This website uses cookies to ensure you have the best experience. Learn more

World Of Network Security Infirmities Essay

1708 words - 7 pages

World of Network Security Infirmities
Network security is a very broad subject for me. I started out in telecommunications field as a Radiomen in United States Navy in 1992. Security was always the main mandate for my job field. I was required to have a security clearance and safeguarding equipment and information for which I had access to. The job area always had all types’ of electronic devices like computers, transmitters, receivers, electronic keying material system (EKMS) equipment, modems, brick phones, and multiplexing devices. These items were always accounted for every 12 hours. Access to the physical space was based on security clearance level and the need to know basis for information.
During the early 90’s, the internet did not exist but as this new phenomena birthed my job title changed with added responsibilities. Information Systems Technician was the new named deemed for my field or IT for short. IT’s were responsible from everything to setting up video teleconferences to resetting user passwords, computer repair and maintaining the network. My was heart always fixated on telecommunications but due to the crass course of telecommunications and network security integration I had to turn over a leaf. The interest for network security still took a time to resonate with my being. I really became interested with network security when I looked at the pay scale and wide variety of jobs in the field. During the final 3 years of my 20 year career in the Armed Forces, I had the privilege to work with the 82nd Sustainment Brigade for a 1yr deployment in Afghanistan. The Army taught me how to be well rounded in Network Security. The taught me make cable and modify networks to fit the customer’s needs.
At the present time, schools, businesses, and global networks are being hacked into. Identity theft is at all-time high. Hackers unlawfully steal personal information and then use it to get capital gain, ruin a company, and site the vulnerabilities of a network. Today’s society is heavily depended upon computers and mobile devices. Free WiFi areas are common in most stores that you go to. FreeWi-Fi is the breeding ground for hackers to snipe critical information from unsuspecting patrons. The purpose of this paper is to find out how many banks, businesses and countries have been affected by hackers, what could be the possible outcome of security weaknesses, and what the United States is doing to prevent cyber terrorism. Research information will be derived from major news articles past and present.

The digital age has changed climate of the world. People have the convenience of paying bills, downloading music and telecommuting to work from home with a computer or mobile device. Information is easily accessible at any given time. These conveniences have paved the way for a new type of criminal. These cyber thieves expose the weaknesses in business infrastructures. The biggest holiday season for retail is after Thanksgiving...

Find Another Essay On World of Network Security Infirmities

Computer crimes need to be prevented and halted through increased computer network security measures as well as tougher laws and enforcement of those laws in cyberspace

3335 words - 13 pages law are not soon established, along with heightened security measures, the world will have a major catastrophe as a result of computer activity. The world is becoming increasingly dependant on computers, and the crimes committed will have greater and greater impact as the dependancy rises. The possible end of the world was narrowly averted, but was caused by a computer crime. The United States defense computer system was broken into, and the

Evaluate the effectiveness of the United Nations Security Council in maintaining World Order - Legal Studies - Assignment

1986 words - 8 pages ASSESSMENT 3 - WORLD ORDER In order to determine the effectiveness of the United Nations Security Council in maintaining World Order, it is important to view the role of this principal organ of the United Nations from a variety of contrasting ideological viewpoints. Thorough analysis of the functions and role of the UNSC in response to international conflict such as the Gulf Wars and the Rwandan Genocide reveals that while the UNSC has the

Information Security in the Context of Digital Divide in Arab World

1239 words - 5 pages penetration of ICT in individual countries at the global level. A significant difference is observed in the penetration of ICT between developing countries and the rest of the world. Social divide: refers to differences in access to ICT, and accordingly to the information within each state, nation or region. It also includes differences between the information- rich and information- poor which are mostly due to social differences in society

How successful was the league of nations in the 1920's? This essay analyses the problems and difficulties of the first attempt of a world security organization

743 words - 3 pages How successful was the league in the 1920's?The League of Nations main aim was in: "stopping wars, improving people's lives and jobs, in encouraging disarmament and in enforcing the decisions made in the peace Treaty of Versailles."If we consider the above statement to judge the successes of the league, we may say that when the League was called to settle a quarrel in the 1920s, it has always been quite successful.The most important successes

