Ben Sunny Ben Sunny LTEC 4550 Network Systems Administration Term Paper Network Security: The Definition Ben Sunny Outline of topics: 1. Network security job such as Network Administrator. A job that is primarily focused on network security. 2. The main focus on what causes problems within our network and also how to stay alert and be able to fix all problems. 3. The benefits of having a network that has no problems. The benefits of having network security. Ben Sunny Network Security: The Definition The internet is used all around the world by each of us for hours and hours a day. Through our cellular phones, we have access to the World Wide Web and also personal information that we may have encrypted in it. Our smart phones play a very important part in our lives and we would sometimes be lost without them in near sight. How would you feel if this information was stolen and important documents/valuable items were taken from it? That is why having security is very crucial to our smartphones so no one can just have quick access to them. Just like that security, Network security is what we would want to have while on our computers. In this paper, I will go through key topics that involve network security and also the key role that is played by the network admin. I will also share the main reasons on why we should have it and what we can do to prevent other attacks to our networks. Network Security can save you lots of time/money that you don’t want to have gone to waste. Why put yourself through unnecessary struggles when they have simple techniques to avoid them? These sections included can help with your network troubles/configurations or it will help you review information that you may already have known or forgotten. Network Security is an organization’s strategy and provisions for ensuring the security of its assets and of all network traffic. Network security is manifested in an implementation of security policy, hardware, and software. A type of way to make sure that this does not harm you is by having a network administrator be able to access and monitor all unauthorized usages that are completed in the network. With this job, they will make sure that any modifications or misuse will be watched to make sure they are forbidden before making a serious threat to the network. An administrator can help make lives of those people that are connected to the network much smoother throughout their troubles and distress with the network. They will have access to the network usually by having a username and a password or some other sort of authenticating information to log in to the network. After having access by logging in, they can then make the appropriate changes that will help keep the security of the information in the network both viewable and secluded from being harmed. Once they have their access, the firewall will be enforced and it will show what services and applications can be used by the type of user logged in. With this type of security, it would allow the network users that are there to protect would have a different approach in the network than those who are there to harm it. A job like this is one that is very popular throughout the world. Different companies such as banks, stores, shopping complexes, and also government would need this type of position to be filled for their transactions taken place. Three of the top primary causes to hurt your network are spam mail, unprotected home wireless networks, and also malware. In the networking field, our lives are centered on checking emails over important topics we might need. But sometimes, there are emails that are sent to us that are there to want us to click on them. Some of these might benefit us and we might be happy to receive them. But there are those that are not supposed to be given to us for our advantage. Ben Sunny These are the ones that can cause harm to our computers and have the opportunity to receive a virus. When these emails are opened, they store files known as cookies. Yet all emails can store this, the ones that are dangerous are cookies that cannot be helped. That is why it is better for us not to open the ones that end up in spam. It’s great that a folder exists for our benefit, but yet most of the emails are not trustworthy or reliable. Now how you are able to make sure that your home office / computer is safe for personal use? Well considering the fact that one in every four households in the United States consist of wireless access, it is necessary to make sure that they are safe and secure from unwanted threats. One of the main ways to make sure you have a safe network is to make sure that you have a password set up to make sure that not just anyone can be given access. Without your permission, they would have a much more difficult time gaining access to your network. That can make them try to give up or not even access it at all. Well one thing that is very important to have on every computer is some sort of anti-virus protection or an intrusion prevention system (IPS). With these types of applications, they can help your computer not only run at an appropriate speed and manner but also helps to be able to make sure your information is secure. This is what makes this one of the most important software’s needed to be running on your computer. Nowadays, we have much software that work not only just efficient but also at any cost but a few clicks for you. That’s right, you are able to have great quality protection from worms and Trojan viruses with these free software’s so that you can lower your risk at potentially being infected with unnecessary problems. Trojans/worms are almost always transferred through the World Wide Web or your network. Websites visited by you and also files downloaded can have these types of viruses encoded inside of them. These types of malware can cause you to either of a damaged computer, or have a damaged computer with personal data taken from you. To have your spyware software updated with it updated at all times can help with your computer problems with many benefits. A great way to catch network threats is by setting up something known as a honeypot. This type of surveillance is set up to make sure it catches any threats that are trying to harm the network. This will not only catch those harmful objects, but also be setup to act like a trap for attacks that are vulnerable to be reported. This can help counteract attempts that are made unwillingly inside of the information systems. This trap known as honeypot consist of a network site that appears to be a part of a network, but is monitored so that it can seem to contain valuable information that attackers would want to take away. The benefits to having a secure network are that you would not have to run into any problems that are not needed. The profits that are gained with a healthy network are mostly beneficial for large or small businesses. It can help reduce stress and also gain a workload increase. The performances that are played out by the network would help the companies to have a much smoother transaction and also a better approach at running the operations that need to be played out. In this term paper, I was able to inform the reader about the benefits and the negatives that come within a network. The security can only provide you with a greater deal of help and less stress. That’s why the ability to keep it safe can help take you further in your work and less trouble. These steps for extra precautions are great to know because of the different assistances. Everyday can be another day that can have threats be transferred or received to us. To work with Ben Sunny a managed security, your services can help you defend different threats that can be prevented from either your home or work network. Your everyday life and personal information is important, to keep it protected can save us the trouble. So always having your network secured is the best way to defend yourself from many different threats. Ben Sunny Work Cited (2011, January 1). . Retrieved May 1, 2014, from http://www.gwi.net/policy/blog/5-waysbusinesses-benefit-from-managed-network-security/ Top 5 Cyber Security Threats | DeVry University. (n.d.). Atom. Retrieved May 3, 2014, from http://blog.devry.edu/2014/02/top-5-cyber-security-threats-that-could-affect-your-life.html Jauregui, A. (2012, April 11). One In Four Households In The World Use Wi-Fi. The Huffington Post. Retrieved May 2, 2014, from http://www.huffingtonpost.com/2012/04/11/one-in-fourhouseholds-in-the-world-use-wi-fi_n_1419014.html What is network security?. (n.d.). Palo Alto Networks. Retrieved May 1, 2014, from https://www.paloaltonetworks.com/resources/learning-center/what-is-network-security.html