SlideShare a Scribd company logo
1 of 3
Running head: NETWORK PROTECTION AGAINST
THREATS 1
NETWORK PROTECTION AGAINST THREATS 4
Network Protection against Threats
Threats, in the context of computer security, refers to any
possible vulnerability to a computer system and has the
potential to adversely affect the computer system and the stored
data. Threats do not have to necessarily happen but in the event
that they occur then there are huge losses to businesses and
individuals, security is compromised and key data may be lost
completely if no recovery methods had been put in place
(Silberschatz et al., 2014). Cyber criminals are taking their
malice to a new level every dawn and the rates at which they are
accessing stored data in systems are a reason to get worried.
The potential threats to the computer systems may be from
viruses, back doors, Trojans and attacks from the system
hackers. System developers have greatly being involved in
devising mechanisms to address the issues related to network
protection and some of the key solutions are authentication and
identification, data encryption, and frequent system updates.
Authentication and identification
With this technique, the data can only be accessed by the
required and the authorized personnel. Identification occurs
when a unique name or an image is assigned to the users who
interact with the information (White et al., 2017).
Authentication is meant to ensure that the person who uses the
data is verified as one of the authorized users. These techniques
are used to allow or to deny access to data and can even involve
authentication of the data and the hardware, and not just the
user, through the use of passwords which are only shared with
those that are intended to access the data.
Data encryption
Data encryption is a technique that has been used by
system users and developers to ensure that data cannot be
accessed by unauthorized persons. Data encryption translates
the data into other codes or forms and a secret key is put in
place. The persons who have information about the secret key
are the only ones who can successfully use the data (Siowiorek
& Swarz, 2017). The information, after being translated into
codes and other forms cannot be read (ciphertext). The users
then will use the secret key to unencrypt the data into readable
and understandable forms (plaintexts). Data encryption is one of
the most effective data and system protection methods used by
organizations especially due to the fact that the data can only be
read by those who have the key and even if fraudsters get access
to the data, they cannot understand.
Frequent system update
There are new versions of the systems and the applications
in use which are being developed occasionally. These new
updates come with advanced features meant to increase the
security of the systems (Bhargava & Reese, 2015). The
responsibility is now vested on the system users to ensure that
the systems in use are updated and have all the new features.
Using outdated versions of the systems only places them at a
disadvantage of possible attacks by viruses and cyber criminals.
Organizations lose data into the hands of these criminals
thinking that system updates are costly. Doing the updates are
far much better than having to comprise security and privacy
due to the inability to ensure that the systems are up to the
standards that are recommended by the system developers.
In conclusion, network threats are occurrences that are
happening every day, costing businesses dearly. Lose of data to
persons who are not authorized to access the information can be
traumatizing especially when the data is sensitive. Data getting
into the hands of fraudsters means that privacy and the security
of the data owners are greatly risked. System developers have
come in to save the day. Various techniques have been
developed to reduce the threats resulting from system
vulnerabilities. Organizations should put such into place.
References
Bhargava, R., & Reese, D.P. (2015). U.S. Patent NO. 8, 938,
800. Washington, DC: U.S. Patent and Trademark Office.
Silberschatz, A., Galvin, P.B., & Gagne, G. (2014). Operating
system concepts and essentials. John Wiley & Sons.
Siowiorek, D., & Swarz, R. (2017). Reliable computer systems:
Design and evaluation. Digital Press.
White, G.B., Fisch, E.A., & Pooch, U.W. (2017). Computer
system and network security. CRC Press.

More Related Content

Similar to Running head NETWORK PROTECTION AGAINST THREATS1NETWORK PROTEC.docx

Final Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docxFinal Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docx
lmelaine
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
now a days security is very important to organization and physical s.pdf
now a days security is very important to organization and physical s.pdfnow a days security is very important to organization and physical s.pdf
now a days security is very important to organization and physical s.pdf
sooryasalini
 
Designing Security Assessment of Client Server System using Attack Tree Modeling
Designing Security Assessment of Client Server System using Attack Tree ModelingDesigning Security Assessment of Client Server System using Attack Tree Modeling
Designing Security Assessment of Client Server System using Attack Tree Modeling
ijtsrd
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
joellemurphey
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
edgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
fathwaitewalter
 

Similar to Running head NETWORK PROTECTION AGAINST THREATS1NETWORK PROTEC.docx (20)

امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكات
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Final Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docxFinal Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docx
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Data security
Data securityData security
Data security
 
A Review On Network Security And Privacy
A Review On Network Security And PrivacyA Review On Network Security And Privacy
A Review On Network Security And Privacy
 
Data security
Data securityData security
Data security
 
now a days security is very important to organization and physical s.pdf
now a days security is very important to organization and physical s.pdfnow a days security is very important to organization and physical s.pdf
now a days security is very important to organization and physical s.pdf
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
 
The NIST Cybersecurity Framework
The NIST Cybersecurity FrameworkThe NIST Cybersecurity Framework
The NIST Cybersecurity Framework
 
Designing Security Assessment of Client Server System using Attack Tree Modeling
Designing Security Assessment of Client Server System using Attack Tree ModelingDesigning Security Assessment of Client Server System using Attack Tree Modeling
Designing Security Assessment of Client Server System using Attack Tree Modeling
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Cyber.pptx
Cyber.pptxCyber.pptx
Cyber.pptx
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 

More from glendar3

Running head Multi-actor modelling system 1Multi-actor mod.docx
Running head Multi-actor modelling system  1Multi-actor mod.docxRunning head Multi-actor modelling system  1Multi-actor mod.docx
Running head Multi-actor modelling system 1Multi-actor mod.docx
glendar3
 
Running head MY MOTHER MY HERO .docx
Running head MY MOTHER MY HERO                                   .docxRunning head MY MOTHER MY HERO                                   .docx
Running head MY MOTHER MY HERO .docx
glendar3
 
Running head PROGRAM EVALUATION PLAN1PROGRAM EVALUATION PLAN.docx
Running head PROGRAM EVALUATION PLAN1PROGRAM EVALUATION PLAN.docxRunning head PROGRAM EVALUATION PLAN1PROGRAM EVALUATION PLAN.docx
Running head PROGRAM EVALUATION PLAN1PROGRAM EVALUATION PLAN.docx
glendar3
 
Running head Project 21Project 22Projec.docx
Running head Project 21Project 22Projec.docxRunning head Project 21Project 22Projec.docx
Running head Project 21Project 22Projec.docx
glendar3
 
Running head MILESTONE ONE .docx
Running head MILESTONE ONE                                       .docxRunning head MILESTONE ONE                                       .docx
Running head MILESTONE ONE .docx
glendar3
 
Running Head PROJECT 31DISCUSSION5Project 3.docx
Running Head PROJECT 31DISCUSSION5Project 3.docxRunning Head PROJECT 31DISCUSSION5Project 3.docx
Running Head PROJECT 31DISCUSSION5Project 3.docx
glendar3
 
Running head PROBLEM STATEMENT .docx
Running head PROBLEM STATEMENT                                 .docxRunning head PROBLEM STATEMENT                                 .docx
Running head PROBLEM STATEMENT .docx
glendar3
 
Running head MUSIC AND GENDER WOMEN PORTRAYAL IN RAP 1.docx
Running head MUSIC AND GENDER WOMEN PORTRAYAL IN RAP        1.docxRunning head MUSIC AND GENDER WOMEN PORTRAYAL IN RAP        1.docx
Running head MUSIC AND GENDER WOMEN PORTRAYAL IN RAP 1.docx
glendar3
 
Running head PROGRAM AND MISSION ALIGNMENT .docx
Running head PROGRAM AND MISSION ALIGNMENT                       .docxRunning head PROGRAM AND MISSION ALIGNMENT                       .docx
Running head PROGRAM AND MISSION ALIGNMENT .docx
glendar3
 
Running head Museum Focus1Museum Focus.docx
Running head Museum Focus1Museum Focus.docxRunning head Museum Focus1Museum Focus.docx
Running head Museum Focus1Museum Focus.docx
glendar3
 
Running head MODULE 3 - SLP .docx
Running head MODULE 3 - SLP                                    .docxRunning head MODULE 3 - SLP                                    .docx
Running head MODULE 3 - SLP .docx
glendar3
 
Running Head PROGRAM EVALUATION PLAN1PROGRAM EVALUATION.docx
Running Head PROGRAM EVALUATION PLAN1PROGRAM EVALUATION.docxRunning Head PROGRAM EVALUATION PLAN1PROGRAM EVALUATION.docx
Running Head PROGRAM EVALUATION PLAN1PROGRAM EVALUATION.docx
glendar3
 
Running head PROGRAM EVALUATION .docx
Running head PROGRAM EVALUATION                                  .docxRunning head PROGRAM EVALUATION                                  .docx
Running head PROGRAM EVALUATION .docx
glendar3
 
Running Head MUNCHAUSEN SYNDROMEMunchausen SyndromeKr.docx
Running Head MUNCHAUSEN SYNDROMEMunchausen SyndromeKr.docxRunning Head MUNCHAUSEN SYNDROMEMunchausen SyndromeKr.docx
Running Head MUNCHAUSEN SYNDROMEMunchausen SyndromeKr.docx
glendar3
 
Running head PROGRAM EVALUATION 6PROGRAM EVALUATIONPr.docx
Running head PROGRAM EVALUATION 6PROGRAM EVALUATIONPr.docxRunning head PROGRAM EVALUATION 6PROGRAM EVALUATIONPr.docx
Running head PROGRAM EVALUATION 6PROGRAM EVALUATIONPr.docx
glendar3
 
Running head PROFESSIONAL PLAN 1 © 2018 Laureate Educ.docx
Running head PROFESSIONAL PLAN  1  © 2018 Laureate Educ.docxRunning head PROFESSIONAL PLAN  1  © 2018 Laureate Educ.docx
Running head PROFESSIONAL PLAN 1 © 2018 Laureate Educ.docx
glendar3
 
Running head PROGRAM DESIGN 1PROGRAM DESIGN 2.docx
Running head PROGRAM DESIGN 1PROGRAM DESIGN 2.docxRunning head PROGRAM DESIGN 1PROGRAM DESIGN 2.docx
Running head PROGRAM DESIGN 1PROGRAM DESIGN 2.docx
glendar3
 
Running head PROFICIENCY LEVEL ANALYSIS1PROFICIENCY LEVEL AN.docx
Running head PROFICIENCY LEVEL ANALYSIS1PROFICIENCY LEVEL AN.docxRunning head PROFICIENCY LEVEL ANALYSIS1PROFICIENCY LEVEL AN.docx
Running head PROFICIENCY LEVEL ANALYSIS1PROFICIENCY LEVEL AN.docx
glendar3
 
Running head PROFESSIONAL CAPSTONE AND PRACTICUM1PROFESSIONA.docx
Running head PROFESSIONAL CAPSTONE AND PRACTICUM1PROFESSIONA.docxRunning head PROFESSIONAL CAPSTONE AND PRACTICUM1PROFESSIONA.docx
Running head PROFESSIONAL CAPSTONE AND PRACTICUM1PROFESSIONA.docx
glendar3
 
Running head PROFESSIONAL DEVELOPMENT PROPOSAL PROGRAM .docx
Running head PROFESSIONAL DEVELOPMENT PROPOSAL PROGRAM           .docxRunning head PROFESSIONAL DEVELOPMENT PROPOSAL PROGRAM           .docx
Running head PROFESSIONAL DEVELOPMENT PROPOSAL PROGRAM .docx
glendar3
 

More from glendar3 (20)

Running head Multi-actor modelling system 1Multi-actor mod.docx
Running head Multi-actor modelling system  1Multi-actor mod.docxRunning head Multi-actor modelling system  1Multi-actor mod.docx
Running head Multi-actor modelling system 1Multi-actor mod.docx
 
Running head MY MOTHER MY HERO .docx
Running head MY MOTHER MY HERO                                   .docxRunning head MY MOTHER MY HERO                                   .docx
Running head MY MOTHER MY HERO .docx
 
Running head PROGRAM EVALUATION PLAN1PROGRAM EVALUATION PLAN.docx
Running head PROGRAM EVALUATION PLAN1PROGRAM EVALUATION PLAN.docxRunning head PROGRAM EVALUATION PLAN1PROGRAM EVALUATION PLAN.docx
Running head PROGRAM EVALUATION PLAN1PROGRAM EVALUATION PLAN.docx
 
Running head Project 21Project 22Projec.docx
Running head Project 21Project 22Projec.docxRunning head Project 21Project 22Projec.docx
Running head Project 21Project 22Projec.docx
 
Running head MILESTONE ONE .docx
Running head MILESTONE ONE                                       .docxRunning head MILESTONE ONE                                       .docx
Running head MILESTONE ONE .docx
 
Running Head PROJECT 31DISCUSSION5Project 3.docx
Running Head PROJECT 31DISCUSSION5Project 3.docxRunning Head PROJECT 31DISCUSSION5Project 3.docx
Running Head PROJECT 31DISCUSSION5Project 3.docx
 
Running head PROBLEM STATEMENT .docx
Running head PROBLEM STATEMENT                                 .docxRunning head PROBLEM STATEMENT                                 .docx
Running head PROBLEM STATEMENT .docx
 
Running head MUSIC AND GENDER WOMEN PORTRAYAL IN RAP 1.docx
Running head MUSIC AND GENDER WOMEN PORTRAYAL IN RAP        1.docxRunning head MUSIC AND GENDER WOMEN PORTRAYAL IN RAP        1.docx
Running head MUSIC AND GENDER WOMEN PORTRAYAL IN RAP 1.docx
 
Running head PROGRAM AND MISSION ALIGNMENT .docx
Running head PROGRAM AND MISSION ALIGNMENT                       .docxRunning head PROGRAM AND MISSION ALIGNMENT                       .docx
Running head PROGRAM AND MISSION ALIGNMENT .docx
 
Running head Museum Focus1Museum Focus.docx
Running head Museum Focus1Museum Focus.docxRunning head Museum Focus1Museum Focus.docx
Running head Museum Focus1Museum Focus.docx
 
Running head MODULE 3 - SLP .docx
Running head MODULE 3 - SLP                                    .docxRunning head MODULE 3 - SLP                                    .docx
Running head MODULE 3 - SLP .docx
 
Running Head PROGRAM EVALUATION PLAN1PROGRAM EVALUATION.docx
Running Head PROGRAM EVALUATION PLAN1PROGRAM EVALUATION.docxRunning Head PROGRAM EVALUATION PLAN1PROGRAM EVALUATION.docx
Running Head PROGRAM EVALUATION PLAN1PROGRAM EVALUATION.docx
 
Running head PROGRAM EVALUATION .docx
Running head PROGRAM EVALUATION                                  .docxRunning head PROGRAM EVALUATION                                  .docx
Running head PROGRAM EVALUATION .docx
 
Running Head MUNCHAUSEN SYNDROMEMunchausen SyndromeKr.docx
Running Head MUNCHAUSEN SYNDROMEMunchausen SyndromeKr.docxRunning Head MUNCHAUSEN SYNDROMEMunchausen SyndromeKr.docx
Running Head MUNCHAUSEN SYNDROMEMunchausen SyndromeKr.docx
 
Running head PROGRAM EVALUATION 6PROGRAM EVALUATIONPr.docx
Running head PROGRAM EVALUATION 6PROGRAM EVALUATIONPr.docxRunning head PROGRAM EVALUATION 6PROGRAM EVALUATIONPr.docx
Running head PROGRAM EVALUATION 6PROGRAM EVALUATIONPr.docx
 
Running head PROFESSIONAL PLAN 1 © 2018 Laureate Educ.docx
Running head PROFESSIONAL PLAN  1  © 2018 Laureate Educ.docxRunning head PROFESSIONAL PLAN  1  © 2018 Laureate Educ.docx
Running head PROFESSIONAL PLAN 1 © 2018 Laureate Educ.docx
 
Running head PROGRAM DESIGN 1PROGRAM DESIGN 2.docx
Running head PROGRAM DESIGN 1PROGRAM DESIGN 2.docxRunning head PROGRAM DESIGN 1PROGRAM DESIGN 2.docx
Running head PROGRAM DESIGN 1PROGRAM DESIGN 2.docx
 
Running head PROFICIENCY LEVEL ANALYSIS1PROFICIENCY LEVEL AN.docx
Running head PROFICIENCY LEVEL ANALYSIS1PROFICIENCY LEVEL AN.docxRunning head PROFICIENCY LEVEL ANALYSIS1PROFICIENCY LEVEL AN.docx
Running head PROFICIENCY LEVEL ANALYSIS1PROFICIENCY LEVEL AN.docx
 
Running head PROFESSIONAL CAPSTONE AND PRACTICUM1PROFESSIONA.docx
Running head PROFESSIONAL CAPSTONE AND PRACTICUM1PROFESSIONA.docxRunning head PROFESSIONAL CAPSTONE AND PRACTICUM1PROFESSIONA.docx
Running head PROFESSIONAL CAPSTONE AND PRACTICUM1PROFESSIONA.docx
 
Running head PROFESSIONAL DEVELOPMENT PROPOSAL PROGRAM .docx
Running head PROFESSIONAL DEVELOPMENT PROPOSAL PROGRAM           .docxRunning head PROFESSIONAL DEVELOPMENT PROPOSAL PROGRAM           .docx
Running head PROFESSIONAL DEVELOPMENT PROPOSAL PROGRAM .docx
 

Recently uploaded

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 

Running head NETWORK PROTECTION AGAINST THREATS1NETWORK PROTEC.docx

  • 1. Running head: NETWORK PROTECTION AGAINST THREATS 1 NETWORK PROTECTION AGAINST THREATS 4 Network Protection against Threats Threats, in the context of computer security, refers to any possible vulnerability to a computer system and has the potential to adversely affect the computer system and the stored data. Threats do not have to necessarily happen but in the event that they occur then there are huge losses to businesses and individuals, security is compromised and key data may be lost completely if no recovery methods had been put in place (Silberschatz et al., 2014). Cyber criminals are taking their malice to a new level every dawn and the rates at which they are accessing stored data in systems are a reason to get worried. The potential threats to the computer systems may be from viruses, back doors, Trojans and attacks from the system hackers. System developers have greatly being involved in devising mechanisms to address the issues related to network protection and some of the key solutions are authentication and identification, data encryption, and frequent system updates.
  • 2. Authentication and identification With this technique, the data can only be accessed by the required and the authorized personnel. Identification occurs when a unique name or an image is assigned to the users who interact with the information (White et al., 2017). Authentication is meant to ensure that the person who uses the data is verified as one of the authorized users. These techniques are used to allow or to deny access to data and can even involve authentication of the data and the hardware, and not just the user, through the use of passwords which are only shared with those that are intended to access the data. Data encryption Data encryption is a technique that has been used by system users and developers to ensure that data cannot be accessed by unauthorized persons. Data encryption translates the data into other codes or forms and a secret key is put in place. The persons who have information about the secret key are the only ones who can successfully use the data (Siowiorek & Swarz, 2017). The information, after being translated into codes and other forms cannot be read (ciphertext). The users then will use the secret key to unencrypt the data into readable and understandable forms (plaintexts). Data encryption is one of the most effective data and system protection methods used by organizations especially due to the fact that the data can only be read by those who have the key and even if fraudsters get access to the data, they cannot understand. Frequent system update There are new versions of the systems and the applications in use which are being developed occasionally. These new updates come with advanced features meant to increase the security of the systems (Bhargava & Reese, 2015). The responsibility is now vested on the system users to ensure that the systems in use are updated and have all the new features. Using outdated versions of the systems only places them at a disadvantage of possible attacks by viruses and cyber criminals. Organizations lose data into the hands of these criminals
  • 3. thinking that system updates are costly. Doing the updates are far much better than having to comprise security and privacy due to the inability to ensure that the systems are up to the standards that are recommended by the system developers. In conclusion, network threats are occurrences that are happening every day, costing businesses dearly. Lose of data to persons who are not authorized to access the information can be traumatizing especially when the data is sensitive. Data getting into the hands of fraudsters means that privacy and the security of the data owners are greatly risked. System developers have come in to save the day. Various techniques have been developed to reduce the threats resulting from system vulnerabilities. Organizations should put such into place. References Bhargava, R., & Reese, D.P. (2015). U.S. Patent NO. 8, 938, 800. Washington, DC: U.S. Patent and Trademark Office. Silberschatz, A., Galvin, P.B., & Gagne, G. (2014). Operating system concepts and essentials. John Wiley & Sons. Siowiorek, D., & Swarz, R. (2017). Reliable computer systems: Design and evaluation. Digital Press. White, G.B., Fisch, E.A., & Pooch, U.W. (2017). Computer system and network security. CRC Press.