Monday, October 7, 2019
Network Security Principles Essay Example | Topics and Well Written Essays - 750 words
Network Security Principles - Essay Example In other words, in order to ensure network security computer users must follow security plan or guidelines (Laudon & Laudon, 1999; Kaminsky, 2010; Ray, 2004). In the past few years several technologies have emerged throughout the whole globe and networking technology is without doubt the most amazing achievement in this era. On the other hand, security has turned out to be a challenging task for present network administration. In fact, the advancements of information technology have also offered a lot of benefits for the negative minded people. Now they have a wide variety of tools and technology which they can use to get illegal access to a network. In this scenario, it is essential for an organization to implement strict security policy. However, if an organization fails to put into practice an effective network security then an attacker or competitor can get access and use the important or secret data and information, probably causing data destruction or damage, or even the entire destruction of the computer network (Kaminsky & Foster, What is Network Security? , 2011; Armoni, 2002; Bhattacharya & Ghosh, 2009). It is an admitted fact that the emergence of the Internet has modernized our lives. On the other hand, it has as well introduced some of the severe safety and confidentiality issues. These issues can be tremendously devastating for private information. Hence, in an attempt to effectively deal with these issues organizations use network security rules and measures (Kaminsky & Foster, What is Network Security? , 2011; Armoni, 2002; Bhattacharya & Ghosh, 2009). As discussed above to deal with network security threats and an organization must implement an effective security policy. This policy should be an agreement, explaining in depth the organizationââ¬â¢s decisive resources and how sound they are organized. In fact, the fundamental aim of creating a network security policy is to provide the organizational employees with a brief outline of the "acce ptable usage" of some of the business information and resources. Additionally, this policy is also intended to adeptly illustrate the permissible rights of workers and as a result employing them in securing the data and information. In actual fact, a security plan works like a "must interpret" fashion of business information for everyone exploiting in any form, computer and network resources are believed to be possible targets. On the other hand, a high level and excellently created security policy is supposed to tackle some these subsequent fundamentals: (Danchev, 2003; Kim, Lee, Han, & Kim, 2009) How vulnerable business data must be organized and managed How passwords and other credentials have to be maintained securely How to respond to a possible security issue, disruption efforts, etc. How to make use of resources such as computers and the Internet in a better way How to properly make use of the business communication infrastructure In general, the most important reasons follow ing the creation of a security policy is to establish an organizationââ¬â¢s private data and information security basics. Another aspect is to inform to workers how they are responsible for the security of business resources and assets, and give emphasis to the implication of taking benefit from secured business communic
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.