Preview

Managing Business Information Systems

Powerful Essays
Open Document
Open Document
2543 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Managing Business Information Systems
Final Project

Managing Business Information Systems

The Need for Network Security

By: Jose L. Rodriguez

The Need for Network Security

The primary objective with this paper deals with how network security systems protect, detect, adapt, recover and/or reconfigured from anomalies in order to provide some desired level of security services. This paper is a strategy for the development of a general security mechanism/countermeasure valuation scheme. The general objective addresses the question, "Given the value of information to be protected and the threat environment, how strong and assured should security mechanism(s) be to provide desired security services(s)?" [DEL98]

Company information is as valuable a company asset as money in the bank. In fact, some information can be even more valuable than cash, so protecting the company 's information with appropriate security is critical to business success. The network and data security measures you put in place for your business, from a firewall to a data backup system, are physical manifestations of business rules. You make business decisions about how important your computer network and the data it holds are to your business, and as well as how you want to protect it. Data security systems are the direct result of those business decisions.

Security exists on many layers. Network security considerations begin with (but are not limited to) a range of factors including: [ALE96]
• How company office facilities are selected and maintained,
• How potential employees are screened,
• The remote access policy and procedures to the company 's systems and information, and
• What kind of encryption and firewalls are provided in the corporate network.

In other words best-practice security isn 't just good business sense; in some cases, it 's also the law. Legal requirements are vary between specific industries and different jurisdictions. For example, the Health Insurance Portability and Accountability



References: [ALE96] Alexander, Michael, The Underground Guide to Computer Security, Addison-Wesley Publishing Company, 1996. [BAR96] Barrett, Daniel J., Bandits on the Information Superhighway, O 'Reilly & Associates, Inc., 1996. [COH95] Cohen, Frederick B., Protection and Security on the Information Superhighway, Johen Wiley & Sons, Inc., 1995. [DEL98] Delmonico, D., ‘‘Detect Network Intruders Before They Wreak Havoc, ' ' InternetWeek, Oct 5, 1998, pp. 38. [ESC98] Escamilla, Terry, Intrusion Detection: Network Security Beyond the Firewall, John Wiley & Sons, 1998. [KRO92] Krol, Ed, The Whole Internet, O.Reilly & Associates, Inc., 1992. [NUL98] Null, C., ‘‘Covering your assets, electronically, ' ' LAN Times, April 27, 1998, pp. 44. [PFA97] Pfaffenberger, Bryan, Protect Your Privacy on the Internet, Johen Wiley & Sons, Inc., 1997. [PFL97] Pfleeger, Charles P., Security in Computing, Prentice Hall, Inc., 1997. [POW99] Power, Richard, 1999 CSI/FBI Computer Crime and Security Survey, Computer Security Journal, Volume XV, Number 2, 1999, pp. 32.

You May Also Find These Documents Helpful

  • Powerful Essays

    INDP Final Project

    • 1793 Words
    • 4 Pages

    References: Banathy, A., Panozzo, G., Gordy, A., & Senese, J. (2013, July). A Layered Approach to Network Security. Retrieved from http://www.industrial-ip.org/en/knowledge-center/solutions/security-and-compliance/a-layered-approach-to-network-security…

    • 1793 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    An essential part of network security is knowing what the characteristics of an attack are, so they can be countered or prevented. When the university suffered an overwhelming internal DDoS attack, it required administrators to reevaluate its security guidelines based on what was known about the attack.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Project

    • 1487 Words
    • 6 Pages

    The components that make up cyberspace are not automatically secure. This includes cabling, physical networks, operating systems, and software applications that computers use to connect to the Internet. There is a raging information security war. The goal is to protect national security and business information. Therefore, IT…

    • 1487 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Computer Security Issues

    • 1058 Words
    • 31 Pages

    Abstract: This paper discussed the secure and dependable problem about the computer network system. On some aspects: the importance of network security, basic theory, function, and the method of solving a problem, etc. Good views for solving the problem are put forward. It strengthens people’s consciousness on network security.…

    • 1058 Words
    • 31 Pages
    Better Essays
  • Satisfactory Essays

    In this age where the use of computers and networks related to them has become commonplace, there has developed problems concerning cyber security. Cyber security is an important factor to be considered if one is to be able to protect oneself from malicious people and software from the internet. Most of the threats to computer networks come from the internet and these are often intentional, having been developed by people with malicious intent. Cyber security is, therefore, an attempt by individuals to protect their personal information and other digital assets from attacks from the internet.…

    • 375 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Network and Security

    • 397 Words
    • 2 Pages

    Ultimately, network security helps protect a business 's reputation, which is one of its most important assets.…

    • 397 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Computer networks have allowed activity that none dreamed possible hundreds of years ago; however, millions of attempts to compromise the security of computer systems are made on a daily basis. Knowing and using the 12 principles of information security allows security professionals to mitigate most threats to data security. By understanding the different types of security policies, effective policies can be put into place that ensure better information security. What security professionals must find paramount is that 100% secured is impossible to achieve.…

    • 841 Words
    • 4 Pages
    Better Essays
  • Good Essays

    References: 7. Teresa F Lunt. Detecting Intruders in Computer Systems. Conference on Auditing and Computer Technology, 1993.…

    • 6146 Words
    • 25 Pages
    Good Essays
  • Powerful Essays

    We can conclude the introduction to network security started here, in 1971. In the years after, the technology of internetworking been through an evolution and is still changing every day. Today’s security threads to a network are not limited to viruses.…

    • 1334 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Denning, D. (1990). Concerning Hackers Who Break into Computer Systems. Retrieved November 20, 2004 from http://www.cpsr.net/oldsite/externalSiteView/cpsr/privacy/crime/denning.hackers.html…

    • 3351 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Virtual Learning Environment

    • 4651 Words
    • 19 Pages

    Why Security? Essential Terminologies Elements of Security The Security, Functionality, and Ease of Use Triangle What Does a Malicious Hacker Do? o Reconnaissance o Scanning o Gaining access o Maintaining access o Covering Tracks…

    • 4651 Words
    • 19 Pages
    Satisfactory Essays
  • Better Essays

    Hack

    • 1715 Words
    • 7 Pages

    Saporito, Bill. "Hack Attack." Time 178.1 (2011): 50-55. Academic Search Complete. Web. 22 Feb. 2013.…

    • 1715 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Network Threats

    • 924 Words
    • 4 Pages

    The main objective of the research paper is to illustrate most common network threats and provide solution to protect users from threats, hackers and ensures that the data travelling across the networks is safe.…

    • 924 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Research Paper on Ns2

    • 2840 Words
    • 12 Pages

    Computer and network technology provide convenience to the people, but at the same time, security problems have emerged and become more and more serious. With the increasing popularity of computer applications, in particular, the rapid development of network technology, more and more security threat have appeared and information security has become a very important and urgent issue to be solved. Network information security has become the fifth security…

    • 2840 Words
    • 12 Pages
    Satisfactory Essays