Network Security Case Study

1091 Words3 Pages

We live in a technologically saturated world. Everyone is connected to one network or another by any number of devices, so that begs the question: “Just how secure are those connections?” Earlier this year, headlines were made when a hospital in California (and several others in other states shortly thereafter) had its network system hacked; its files and patient information encrypted and held ransom. To gain access to their own files, the hospital paid the hackers for the encryption key so that they could continue providing their patients with the much needed medical care they were seeking [1]. More recently, it was reported that over 6,000 online stores had malicious code, designed to steal and store credit card information, hidden within
It can be very expensive; costing hundreds of dollars for each stolen record. It’s challenging to prevent when hackers constantly update and change their patterns faster than the software designed to stop them is updated. Adding to that, users who try to circumvent security policies they find annoying or restrictive [3]. Another point of possible breach is employees accessing the network via personal devices (tablet, phone, usb) [4], poor network access passwords, and outdated server software. Even web cookies have the potential to provide access to private information [5]. There is no shortage of vulnerabilities that exist within any network and now some of the securities that are in place have been under discussion on just how “secure” they should be. Last year the terrorist attack in San Bernardino not only caught headlines because of the attack, but also because shortly thereafter there was a standoff between the FBI and Apple due to Apple’s refusal to crack the terrorists phone for the FBI. Apple stated that, “Up to this point, we have done everything that is both within our power and within the law to help them.” It continued, “But now the U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.” [6]. Since the FBI vs Apple case, regarding the complexity of the encryption Apples uses for its devices, encryption backdoors have been a hot topic. Apple argues that having one defeats the purpose of the encryption, making it easier to access and exploit data [7(a)]. Having encryption and Firewalls bring a peace of mind but vigilance, constant upkeep, and caution on the users end are also required for network security. Backing up data, avoiding a single point of failure, and making sure data is only put where it needs to be are a few extra precautions to keeping your network secure

Open Document