Tuesday, October 15, 2019
Network security fundamentals, security threats, and issues Case Study
Network security fundamentals, security threats, and issues - Case Study Example In addition, data and information (in the form of communication) are often distributed all the way through the network as apparent text (for instance it is not twisted or encrypted). Additionally, using the Internet it is also simple to imitate someone else as they are online. On the other hand, there is at the moment a great deal of suspicion on the subject of internet security, however an excellent information is that we have a wide variety of tools and technologies accessible which can ensure the maximum security of our network against illegal interruption (McConnell, 2004). Normally, the use of a firewall is associated with the Internet. In fact, with the growing popularity of the Internet, the term ââ¬Å"firewallâ⬠is a great deal more frequently employed in computer networks. Similar to the firewalls that are used in buildings and homes, computer firewalls take steps as a fence between computers on a network. A firewall is critical for the companies that use a computer ne twork or for individuals with a stable connection to the internet (for instance through cable or DSL). In addition, in the absence of a firewall, any unauthorized person on the network would possibly be able to access, wipe out, and move around to the files or data and information stored in our computer. ... Certainly, in some cases firewalls also block the required transmission, and throughout a frequent practice of alteration, the filters can be tailored to enhance their effectiveness (Wynn, 2012) Moreover, a firewall encompasses a wide variety of associated applications and tools, installed at a network gateway server, which ensures the security of the resources (data, information, and other resources) of a private network from outside users or people from other networks. Additionally, the network firewalls also refer to the security policies that are utilized with the applications and programs. In addition, a business organization having an intranet that facilitates its staff members to get access to the extensive Internet usage makes use of a firewall to stop unauthorized people from getting access to its own confidential data and information resources as well as for keeping an eye on what other resources its own users are able to access. In this scenario, a firewall works directly with a router program, which determines the characteristics of each network packet to decide whether it should be allowed to move toward its target or not. Additionally, a firewall also encompasses or can be installed on a proxy server that formulates network requests in support of terminal users. In some cases, a firewall is installed in a specifically selected computer that is other than the remaining network with the intention that no received requests or queries can reach openly at confidential network resources (Rouse, 2007). At the present, organizations are able to choose from a wide variety of firewall solutions. In fact, there are numerous firewall transmission techniques and tools. In this scenario, one well-known technique is to
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.