Network Term Paper

advertisement
Ben Sunny
Ben Sunny
LTEC 4550
Network Systems Administration
Term Paper
Network Security: The Definition
Ben Sunny
Outline of topics:
1. Network security job such as Network Administrator. A job that is primarily
focused on network security.
2. The main focus on what causes problems within our network and also how
to stay alert and be able to fix all problems.
3. The benefits of having a network that has no problems. The benefits of
having network security.
Ben Sunny
Network Security: The Definition
The internet is used all around the world by each of us for hours and hours a day.
Through our cellular phones, we have access to the World Wide Web and also personal
information that we may have encrypted in it. Our smart phones play a very important part in our
lives and we would sometimes be lost without them in near sight. How would you feel if this
information was stolen and important documents/valuable items were taken from it? That is why
having security is very crucial to our smartphones so no one can just have quick access to them.
Just like that security, Network security is what we would want to have while on our computers.
In this paper, I will go through key topics that involve network security and also the key role that
is played by the network admin. I will also share the main reasons on why we should have it and
what we can do to prevent other attacks to our networks. Network Security can save you lots of
time/money that you don’t want to have gone to waste. Why put yourself through unnecessary
struggles when they have simple techniques to avoid them? These sections included can help
with your network troubles/configurations or it will help you review information that you may
already have known or forgotten.
Network Security is an organization’s strategy and provisions for ensuring the security of
its assets and of all network traffic. Network security is manifested in an implementation of
security policy, hardware, and software. A type of way to make sure that this does not harm you
is by having a network administrator be able to access and monitor all unauthorized usages that
are completed in the network. With this job, they will make sure that any modifications or
misuse will be watched to make sure they are forbidden before making a serious threat to the
network. An administrator can help make lives of those people that are connected to the network
much smoother throughout their troubles and distress with the network. They will have access to
the network usually by having a username and a password or some other sort of authenticating
information to log in to the network. After having access by logging in, they can then make the
appropriate changes that will help keep the security of the information in the network both
viewable and secluded from being harmed. Once they have their access, the firewall will be
enforced and it will show what services and applications can be used by the type of user logged
in. With this type of security, it would allow the network users that are there to protect would
have a different approach in the network than those who are there to harm it. A job like this is
one that is very popular throughout the world. Different companies such as banks, stores,
shopping complexes, and also government would need this type of position to be filled for their
transactions taken place.
Three of the top primary causes to hurt your network are spam mail, unprotected home
wireless networks, and also malware. In the networking field, our lives are centered on checking
emails over important topics we might need. But sometimes, there are emails that are sent to us
that are there to want us to click on them. Some of these might benefit us and we might be happy
to receive them. But there are those that are not supposed to be given to us for our advantage.
Ben Sunny
These are the ones that can cause harm to our computers and have the opportunity to receive a
virus. When these emails are opened, they store files known as cookies. Yet all emails can store
this, the ones that are dangerous are cookies that cannot be helped. That is why it is better for us
not to open the ones that end up in spam. It’s great that a folder exists for our benefit, but yet
most of the emails are not trustworthy or reliable. Now how you are able to make sure that your
home office / computer is safe for personal use? Well considering the fact that one in every four
households in the United States consist of wireless access, it is necessary to make sure that they
are safe and secure from unwanted threats. One of the main ways to make sure you have a safe
network is to make sure that you have a password set up to make sure that not just anyone can be
given access. Without your permission, they would have a much more difficult time gaining
access to your network. That can make them try to give up or not even access it at all. Well one
thing that is very important to have on every computer is some sort of anti-virus protection or an
intrusion prevention system (IPS). With these types of applications, they can help your computer
not only run at an appropriate speed and manner but also helps to be able to make sure your
information is secure. This is what makes this one of the most important software’s needed to be
running on your computer. Nowadays, we have much software that work not only just efficient
but also at any cost but a few clicks for you. That’s right, you are able to have great quality
protection from worms and Trojan viruses with these free software’s so that you can lower your
risk at potentially being infected with unnecessary problems. Trojans/worms are almost always
transferred through the World Wide Web or your network. Websites visited by you and also files
downloaded can have these types of viruses encoded inside of them. These types of malware can
cause you to either of a damaged computer, or have a damaged computer with personal data
taken from you. To have your spyware software updated with it updated at all times can help
with your computer problems with many benefits.
A great way to catch network threats is by setting up something known as a honeypot.
This type of surveillance is set up to make sure it catches any threats that are trying to harm the
network. This will not only catch those harmful objects, but also be setup to act like a trap for
attacks that are vulnerable to be reported. This can help counteract attempts that are made
unwillingly inside of the information systems. This trap known as honeypot consist of a network
site that appears to be a part of a network, but is monitored so that it can seem to contain
valuable information that attackers would want to take away. The benefits to having a secure
network are that you would not have to run into any problems that are not needed. The profits
that are gained with a healthy network are mostly beneficial for large or small businesses. It can
help reduce stress and also gain a workload increase. The performances that are played out by
the network would help the companies to have a much smoother transaction and also a better
approach at running the operations that need to be played out.
In this term paper, I was able to inform the reader about the benefits and the negatives
that come within a network. The security can only provide you with a greater deal of help and
less stress. That’s why the ability to keep it safe can help take you further in your work and less
trouble. These steps for extra precautions are great to know because of the different assistances.
Everyday can be another day that can have threats be transferred or received to us. To work with
Ben Sunny
a managed security, your services can help you defend different threats that can be prevented
from either your home or work network. Your everyday life and personal information is
important, to keep it protected can save us the trouble. So always having your network secured is
the best way to defend yourself from many different threats.
Ben Sunny
Work Cited
(2011, January 1). . Retrieved May 1, 2014, from http://www.gwi.net/policy/blog/5-waysbusinesses-benefit-from-managed-network-security/
Top 5 Cyber Security Threats | DeVry University. (n.d.). Atom. Retrieved May 3, 2014, from
http://blog.devry.edu/2014/02/top-5-cyber-security-threats-that-could-affect-your-life.html
Jauregui, A. (2012, April 11). One In Four Households In The World Use Wi-Fi. The
Huffington Post. Retrieved May 2, 2014, from http://www.huffingtonpost.com/2012/04/11/one-in-fourhouseholds-in-the-world-use-wi-fi_n_1419014.html
What is network security?. (n.d.). Palo Alto Networks. Retrieved May 1, 2014, from
https://www.paloaltonetworks.com/resources/learning-center/what-is-network-security.html
Download