Problems in Network Security

Only available on StudyMode
  • Download(s) : 113
  • Published : January 22, 2013
Open Document
Text Preview
Problems in Network Security

Problems in Network Security
Calvin C. Tippit
Problems in Network Security


I. Introduction
a. Information security vulnerabilities
b. More training is needed for employees working in the Network Security field to prevent common mistakes from happening. II. Mobile Insecurities
a. Mobile devices being intruded by cybercriminals.
b. The importance of Anit-Virus softwares and system updates.

III. Privacy and Security Issues in Social Networking
a. Security lapses on social networks
b. The problems plaguing social network security and privacy issues

As many businesses try to make their companies thrive by connecting their systems to the internet, some companies may become very skeptical about this. With virtually everyone in the world being connected to some type of network, having all of company data linked together can cause a very serious problem by one user’s mistake or problem. In many instances, the potential for data loss or a small security breach increases when creating a network. This can happen over large or small networks, but when it comes to how important security is, the size is totally insignificant. The sole purpose in network security is to prevent any loss of data by mismanaging it. While companies may install all of the latest firewalls, intrusion prevention systems, and anti-virus software within their networks, it will still be nearly impossible to block every potential security threat that could potentially harm a small business. On a daily basis the employees are the first line of defense, the training of employees on the importance of network security is crucial, as well as the things they can do to prevent security breaches from happening.

While security breaches and malware are not as widespread on handheld devices such as smartphones and tablets, there still needs to be a “mobile threat prevention strategy” in place (James, 2009). With so...
tracking img