Wednesday, May 15, 2019

Network Security Essay Example | Topics and Well Written Essays - 1250 words - 2

Network Security - Essay ExampleBut with this ease of culture access comes the issue of security. With the increase of info flow, there has been an increase in the number of attacks on information by hackers. Attacks such as Denial of Service (DoS) Attacks, Spoofs, Sniffing, etc. have increased with the increase in the availability of hacking tools which are free of cost. Valuable information is lost in the process. For example, if a customer buys a product of a particular organization through their web-site and a hacker presents himself as the organization and receives the currency from the customer, expensive information such as the ID of the customer, his credit card numbers, his passwords are all stolen by the hacker. because such information has to be transferred securely everywhere the Internet. Encryption is the most common way of securing valuable information while transmitting over the Internet (Rahman, 2003). Networks are secured in a different manner. They are secur ed using tools called Firewalls. Whenever transactions or information between a customer and an organization are being carried disclose, a particular pattern is followed. Firewalls recognize and allow only these transactions or processes to be carried out and block out all the unrecognized patterns. By implementing Firewalls, most of the attacks from the hackers can be kept out. Securing a network just does non happen. There are many issues to be considered when making policies for network security. The trio main issues back in the earlier days were Confidentiality, Integrity and Availability. Due to the advances in the technologies, these issues have been largely resolved. But in the present day Networks, other issues have appeared. These issues give eventually result in the breaching of confidentiality, integrity and availability thereby defeating the cause of coming up with Network Security policies. We can use up the following questions to resolve the recent issues relate d to Network Security Should Identity Manager be coiffure back to the User Identity Control from the top down approach has traditionally been imposed by all Enterprises and Governments. But this has resulted in resilience from the users. Users have always found it difficult to cope up with the time constraints resulting from the above mentioned approach. This approach looks increasingly antiquated for the present day user needs. Microsofts Kim Cameron once say that A system that does not put users in control will - immediately or over time - be rejected (Dean, 2006). This is true because users expect real fast response and do not like to waste their time in waiting for a response from the requested network or system. Identity Control being at the Server side is the key to ensuring trusted relationship for billions of line of credit transactions all over the world. Identity Control being at the server side makes it manageable for the replying Network to ensure that the keys const ructed are secure. Since the control will be present with the server, no user will have chance of even attempting to break the key and steal the information being transferred. At the macro instruction level, the advantages that accrue in the form of innumerable applications and services,

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.