Wednesday, April 24, 2019
Technology of Information Security Essay Example | Topics and Well Written Essays - 500 words
Technology of Information guarantor - Essay Exampleat the present are a mixture of these two solutions, where some selective information are stored on a centralized server and accessed by client computers, as well as some information is stored only on local computers which is never shared with other client computers (Microsoft, 2003 Shelly, Cashman, & Vermaat, 2005).In addition, all of the above discussed situations come with a renewal of security problems to consider. In fact, for the majority of line of credit organizations, at the very least some of this data must be kept secure. Moreover, in order to succor present effective data security in the above discussed situations, there exist a total variety of IT security technologies that skunk be used by the business organizations to keep their sensitive data and information secure during storage and network communication. Additionally, there is not a single IT security engineering that has the capability to protect all data ag ainst all kinds of attack. However, there are many security technologies that can be combined to implement a wide-ranging security infrastructure that protects against a wide variety of security attacks (Microsoft, 2003 Shelly, Cashman, & Vermaat, 2005). I have presented below three information security technologiesIt is an admitted fact that the majority of business organizations are exposing their personal networks to Internet traffic as a result, the deployment of firewalls has become a basic need. Basically, a firewall stops illegal communication inside and outside of the network, facilitating the company to implement a security schema on traffic running between its network and the Internet (Turban, Leidner, McLean, & Wetherbe, 2005 Laudon & Laudon, 1999). Additionally, firewalls can be either packet or hardware. However, an effective firewall arrangement will be based on both (Beal, 2004). In this scenario, a firewall divides a network into different domains. A wide-ranging i mplementation of the firewall has the Internet as un-trusted domain a semi
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment