Information Officer of Health Systems, Inc., a regional hospital located outside of Washington, DC., has hired a business analyst. The business analyst is responsible for determining requirements for a new Local Area Network needed to support the 150-bed maternity ward building

Renewable Energy: Wind Energy

983 words - 4 pages infrastructure should satisfy the bandwidth and latency requirements for proper data exchange and operation of the wind turbines and the control center. Conventional WPF communication infrastructure is a switch-based architecture, where independent sets of switches and communication links are used for different network applications including wind turbine generator networks, protection and control networks, and telephone and security networks. The design of

Security Audit

2192 words - 9 pages place to protect the company against loss of information to the outside world. This paper addresses all the issues involved in security auditing of Ariam travel agency’s network and its premises. Security Audit Ariam travel agency handles bulk information that contains sensitive customers and employees’ information; it contains multiple external users and various e-commerce applications. Therefore, data security at this company is very

Security in the Business Environment

1919 words - 8 pages business efficiency. This SMF explains the requirements of security for commercial and business effectiveness, which business managers will have a particular interest in. Feedback Please direct questions or comments about this SMF guide to cisfdbk@microsoft.com. Top of page Security Management SMF Overview This section provides you with important background information on the remainder of the service management function (SMF) guide

Similar Essays

Elements Of Network Security Essay

1606 words - 6 pages Elements of Network Security Introduction The primary objective of a network security system is to, in a cost effective manner, balance convenient access to legitimate users and inaccessibility to attackers. In a nutshell, the goal is to prevent connectivity to anyone intending to cause harm to the network. The harm to which this paper refers can come in the following forms: 1. Application-level security threats, such as e-mail viruses and

World Of Network Security Infirmities Essay

1708 words - 7 pages World of Network Security Infirmities Network security is a very broad subject for me. I started out in telecommunications field as a Radiomen in United States Navy in 1992. Security was always the main mandate for my job field. I was required to have a security clearance and safeguarding equipment and information for which I had access to. The job area always had all types’ of electronic devices like computers, transmitters, receivers

Overview Of Cyber Security Essay

1482 words - 6 pages Online security breaching is criminal activity that can happen from any part of the world through the hacking of any infrastructure. Most breaches are done through the falsifying and personal information or even a breach of security stemming from lack of security. Now that more and more crime is happening over the internet there many different aspects to security as a whole. Due to the drastic increase in modern cybercrime the police

Investigation Of Network Security Requirements And Their Impact On Performance With The Aim Of Establishing Configurations Fit For The Purpose

1015 words - 5 pages software such as Microsoft project on a server and therefore, enabling every one that has access to the server to use the resource. This saves the organization expenses as they don’t have to buy separate licenses for every user’s computer. However, this great development has led to a number of security threats and challenges in the organization from outsiders through intrusions, once hackers identify a loop hole in the network they can be able to