Question

In: Computer Science

Security should be a top concern for every network environment. This is especially true in a...

Security should be a top concern for every network environment. This is especially true in a converged network. Many mission-critical services depend on this infrastructure. A security breach could cause devastating effects on the environment. All measures must be taken to reduce the risk of a security breach.

In 3–4 paragraphs, complete the following:

  • Discuss 1 way to reduce risk in the network.
  • Who do you think is responsible for keeping the network safe—the administrator, the users, or both? Why?

Solutions

Expert Solution

Answer)
For any organization, business or even for the personal space, the security of the data and information, should be the top concern for the environment and the users. This is true for private networks as well as public networks. There are many mission-critical services and system which can inter-depend and thus depend on the infrastructure, and thus the security breaches which can occur can have devastating effects on the infrastructure and systems.

We can reduce the risks in the network by following some approaches:
Installing firewalls and setting up the firewall rules such that communication to and from the network are monitored and thus is very vital and important.
Data to and from the network and also within the network should be encrypted and should use secure access to strong encryption mechanisms.
Using strong access control mechanisms such as multi-factor authentications instead of the single-factor authentications and also use of the biometric authentication.

Both the administrator and the users are responsible for keeping the network safe and secure. This is because the administrators will always keep an eye on the security, safety, and configuration of the network, while the users should also be able to be aware of the security risks which can happen, point out the security risks which are happening and report them to the administrator who can take the necessary actions.


Related Solutions

1. Elaborate the challenges of managing a network environment. Example: Network security Performance management Non-centralized network...
1. Elaborate the challenges of managing a network environment. Example: Network security Performance management Non-centralized network management Traffic monitoring
Discuss whether a small business environment should use a workgroup network or a domain network setup....
Discuss whether a small business environment should use a workgroup network or a domain network setup. Describe the advantages and disadvantages of either option.
discuss whether a small business environment should use a workgroup network or a domain network setup....
discuss whether a small business environment should use a workgroup network or a domain network setup. You should describe the advantages and disadvantages of either option. Don't forget to list why you chose the network type you did.
True/false Every ratio tells us for every one of​ what’s on the​ top, here’s how many...
True/false Every ratio tells us for every one of​ what’s on the​ top, here’s how many we have of​ what’s on the bottom. True or​ False:Ceteris paribus​, the cash coverage ratio and the rate of interest paid on debt are inversely related. True or​ False:  An increase in the cash coverage ratio means that a firm is less likely to default on its outstanding debt. True/false Every ratio tells us for every one of​ what’s on the​ top, here’s how...
Productivity should be a concern of every business organization. How is productivity defined? How are productivity...
Productivity should be a concern of every business organization. How is productivity defined? How are productivity measures used? Why is productivity important? What part of the organization has primary responsibility for productivity? How is efficiency different from productivity?
Define the scope of network security.
Define the scope of network security.
What are the differences and similarities between security, network security, and computer security in IT fields?
What are the differences and similarities between security, network security, and computer security in IT fields? Do the fields cover clearly delineated areas, or is there considerable overlap? Would you say that one of these areas is more technical than the other two?
Discuss network security in a business ethics.
Discuss network security in a business ethics.
What is a network security assessment? The process of judging a security solution The process of...
What is a network security assessment? The process of judging a security solution The process of testing a security solution The process of evaluating a deployed security solution All of these are correct
Case: Northridge Security Consultants, a security consulting company that specializes in network security for businesses, has...
Case: Northridge Security Consultants, a security consulting company that specializes in network security for businesses, has been using you as an outside contractor to provide research and customer service for their clients. A landscaping business, Sunset Landscapers, has contracted with NSC to help them implement cryptography to protect all documents and transmissions throughout their network. They have over twenty locations nationwide. NSC has found that even though the company would like this technology, the IT Director is resistant to any...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT