Wednesday, October 30, 2019
Technology of Information Security Essay Example | Topics and Well Written Essays - 500 words
Technology of Information Security - Essay Example at the present are a mixture of these two solutions, where some data are stored on a centralized server and accessed by client computers, as well as some data is stored only on local computers which is never shared with other client computers (Microsoft, 2003; Shelly, Cashman, & Vermaat, 2005). In addition, all of the above discussed situations come with a variety of security problems to consider. In fact, for the majority of business organizations, at the very least some of this data must be kept secure. Moreover, in order to help present effective data security in the above discussed situations, there exist a wide variety of IT security technologies that can be used by the business organizations to keep their sensitive data and information secure during storage and network communication. Additionally, there is not a single IT security technology that has the capability to protect all data against all kinds of attack. However, there are many security technologies that can be combined to implement a wide-ranging security infrastructure that protects against a wide variety of security attacks (Microsoft, 2003; Shelly, Cashman, & Vermaat, 2005). I have presented below three information security technologies: It is an admitted fact that the majority of business organizations are exposing their personal networks to Internet traffic; as a result, the deployment of firewalls has become a basic need. Basically, ââ¬Å"a firewall stops illegal communication inside and outside of the network, facilitating the company to implement a security strategy on traffic running between its network and the Internetâ⬠(Turban, Leidner, McLean, & Wetherbe, 2005; Laudon & Laudon, 1999). Additionally, firewalls can be either software or hardware. However, an effective firewall arrangement will be based on both (Beal, 2004). In this scenario, a firewall divides a network into different domains. A wide-ranging implementation of the firewall has the Internet as un-trusted domain; a semi
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.