Question

In: Computer Science

Security should be a top concern for every network environment. This is especially true in a...

Security should be a top concern for every network environment. This is especially true in a converged network. Many mission-critical services depend on this infrastructure. A security breach could cause devastating effects on the environment. All measures must be taken to reduce the risk of a security breach.

In 3–4 paragraphs, complete the following:

  • Discuss 1 way to reduce risk in the network.
  • Who do you think is responsible for keeping the network safe—the administrator, the users, or both? Why?

Solutions

Expert Solution

i) As we all know that technology is everywhere nowadays. So the network is everywhere in order to communicate in a very easier way with more efficiency. As there are many advantages of network there are a few disadvantages or risks by using the network. There are a few ways to reduce the risk in the network. They are:

a) Social media is also one type of network. We usually post our status and posts etc on social media like Facebook, Twitter, etc. Sometimes our posts also are seen by unknown persons or strangers if we haven't put privacy to our account. So it leads to some danger. When u went to some tour with your family then you automatically post your pics in the social media then the viewers know that there is no one in your home and it is the golden chance for them to rob the valuable things which are there in your home. So we have to maintain the privacy of all our accounts. So that even if we post those pics risk may be reduced to some extent.

b) We used to browse daily. For that also we have to use most secured websites in order to reduce the risk from the attackers. For some browsers like Firefox and Google Chrome at the top in the URL bar, we see the green lock symbol which resembles that it is secured and there is no risk for hackers. Another thing is when we search for anything in the browser by default takes "https". Here, the "s" means it is so secured. So whatever we are doing with our browser we must use the most secure browsers.

c) We have to maintain Anti Malware of Antivirus software in order to reduce the risk of various unknown virus or invalid messages sent by third parties or strangers etc. By our fault, if the virus attacks our system then the anti-virus software will defend our systems from that malware.

ii) In my point of view, both admin as well as user has the responsibility of taking care of network for being far from various malware or hackers. The duty of admin is just to accept the request of the user and fulfill the needs of that user. The duty of the user is to request his needs to the admin. So the admin has to fix the various bugs so that the users couldn't feel any discomfort. The user could use the services provided by the user very friendly and if there is any query then he must tell it to the admin. So the admin and user play a very crucial role in terms of risk in the network. User should take care of his privacy and the administrator should not leaks or duplicates the passwords and details of the user to anyone.


Related Solutions

Security should be a top concern for every network environment. This is especially true in a...
Security should be a top concern for every network environment. This is especially true in a converged network. Many mission-critical services depend on this infrastructure. A security breach could cause devastating effects on the environment. All measures must be taken to reduce the risk of a security breach. In 3–4 paragraphs, complete the following: Discuss 1 way to reduce risk in the network. Who do you think is responsible for keeping the network safe—the administrator, the users, or both? Why?
1. Elaborate the challenges of managing a network environment. Example: Network security Performance management Non-centralized network...
1. Elaborate the challenges of managing a network environment. Example: Network security Performance management Non-centralized network management Traffic monitoring
Discuss whether a small business environment should use a workgroup network or a domain network setup....
Discuss whether a small business environment should use a workgroup network or a domain network setup. Describe the advantages and disadvantages of either option.
discuss whether a small business environment should use a workgroup network or a domain network setup....
discuss whether a small business environment should use a workgroup network or a domain network setup. You should describe the advantages and disadvantages of either option. Don't forget to list why you chose the network type you did.
True/false Every ratio tells us for every one of​ what’s on the​ top, here’s how many...
True/false Every ratio tells us for every one of​ what’s on the​ top, here’s how many we have of​ what’s on the bottom. True or​ False:Ceteris paribus​, the cash coverage ratio and the rate of interest paid on debt are inversely related. True or​ False:  An increase in the cash coverage ratio means that a firm is less likely to default on its outstanding debt. True/false Every ratio tells us for every one of​ what’s on the​ top, here’s how...
Productivity should be a concern of every business organization. How is productivity defined? How are productivity...
Productivity should be a concern of every business organization. How is productivity defined? How are productivity measures used? Why is productivity important? What part of the organization has primary responsibility for productivity? How is efficiency different from productivity?
Define the scope of network security.
Define the scope of network security.
What are the differences and similarities between security, network security, and computer security in IT fields?
What are the differences and similarities between security, network security, and computer security in IT fields? Do the fields cover clearly delineated areas, or is there considerable overlap? Would you say that one of these areas is more technical than the other two?
Discuss network security in a business ethics.
Discuss network security in a business ethics.
List the five top considerations to reduce network congestion and improve network performance.
List the five top considerations to reduce network congestion and improve network performance.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT