Facebook Pixel Code
x
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Network Security Assignment Essay Example

Show related essays

Network Security Assignment

This is a preview of the 9-page document
Read full text

Network Security Assignment. Each of the organization's assets faces a security threat from within (internal) and from outside the organization (external).Security issues that will arise from within the organization (internal attacks) include access attacks such as eavesdropping (listening to a conversation that one is not part of) by fellow employees or through wireless networks, and snooping (looking through information files). Others include interception of transit information, unauthorized access to computers by employees, computer attacks by viruses, worms, Trojans, internal hackers and theft of hardware from within the organization (Maiwald, 2003). External attacks include hackers and cyber terrorists, and malware. The organization needs to address the measures that will be used to ensure the security of both information, physical hardware, internal and external attacks are checked.

Internal threats from employees are both intentional and accidental, where an employee can eavesdrop on another employee, hence gaining access to some information during conversation. In addition, employees can forge passwords of their colleagues and hence gain access to their computers, use, modify, and transfer information to other unauthorized members outside the organization. Moreover, employees may bring external or foreign insecure hardware into the organization, resulting in virus infection and transmission. Lastly, employees could steal portable small size hardware from the organization. Information and communication within the organization will be affected in one way or another. There might be lots of network traffic caused by attacks on the network, utilization of bandwidth by other clandestine programmes across the network, the security of both information and communication channels will face a threat.Encryption is one of the information security techniques that refer to the transforming of information (plaintext) using a defined algorithm so that the information becomes unreadable except to the parties involved who have the algorithm (hiding of information) to protect the information during transit. Network Security Assignment.

This is a preview of the 9-page document
Open full text

Reference

List

Douligeris C, & Serpanos, N, D., 2007. Network security: current status and future directions. Ontario: John Wiley & sons. (Online). Available from:  http://books.google.com/books?id=tsFVcHbpEwYC&printsec=frontcover&dq=Network+Security&cd=8#v=onepage&q&f=true.(Accessed 10 May 2011).

Harrington L, J., 2005. Network security: a practical approach. San Francisco: Academic Press. (Online).Available from: http://books.google.com/books?id=c4WJUzoi2EwC&dq=Network+Security&source=gbs_navlinks_s.(Accessed (10 May 2011).

James, B. D, J., 2008. Network security: know it all. Burlington: Morgan Kaufmann. (Online). Available from: http://books.google.com/books?id=6tX8Spgkq7kC&dq=Network+Security&source=gbs_navlinks_s.(Accessed 10 May 2011).

Maiwald, E., 2003. Network security: a beginners guide. California: McGraw-Hill Professional. (Online). Available from: http://books.google.com/books?id=dqZ6gcHxF7cC&printsec=frontcover&dq=Network+Security&cd=5#v=onepage&q&f=true(Accessed 10 May 2011).

Moeller R, R., 2007. COSO enterprise risk management: understanding the new integrated ERM framework. New Jersey: John Wiley and Sons. (Online). Available from: http://books.google.com/books?id=gXqjof7I9t4C&dq=risk+managenent&source=gbs_navlinks_s.(Accessed 10 May 2011).

Perera, D., 1990.The computer misuse Act (UK). http://www.daminda.com/downloads/ComputerMisuseAct.pdf (Accessed 10 May 2011).

Stoneburner, G., Goguen, A., & Feringa, A., 2002. Risk Management Guide for Information Technology Systems. NIST. (Online).Available from: http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf(Accessed 10 May 2011).

Close ✕
Tracy Smith Editor&Proofreader
Expert in: Technology, Engineering and Construction, Information Technology
Hire an Editor
Matt Hamilton Writer
Expert in: Technology, Agriculture, Military
Hire a Writer
preview essay on Network Security Assignment
WE CAN HELP TO FIND AN ESSAYDidn't find an essay?

Please type your essay title, choose your document type, enter your email and we send you essay samples

Contact Us