The Importance of Corporate Network Security

2848 Words12 Pages
Networking is a norm in many corporate based institutions in modern society. Computerized applications, software and communication has been greatly deployed to foster service delivery in the organizations. Despite the many merits tied to networking, it poses some threats that can proof costly if not handled professionally. Good news is that there are measures that can be adopted to form a robust computer network system that will ensure minimal or no intrusion by any assailants. This paper seeks to explore a number of factors indicative of weak computer networking system, and various measures to plan and enable stern security. In addition, the paper will discuss measures that can be handy when dealing with networking crisis that has befallen a particular organization. All examples and assumptions discussed will assume a purely corporate business environment. An evaluation of the concept of network security within corporate setting. Networking in any organization is always tailored to meet specific requirements. The design is to ensure total quality service delivery by incorporating the relevant software and databases alleged to a corporate body. Communication protocols designed for any network will always assume the TCP/IP or OSI Models. Computer networking therefore uses a uniform internal pattern and mode of operation to ensure success in networking. This is regardless of the external configuration of computers, routers, hubs, switches, and other networking devises. Network security cuts across every system in the organization. Currently, firms are highly alert concerning cases of rising network insecurity (Ayday, Delgosha &Fekri, 2007). In their work, Ayday, Delgosha and Fekri (2007) further illustrated that security concerns n... ... middle of paper ... ...ecurity. John Wiley and Sons. Huang Q., Cukier J., Kobayashi H., Liu B., and Zhang J., (2003). Fast authenticated key Establishment protocols for self-organizing sensor networks. In Proceedings of the 2nd ACM international workshop on Wireless sensor networks and applications. Kaufman C., Perlman R, and Speciner M. (2002). Network Security, Private Communications in a Public World, 2nd Edition, Prentice Hall. Kim H., and Hou J., (2003). Improving protocol capacity with model-based frame Scheduling in IEEE 802.11-operated WLANS. In Proceedings of the 9th annual international conference on Mobile computing and networking (MobiCom ’03). Simmonds, A, Sandilands, P., Ekert, L (2004). An Ontology for Network Security Attacks. Lecture Notes in Computer Science. Lecture Notes in Computer Science 3285: 317–323. doi:10.1007/978-3-540-30176-9_41. ISBN 978-3-540-23659-7

More about The Importance of Corporate Network Security

Open Document