Network Security And Its Effects On The Network

2633 Words11 Pages
Abstract In today’s IT world, network security is starting to get more attention. In the past, companies’ network infrastructures were capable of managing low amounts of attacks on the network. This is not the case today. The number of online attacks is getting bigger and bigger. Today children from age 6 are capable of breaking into someone’s network system. For attackers, it does not matter whether it is a large or small business or an individual computer. If they find a glitch in the network, they will attack the system. Also, not too many people are conscious about how network security is important in today’s business. This paper will discuss network security, categorize type of hackers, and define types of attacks and security…show more content…
2. Enforcement provides analytical form of all network traffic flows and aim to maintain the confidentiality(C), integrity (I), and availability (A), also known as the CIA triad, of all systems and data on the network. In addition, the roles of the CIA triad are: • Confidentiality is set of rules that involve the protection of data from unauthorized entities. • Integrity has a role to make sure the modification of data is controlled in a specified and authorized manner. • Availability ensures that data are accessible whenever needed by the company (Palo Alto Networks, nd). Even though the use of the CIA triad to describe security purposes is well recognized, some in the security area are considered to be necessary to present a complete picture of additional concepts. The following two concepts are the most common (Stallings & Case, 2012): • Authenticity - The property is original and can be identified and trusted by the business. This means that users are checked and validated before each input reaches the system which indicated that it came from a trusted source (Stallings & Case, 2012). • Accountability has the security goal to make sure that the activities of entity could be uniquely traced to that entity. Organizations must be capable to trace a security breach to an accountable party (Stallings & Case, 2012). 3. Auditing is the network security process that requests checking back on applied measures to conclude how well they comply with the security
Open Document