Hobbes' Theory of Laughter in Classic Comedic Plays

1413 words - 6 pages winter: if she lives till doomsday, she'll burn a week longer than the whole world (3.2.103-109). DS’ description of the kitchen maid is witty with its metaphors and is humorous in the Hobbesian tradition as he is focusing on her physical infirmities. DS’ wit is not limited to the use of metaphor but also in his quick thinking and ability to double-talk his way out of harm: Was there any ever man thus beaten out of season, When in the “why

What Is Network Security

631 words - 3 pages commonly in the world today. If you get a job in a place that has a multitude of computers they probably have some kind of network, which will need to be maintained by things such as firewalls, virus protection, intrusion detection/prevention systems. Also, is it easy to set up a network with a level of security and how do they do it? So if network security protects the network from threats, what are some of the ways you can protect you network

Network Design

1566 words - 6 pages Network Design Network Design is very important when it comes to implementing a connection between a computer and a server. According to Network world Websites, Network is defined as a “connected collection or devices and end systems, such as computers and servers, that can communicate with each other”(McQuerry). Network carry data in many types of environment, such as homes, small businesses, and large enterprises. Network

Intorduction To IT Security

1201 words - 5 pages measures to safeguard the network from intrusion. Effective administrative procedures that ensure personnel are properly trained and continually advised of updates and/or changes to security. In today’s world the collection, processing, and sharing of information has reached all time highs. It is because of this that the Internet as well as "IT Networks" occasionally referred to as "Intranets" need securing to protect from

Types of Networks

1351 words - 6 pages 1. INTRODUCTION In Today’s world the Internet grown significantly day by day in scope, and many results shown for operational requirements of internet in form of algorithms and new protocols. There are so many examples of these types of requirements which include quality of service support, multi- cast transport, security, mobile networking, and policy management. Development and evaluation of protocols and algorithms for these domains requires

Network Security

1286 words - 5 pages Network Security Network security is a problem that network administrators face. It is something that network administrators should keep a careful eye on. For example, if the home network does not have any security measures in place, then the person is at a high risk of data loss due to hacking. Network security is something that businesses do not take very lightly because they want to protect their valuable information and network

Project Plan

1849 words - 8 pages After the merging, the ABC Company becomes bigger and more competitive among the industry. However, the bigger the company the more complex the network infrastructure it should be. Thus, network security becomes a big concern for the CIO. Then new network need to serve the purpose of it’s designed and also maintain the necessary security policy for the entire organization. The ABC is a web application development company. The company relies on

Similar Essays

Overview Of Network Security Essay

1050 words - 4 pages Network Security is the protection of the computer’s network though out the entire infrastructure. It can protect very important information and computer files to help prevent theft, spyware, malware, viruses, and more. Depending on if you have a public or private network, can determine what type of security settings you need for your network. All people are different on what they want to have secured or not, but most people do not know how to

Elements Of Network Security Essay

1606 words - 6 pages Elements of Network Security Introduction The primary objective of a network security system is to, in a cost effective manner, balance convenient access to legitimate users and inaccessibility to attackers. In a nutshell, the goal is to prevent connectivity to anyone intending to cause harm to the network. The harm to which this paper refers can come in the following forms: 1. Application-level security threats, such as e-mail viruses and

A Literary Analysis Of Security Sector Reforms Around The World

994 words - 4 pages Throughout the history of our world, there have been many times in which countries go to war. To name a few of these instances, there are World War I, World War II, Vietnam War, Korean War, the Syrian Civil War, and many others. All of these wars eventually end, and soon the nations are back to peace, although sometimes the countries go through a political transition. One way that countries get to peace is by security sector reform. According to

Investigation Of Network Security Requirements And Their Impact On Performance With The Aim Of Establishing Configurations Fit For The Purpose

1015 words - 5 pages software such as Microsoft project on a server and therefore, enabling every one that has access to the server to use the resource. This saves the organization expenses as they don’t have to buy separate licenses for every user’s computer. However, this great development has led to a number of security threats and challenges in the organization from outsiders through intrusions, once hackers identify a loop hole in the network they can be able to