Security and Privacy Impact Paper

Submitted by: Submitted by

Views: 10

Words: 1004

Pages: 5

Category: Science and Technology

Date Submitted: 07/21/2016 05:48 AM

Report This Essay

Security and Privacy Impact

Wilmington University

Security and Privacy Impact Paper

The world is becoming more interconnected with the new networking technology and advent of internet. Enormous amount of data such as personal, commercial, military and government information is stored and shared using networking infrastructures. Due to the amount of intellectual property that can be easily acquired through the internet, network security is becoming of great importance. (Daya, n.d.) As a network engineer, managing security for an enterprise means understanding the risks and deciding how much risk is acceptable. Different levels of security are appropriate for different organizations. In today’s network infrastructure, no network is 100 percent secure. Computers networks and the Internet provide numerous advantages. Connecting the network to internet provides access to huge amount of information and allows to share information on an incredible scale. However, along with the various advantages, the Internet also offers malicious users easy access to numerous targets. (Security, n.d.)

Firewalls

Security and privacy measures are changing as the network changes and develops. Firewall is used to secure the system and network by screening all the connections between two systems. It is done by differentiating network traffic as trusted and untrusted connections. Based on the results only trusted connections will be allowed. Nowadays, the usage of network has increased drastically by the devices like smart phones, tablets, smart TV’s etc. With the increase in growth of usage, chances of security breaches will also be increased. Providing protection with the hardened firewalls is not sufficient for today’s network users. As smartphones and tablets become constant companions, cyber attackers are using every avenue available to break into them. When a smart phone of a person who is working in an enterprise is hacked, the intruder will be able to access all the data...