Essay on Overview of Network Security

Essay on Overview of Network Security

Length: 868 words (2.5 double-spaced pages)

Rating: Better Essays

Open Document

Essay Preview

Network Security is the protection of the computer’s network though out the entire infrastructure. It can protect very important information and computer files to help prevent theft, spyware, malware, viruses, and more. Depending on if you have a public or private network, can determine what type of security settings you need for your network. All people are different on what they want to have secured or not, but most people do not know how to prevent people or things from getting in their network. “You must have a general understanding of security terminology and specifications as it relates to configuring hardware and software systems.”(Roberts, Richard M. 599). That quote states that by knowing and understanding security terms and specifics, you can
The protection of your network requires a level of network security. If you do not have security on your network, then you are capable of being hacked or receiving malware, spy, virus, and lots more. There are many programs or applications that can help detect and prevent strange activities on your computer, but there is also ways that you can help prevent anything from happening. Creating a password for your network is a good start toward protection of your computer. Try to make the password something only you would know, and maybe throw some numbers in there as well to maximize protection. It is good to know who all is on your network and internet; because if someone were to log on to your internet from a distance, they could plant viruses and other things into your files on the network. Quite a bit of problems occur in network when file sharing takes place in a work place to copy or manage files. Most of the time when this happens, no one sets the security setting up themselves,...


... middle of paper ...


...work Security Article). With this given information in the essay, is a great start to learn how to keep your network secure. This is only a small part of the prevention of infiltration of your network and computer. If one desires to learn more, go above and beyond and continue to learn on how to keep your network secure.



Works Cited

Webpage:
"What Is Network Security?" Cisco. N.p., n.d. Web. 14 Nov. 2013. .

Book:
Roberts, Richard M. "Network Secrurity." Networking Fundamentals. 2nd ed. Tinley Park, IL: Goodheart-Willcox, 2005. 599-639. Print.


Magazine Article:
Johansson, Jesper M. "Managing the Windows Vista Firewall." TechNet 2008: n. pag. Web. 14 Nov. 2013. http://technet.microsoft.com/en-us/magazine/2008.06.security.aspx

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Essay on An Audit Of The Network Security Audit

- We have conducted an audit of the Network Security Audit. This audit was conducted under the authority of Article VII, Section 5 of the Garland City Charter and in accordance with the Annual Audit Plan approved by the Garland City Council. Objective The objective of this audit is to: A. Provide management with an independent assessment relating to the effectiveness of physical controls in place to prevent unauthorized access to sensitive material. B. Provide management with an evaluation of the IT’s administrative controls that sets tone of an organization, influencing the controls consciousness of its people....   [tags: Security, Information security, Computer security]

Better Essays
1335 words (3.8 pages)

International Union Agency For Network And Information Security Essay

- Ques1 Provide a brief overview of the case study This case study is based on European Union Agency for Network and Information Security (ENISA) to examine the current and emerging cyber threats and threat trend for emerging technology areas. This will be followed by the explanation about threat, threat agent, technology areas and attack methods. This case study also provides a description of the procedure followed; also use few descriptions on use- cases of cyber threat intelligence. The primary commitment of the ETL 2014 lies in the recognizable proof of top cyber danger inside the reporting time frame....   [tags: Security, National security, Computer security]

Better Essays
854 words (2.4 pages)

Security Policy, Perimeter, Network, And Network Essay

- Overview These are the 5 primary security groups that should be considered with any enterprise security model. These include security policy, perimeter, network, transaction and monitoring security. These are all part of any effective company security strategy. Any enterprise network has a perimeter that represents all equipment and circuits that connect to external networks both public and private. The internal network is comprised of all the servers, applications, data, and devices used for company operations....   [tags: Computer security, Access control, Authentication]

Better Essays
1317 words (3.8 pages)

Mobile Security Catching Up : Revealing The Nuts And Bolts Of The Security Of Mobile Devices

- Mobile Security Catching Up. Revealing the Nuts and Bolts of the Security of Mobile Devices Summary: The paper tells about growing importance of mobile security and explains differences between mobile and normal security. The paper provides a brief overview of mobile network security and mobile threats. The author stated that, beginning the use of smart phones have become so powerful and affected security system which in turn led to increased importance on mobile security....   [tags: Computer security, Security, Physical security]

Better Essays
890 words (2.5 pages)

Essay on The Lake County Library System System Overview

- System Overview The Lake County Library System consists of an administrative office located in Tavares, nine member libraries, and six branch libraries. Member libraries include: Fruitland Park Library; Helen Lehmann Memorial Library in Montverde; Lady Lake Public Library; Leesburg Public Library; Marianne Beck Memorial Library in Howey-in-the-Hills; Minneola Schoolhouse Library; City of Tavares Public Library; Umatilla Public Library; and the W.T. Bland Public Library in Mount Dora. Branch libraries include: Astor County Library; Cagan Crossings Community Library in the Four Corners area; Cooper Memorial Library in Clermont; East Lake County Library in Sorrento; Marion Baysinger Memorial C...   [tags: System Overview]

Better Essays
1892 words (5.4 pages)

Security Issues of Ambient Networks Essay

- In this essay we will present security issues of a networking concept referred to as ambient networks, which aims to enable the cooperation of heterogeneous networks belonging to different operator or technology domains. In this way, it appears as homogeneous to the users of the network services. Providing security in ambient networks is a huge challenge. The main reason is that the traditional security model is not valid anymore. Traditional security assumes that there is a vulnerable channel between communicating parties, where eavesdropping, modification of messages or denial of service attacks can occur....   [tags: Ambient Network Security, AmI]

Better Essays
2184 words (6.2 pages)

Essay on Use of AI in a Network Intrusion Detection System

- 1. INTRODUCTION In the 1950’s era, Computer Networking became the focus for communication in military radar system and it evolved in such a way that currently approximately 9 billion devices are connected over the internet. Computer networking is currently used for business and personal use. But, this connections among devices are being misused by malicious users in the form of internet attacks. These attacks pose threat on continuously growing internet which must be defended by a security defense system....   [tags: Network Security]

Better Essays
2708 words (7.7 pages)

Essay about Remote Access And Network Access

- Introduction According to Dubrawsky and Faircloth, remote access denotes to the ability to access a computer, for instance, an office network computer or home computer, from a remote location. This permits personnel to work offsite, for example at home, or any other location, while employees still have to a distant network or computer. Remote access can be implemented by use of wide area network (WAN), local area network (LAN) or virtual private network (VPN). Either of these implementations allows access of systems and resources (Dubrawsky & Faircloth, 2007)....   [tags: Virtual private network, Computer network, Wi-Fi]

Better Essays
1010 words (2.9 pages)

Essay on Risks And Risks Of Security

- SECURITY Concept of Security However, risk is the likelihood of something bad happening, security help to minimize risks. There is a need to recognize how risk can result from a threat. Some of the common threats are as follows: I. Unintentional threat—natural disasters like flood, fire or snow storms or equipment failure like power failure or network failure. II. Intentional threat---includes theft of laptops, software or data and fraud which translates to unauthorized access to data. In the world of IT, today there are different kinds of security risks....   [tags: Security, Computer security, Physical security]

Better Essays
1266 words (3.6 pages)

Wireless Network Security Essay

- Introduction Wireless networks have grown in popularity. This is largely due to the increase in the value of a network as more users are attached to it. The value added to a network by nature of connecting more devices to it, is summarized in 'Metcalf's law.' Metcalf's law states that if you 'connect any number, 'n,' of machines - whether computers, phones or even cars - and you get 'n' squared potential value.'[1] The incredible growth of the Internet seems to validate Metcalf's law. It then seems reasonable that eliminating physical constraints to connecting to a network would provide value by allowing more devices to be connected to a network regardless of physical location....   [tags: Wireless Networks Technology Essays]

Better Essays
3584 words (10.2 pages)