For providing the security, what are the pros and cons of it, Computer Network Security

Assignment Help:

There are various benefits related with providing the security. They are given below, 

(i)  Confidentiality/ Privacy

(ii)  Integrity 

(iii) Availability (iv)Authentication. (i)  Privacy 

Security ensures that the information available in the system is kept secret, by allowing access only to the authorized users.

(ii) Integrity has following sub types

(a) Hardware Integrity

The physical and the administrative security measures ensure that the hardware is secure from incidental (or) intentional damages and is willingly available round the clock.

(b) Software Integrity

Security ensures  that  the  system  software    free  from  any of the  illegitimate  alterations, damages etc.

(c)  Data Integrity

Security  also  ensures  that  data  files  are secured  from  the unauthorized  access  thereby availability, privacy and integrity is maintained.

(d) Network Integrity

Security mechanisms also prevent the network from theactive and passive attacks.

(iii). Resource Availability

Security also ensures that the computer resources are available only to the legitimate and the authorized users.

(iv). Authentication

Security also ensures that the authentication of users and the resources is done before initiating any of the transaction.

 Disadvantages/Cons of Providing Security:

Apart from the various advantages of it, the security also has certain disadvantages. They are as follows,

      (i) It quite Expensive

(ii) It is very much Time consuming

(iii)   Additional resource utilization are required in this

(iv) Increased employee count are required in this.

(i)  Expensive

Though security mechanisms protect the, software, hardware data and network from the intruders’ interference, they are quite expensive to implement and maintain.

(ii) Time Consuming

Providing privacy, availability, integrity, authenticity etc., involve number of steps to be taken. Thus, they need an additional time.

(iii) Additional Resource Utilization

The  implementation  of  the  security  mechanisms  includes  utilization  of  the additional bandwidth, memory space, hardware and software for storing, downloading  exchanging and implementing the encryption/decryption procedures.

(iv) Increased Employee/Staff Count

Providing security to the number of applications requires the involvement of more number of high-end professionals, hence, more staff must be employed.


Related Discussions:- For providing the security, what are the pros and cons of it

Simplex data exchange, Simplex data exchange Simplex communication def...

Simplex data exchange Simplex communication defines to communication that happens in one direction only. Two definitions have made over time: a common definition, which is des

Address resolution , Mapping between a hardware address and a protocol addr...

Mapping between a hardware address and a protocol address is known Address Resolution. A router or host uses address resolution when it requires to transmit a packet to another dev

Draw the waveform for an asynchronous transmission, (a) Draw the waveform ...

(a) Draw the waveform for an asynchronous transmission with the given specifications: 8 data bits with value 11010001 (LSB listed first here), one parity bit (even), one star

Collision detection, COLLISION DETECTION The signals from two devices ...

COLLISION DETECTION The signals from two devices will interfere with each other and the overlapping of frames is known a collision. It does not cause to the hardware but data

Pseudonymous remailers and cypherpunk remailers, Problem (a) As a fore...

Problem (a) As a forensic investigator, you are needed to trace the source of an email. It is suspected that the email header has been forged. Show how you would proceed to

Risk determination, Risk Determination For purpose of relative risk asse...

Risk Determination For purpose of relative risk assessment, risk equals probability of vulnerability occurrence TIMES value MINUS percentage risk already controlled PLUS an elem

Cost accounting, ?Examples should include direct costs items, indirect cost...

?Examples should include direct costs items, indirect costs items, as well as variable costing. ?What are at least 5 types of expenses that are associated with manufacturing the

Ciphertext, Encode the following plaintext, using the Caesar cipher: ...

Encode the following plaintext, using the Caesar cipher: LORD OF THE RINGS b) The following ciphertext jw njbh lxmn cx kanjt has been encoded using a

Kasonet pinging system, KASONet Pinging System: Project Title:       ...

KASONet Pinging System: Project Title:                                                           "KASONet Pinging System"   Brief Overview of Project: The o

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd