The Concept of Network Security Information Proposal Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction and Brief Background of the Topic

Network security is a broad term. It encompasses a wide range of protective measures that include incorporating protection, detection, and reaction capabilities which are aimed at protecting and defending information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation (CNSS Instruction No. 4009, 2010). The concept of network security has become crucial as computer networks were introduced into private and corporate use.

The main concerns of security are maintaining the functionality of the network environment, securing privacy and providing the integrity of confidential information. The threat to the points mentioned can emerge due to network malfunction or a deliberate disruptive effort. The latter is the most common cause and primary concern of security specialists. They differ widely but are most often grouped into two distinct categories – active and passive. Active is defined as a direct attempt to obtain or disrupt information by altering it and include such methods as distributed denial of service, phishing and DNS spoofing. Passive attacks are activities that capture the data without altering it, like port scanning.

As network technologies evolve, so do security systems, to provide up-to-date measures of protection. These include both hardware and software solutions which need to be timely maintained and updated to keep up with both changing environments and improvements made by the attackers.

Recently, several major reasons have contributed to reorganizing the basic principles of network security. Firstly, mobile devices capable of network connection gradually rise in popularity among the general public, which requires making security measures easily accessible and maintained by a consumer with no IT training. Mobile devices, such as smartphones and tablet PCs, comprise the majority of such devices, providing for another serious issue. Mobile devices network connectivity is entirely wireless, with open public networks becoming more popular each year. Wireless networks differ significantly from traditional wired hierarchical ones. Finally, the cloud-based services have since their introduction been embraced by both corporate and private sector and has become a fairly widespread phenomenon.

All of the networks mentioned above differ from traditional ones, moving away from declining client-server structure and shifting towards more up-to-date machine-to-machine data traffic. Such changes open new possibilities for both system malfunction and deliberate disruptive attempts. New security solutions are constantly being implemented, such as the introduction of software-defined networking and wireless equipment capable of implementing wireless security features. There is, however, still much to be done. The recent history of security breaches show that traditional means of security, like password-based access, remain insufficient in terms of reliability while simultaneously becoming outdated in terms of changing hardware trends (Everett, 2016). Some researchers go as far as propose radically new dynamic environment capable of self-improvement and self-education (Zhou et al., 2015).

Research Question

The main purpose of this research is to find new effective ways of securing the mobile devices networks intended for personal use. Such networks have already integrated firmly into our daily lives and are encountered on a daily basis. Besides, the majority of software provides the best performance and reliability when being online, thus encouraging constant network connection. However, the inadequate protection of the device may lead to financial problems. But of even greater concern is an issue of privacy. The amount of personal information stored in and transferred through phones and tablet PCs is already sufficient to raise concerns and continues to grow. Therefore, outlining and developing the most promising branches of mobile networks should be one of our top priorities.

References

CNSS Instruction No. 4009. (2010). Web.

Everett, C. (2016). Are passwords finally dying?. Network Security, 2016(2), 10-14.

Zhou, H., Wu, C., Jiang, M., Zhou, B., Gao, W., Pan, T., & Huang, M. (2015). Evolving defense mechanism for future network security. IEEE Communications Magazine, 53(4), 45-51.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, January 27). The Concept of Network Security Information. https://ivypanda.com/essays/the-concept-of-network-security-information/

Work Cited

"The Concept of Network Security Information." IvyPanda, 27 Jan. 2022, ivypanda.com/essays/the-concept-of-network-security-information/.

References

IvyPanda. (2022) 'The Concept of Network Security Information'. 27 January.

References

IvyPanda. 2022. "The Concept of Network Security Information." January 27, 2022. https://ivypanda.com/essays/the-concept-of-network-security-information/.

1. IvyPanda. "The Concept of Network Security Information." January 27, 2022. https://ivypanda.com/essays/the-concept-of-network-security-information/.


Bibliography


IvyPanda. "The Concept of Network Security Information." January 27, 2022. https://ivypanda.com/essays/the-concept-of-network-security-information/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1