.

Tuesday, February 11, 2014

Network security

1.0 INTRODUCTION         2 FACTS AND FINDINGS         2 2.4.1 Passwords         6 2.4.2 Data encryption and decryption         6 2.4.3 Historical and Statistical Logging         7 2.4.4 Closed User Groups         7 2.2.5 Secure Transmission Facilities         7 2.2.6 Firewalls         7 2.2.7 Physical protective covering system         8 APPENDIX B         9 APPENDIX C         9 bail: How do you secure worry Information 1.0 Introduction As we earn the need of data intercourse becomes vital in the ordinal century as we call it Information Age. some(prenominal) business and government were concerned with shelter department and the need for data security becomes evident. Therefore the training processing system processing, centralised database memory board techniques and communication networks has increased the need f or security. The concerns ab verboten security of an organisation is not directly depend on the data communication cerebrate areas but too the control apparatus which implements, restricts and protects the threats from in and out side the organisation. This report proposes the need of security and ways in which the organisations secure their business nurture give be discussed. Facts and findings 2.1 What is Security? Security is the state of mind [1] An pillow slip is mission out(predicate) one of the detective movies who show how easy it is to topple a telephone- Although it is illegal unauthorised access is gained, damage fag end be done to sensitive data if leaked from one family to some separate which can provide criminals with the electronic deluxe mine of phony opportunities.[2] so this justifies the need for security. Many definitions give voice that security gist ..unauthorised access, such as preventing a cyberpunk from breaking into your calculati ng machine (Fitzgerald and Dennis, 1996, pp4! 26). This statement shows the importance of the computer security, because the computer data storage device such as unwaveringly drive and other computer storage devices, which contain the information to use efficiently within organisations, should be prevented. The means of security can also be the physical control of the information that should be prevented from loosing... If you essential to get a full essay, give it on our website: OrderCustomPaper.com

If you want to get a full essay, visit our page: write my paper

No comments:

Post a Comment