Internal threats from employees are both intentional and accidental, where an employee can eavesdrop on another employee, hence gaining access to some information during conversation. In addition, employees can forge passwords of their colleagues and hence gain access to their computers, use, modify, and transfer information to other unauthorized members outside the organization. Moreover, employees may bring external or foreign insecure hardware into the organization, resulting in virus infection and transmission. Lastly, employees could steal portable small size hardware from the organization. Information and communication within the organization will be affected in one way or another. There might be lots of network traffic caused by attacks on the network, utilization of bandwidth by other clandestine programmes across the network, the security of both information and communication channels will face a threat.Encryption is one of the information security techniques that refer to the transforming of information (plaintext) using a defined algorithm so that the information becomes unreadable except to the parties involved who have the algorithm (hiding of information) to protect the information during transit. Network Security Assignment.
Douligeris C, & Serpanos, N, D., 2007. Network security: current status and future directions. Ontario: John Wiley & sons. (Online). Available from: http://books.google.com/books?id=tsFVcHbpEwYC&printsec=frontcover&dq=Network+Security&cd=8#v=onepage&q&f=true.(Accessed 10 May 2011).
Harrington L, J., 2005. Network security: a practical approach. San Francisco: Academic Press. (Online).Available from: http://books.google.com/books?id=c4WJUzoi2EwC&dq=Network+Security&source=gbs_navlinks_s.(Accessed (10 May 2011).
James, B. D, J., 2008. Network security: know it all. Burlington: Morgan Kaufmann. (Online). Available from: http://books.google.com/books?id=6tX8Spgkq7kC&dq=Network+Security&source=gbs_navlinks_s.(Accessed 10 May 2011).
Maiwald, E., 2003. Network security: a beginners guide. California: McGraw-Hill Professional. (Online). Available from: http://books.google.com/books?id=dqZ6gcHxF7cC&printsec=frontcover&dq=Network+Security&cd=5#v=onepage&q&f=true(Accessed 10 May 2011).
Moeller R, R., 2007. COSO enterprise risk management: understanding the new integrated ERM framework. New Jersey: John Wiley and Sons. (Online). Available from: http://books.google.com/books?id=gXqjof7I9t4C&dq=risk+managenent&source=gbs_navlinks_s.(Accessed 10 May 2011).
Perera, D., 1990.The computer misuse Act (UK). http://www.daminda.com/downloads/ComputerMisuseAct.pdf (Accessed 10 May 2011).
Stoneburner, G., Goguen, A., & Feringa, A., 2002. Risk Management Guide for Information Technology Systems. NIST. (Online).Available from: http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf(Accessed 10 May 2011).
Please type your essay title, choose your document type, enter your email and we send you essay samples