For providing the security, what are the pros and cons of it, Computer Network Security

There are various benefits related with providing the security. They are given below, 

(i)  Confidentiality/ Privacy

(ii)  Integrity 

(iii) Availability (iv)Authentication. (i)  Privacy 

Security ensures that the information available in the system is kept secret, by allowing access only to the authorized users.

(ii) Integrity has following sub types

(a) Hardware Integrity

The physical and the administrative security measures ensure that the hardware is secure from incidental (or) intentional damages and is willingly available round the clock.

(b) Software Integrity

Security ensures  that  the  system  software    free  from  any of the  illegitimate  alterations, damages etc.

(c)  Data Integrity

Security  also  ensures  that  data  files  are secured  from  the unauthorized  access  thereby availability, privacy and integrity is maintained.

(d) Network Integrity

Security mechanisms also prevent the network from theactive and passive attacks.

(iii). Resource Availability

Security also ensures that the computer resources are available only to the legitimate and the authorized users.

(iv). Authentication

Security also ensures that the authentication of users and the resources is done before initiating any of the transaction.

 Disadvantages/Cons of Providing Security:

Apart from the various advantages of it, the security also has certain disadvantages. They are as follows,

      (i) It quite Expensive

(ii) It is very much Time consuming

(iii)   Additional resource utilization are required in this

(iv) Increased employee count are required in this.

(i)  Expensive

Though security mechanisms protect the, software, hardware data and network from the intruders’ interference, they are quite expensive to implement and maintain.

(ii) Time Consuming

Providing privacy, availability, integrity, authenticity etc., involve number of steps to be taken. Thus, they need an additional time.

(iii) Additional Resource Utilization

The  implementation  of  the  security  mechanisms  includes  utilization  of  the additional bandwidth, memory space, hardware and software for storing, downloading  exchanging and implementing the encryption/decryption procedures.

(iv) Increased Employee/Staff Count

Providing security to the number of applications requires the involvement of more number of high-end professionals, hence, more staff must be employed.

Posted Date: 7/20/2012 6:13:44 AM | Location : United States







Related Discussions:- For providing the security, what are the pros and cons of it, Assignment Help, Ask Question on For providing the security, what are the pros and cons of it, Get Answer, Expert's Help, For providing the security, what are the pros and cons of it Discussions

Write discussion on For providing the security, what are the pros and cons of it
Your posts are moderated
Related Questions
The objective of this example is to demonstrate the steps required for a successful attack against a vulnerable Windows XP SP2 system. It will show: a) how Nessus can be used to di

Problem: (a) What do you meant by Network Address Translation (NAT)? Why is it used? (b) Given the following information by your ISP about your newly acquired Frame Relay c

Question : (a) Distinguish between authorization and authentication. (b) SSO (Single Sign On) implies a user logs in once and can access resources for a defined period of

Data Classification and Management Corporate and military organizations use a several of classification schemes. Information owners are responsible for classifying information a

Question requires you to produce a pcap file from a Wireshark capture.  In addition, you must include a screen capture of Wireshark and some specific information regarding the fram

Question 1 a) Explain how CSMA/CD works. b) Describe the term "exponential back-off". c) Describe the differences between "circuit switching" and "packet switching". d) Th

FRAGMENTATION AND PATH MTU IPv6 source is responsible for fragmentation. Routers simply drop datagrams bigger than network MTU. So source have to fragment datagram to arrive d

To master the complexity one must apply the given points. CONCENTRATE IN UNDERSTANDING THE CONCEPTS: Instead of details of wires used to connect computers to a specif

Question: The Wired Equivalent Privacy (WEP) standard was created in order to give wireless networks safety and security features similar to that of wired networks. (a) L

MegaCorp INC. is a large manufacturing firm that operates 5 factories in Dallas, 4  factories in Los Angeles, and 5 factories in Albany, New York.  It operates a tightly  connected