All papers examples
Get a Free E-Book!
Log in
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Importance of Network Security System, Outline Example

Pages: 4

Words: 1188

Outline

Introduction

Computers are playing a key and essential role in the current changing and technologically advanced world. It’s a common phenomenon to, switch o a computer or any other related sophisticated device either in the office, home, in college studying, school or even at home while having one’s leisure time. Internet has however revolutionalized the usage of these machines (computers). There has been however continued concern on the need to maintain good healthy the computer while working with them in accessing the internet. This is because of the serious risk that exposes one’s computer when its connected to the internet since research reveals that this, physical linking to the internet means that the computer is apparently connected to more than 50,000 other networks and its users that are not familiar to the computer (Dowd & McHenry, 1998).

Network Safety

One thing which might not be considered when making the home network setup is the network safety. Due to complications during the wireless installation of network, one might be forced to assume that the security part of it should not come first but should wait to the later date, and for this an individual could not be further wrong. Installation should be done as early as the setup is completed. An individual can always wish to use his personal network on the block settings in his home area and avoid other none subscribers but this has always remained impossible over time. The major problem is that intruders can always bark on your internet and use it to download some prohibited materials. Some of these could include games, music, movies, and more badly some forms of pornography. At last, all these can be traced to the owner, and that is why it is very important to have maximum security for your wireless network to avoid misuse by intruders (Adeyinka, 2008).

Network Information

Though networking open up several ways and options in which one can share information with users of the network through the many useful applications available, there a lot of information found in most of the private networks that should not be shared with other outside network users. This is because more often than not, this would lead to layer attacks on the applications, the spoofing of IP addresses, attacking of the passwords through cracking and hacking and poisoning of the DNS among many other cyber crimes that are perpetrated through the internet (Dowd & McHenry, 1998).

Importance of security system

Many internet users globally not know or critically understand the importance of network security system despite a lot emphases having been laid on in the internet and made the main agenda in most of the mainstream periodicals on technology. As part of the important elements of network security management, network security system has been made has been made key in most of the networks in order to provide both information security and physical to the databases existing, paths and links.

Giving a general definition that is universally accepted, network security can be simply defined as the process of detecting and preventing unauthorized use of computers in the network. It works in form of software that guards the infrastructure that the network has been established from crimes and unwanted access that has not been authorized, closures that are not proper, misuses, malfunctioning, destructions, or alteration of the system.

This on the other hand guarantees safe platform for the programs to work, and computers to function properly without interfering a part from allowing the computers to work within a protected environment in carrying out functions that are allowable. Network security therefore is great as it provides for integrity, accountability, confidentiality while making sure that the computer is under maximum protection from both internal and external security threats like the worms, Trojans, denial of network services and network security problems among many other problems (Adeyinka, 2008).

Security Software

To help in this protection, there are several security software that has been developed and are readily available both online and off the self to be used to counter these cyber crimes. These however greatly depend on the usage of the software ranging from home to office computers. Firewalls for instance would be the most preferred and would be used alongside other security software like encryptions. By installing this software, unwanted things are protected from entering the computer. When we mention wireless security, there exist two main types of firewall. One which is most known is the software firewall. In this method, the software is installed on your computer and it always keeps the computer sheltered (Sotillo, 2006). The other type is the hardware firewall. This is a box that keeps on the network and protects the hackers and other minute users out of the private life though it is technically software. The most important thing to consider is the type of the software to be purchased to ensure maximum security.

Some of the common known network security include but not limited to the intrusion Detection System (IDS), web access control and email security. Authentication is the other network security measure that prevents the access of other people’s resources by the authorized users. Anti-virus on the other had mainly tries to check on potential viruses before attacking the computer while other detect virus on check the attached files for viruses. All these increase the productivity, enhanced control, and improved usage of IT resources and visibility of the computer (Kartalopoulos, 2008).

Security Hardware

The hardware is the most important router and hence the high quality brand should be purchased. There are some different brands in the market such as Cisco, D-link and the Netgear though the level of security required by the buyer determines the price to be paid. When we analyze the standards of the D-link and Netgear, it comes into our awareness that, the lower routers can do their job accurately and can even be customized with the Linux based software. Such software’s are chip to by but does not provide maximum security since they can easily be broken. Although Cisco is somehow expensive especially for home users, they should be considered if the big issue is about securit (Sotillo, 2006).

The prices of Cisco run from $5000 to $15,000 and are normally used in large companies and even corporations. This are expensive to buy but are deadly accurate in terms of wireless network security. They cannot easily be manipulated and their codes are more accurate unlike the other types of software’s. 

Conclusion

In conclusion, the most important thing is the amount of security required and the reasons for needing it. All the types of wireless routers in the market have their level of security they can provide and if all of them does not meet the minimum requirements an individual requires then one can create his own router. Creating personal router however, is something which is left for the experienced in that field and it might not be as simple as such (Kartalopoulos, 2008).

Reference

Dowd, P.W.; McHenry, J.T., (1998) “Network security: it’s time to take it seriously,” Computer,

Kartalopoulos, S. V., (2008) “Differentiating Data Security and Network Security,” Communications, 2008.

Sotillo, S., (2006) East Carolina University, “IPv6 security issues,”

Adeyinka, O., (2008) “Internet Attack Methods and Internet Security Technology,” Modeling & Simulation.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Outline Samples & Examples

Effective Communication, Outline Example

Introduction: Effective communication is essential for progress in any professional or academic setting is crucial. However, writing can be a provoking skill to master, and [...]

Pages: 3

Words: 767

Outline

Millennium Development Goals, Outline Example

Overview of Haiti: Geography: Population: Political Regime: History: Key facts: Overview of Haiti’s MDGs: When did they join? Context before they joined Expectation? First 5 [...]

Pages: 1

Words: 342

Outline

The Powerless Nature of Government Agencies, Outline Example

Introduction In the documentary Food Inc., a person named Eric Schlosser shows that companies are becoming successful in their ability to evade the regulation of [...]

Pages: 1

Words: 346

Outline

The Difference Between Feminism and Hating Men, Outline Example

Introduction This section of the speech shall introduce the topic It shall give brief idea on what feminism is about but will not be a [...]

Pages: 2

Words: 683

Outline

Master of Science Capstone Proposal, Outline Example

General Information Project title: The Implementation of a “Sims-man” with Cardiac Monitor as a Faculty Teaching Tool for ADN Nursing Students in the Laboratory Student: [...]

Pages: 2

Words: 643

Outline

Advantages of Cycling, Outline Example

Topic: Cycling is better than using a car to work [or as a general means of transportation] Organizational Pattern: Monroe’s Motivated Sequence Speaking and Specific [...]

Pages: 3

Words: 894

Outline

Effective Communication, Outline Example

Introduction: Effective communication is essential for progress in any professional or academic setting is crucial. However, writing can be a provoking skill to master, and [...]

Pages: 3

Words: 767

Outline

Millennium Development Goals, Outline Example

Overview of Haiti: Geography: Population: Political Regime: History: Key facts: Overview of Haiti’s MDGs: When did they join? Context before they joined Expectation? First 5 [...]

Pages: 1

Words: 342

Outline

The Powerless Nature of Government Agencies, Outline Example

Introduction In the documentary Food Inc., a person named Eric Schlosser shows that companies are becoming successful in their ability to evade the regulation of [...]

Pages: 1

Words: 346

Outline

The Difference Between Feminism and Hating Men, Outline Example

Introduction This section of the speech shall introduce the topic It shall give brief idea on what feminism is about but will not be a [...]

Pages: 2

Words: 683

Outline

Master of Science Capstone Proposal, Outline Example

General Information Project title: The Implementation of a “Sims-man” with Cardiac Monitor as a Faculty Teaching Tool for ADN Nursing Students in the Laboratory Student: [...]

Pages: 2

Words: 643

Outline

Advantages of Cycling, Outline Example

Topic: Cycling is better than using a car to work [or as a general means of transportation] Organizational Pattern: Monroe’s Motivated Sequence Speaking and Specific [...]

Pages: 3

Words: 894

Outline