Network security in an organisation, Computer Network Security

Network security is an issue for companies regardless of whether they participate in electronic commerce; however, since most organizations have a Web site that allows some interaction with outside individuals, that perspective will be used for the purposes of this analysis. Network security has to be concerned along with protecting the integrity of the data used by the company for its operations. Sales, costs, customer information, and similar data must be precise in order for the company to be able to function at even the most rudimentary level. This means that if the company sells 10 units for $37 per unit, it is recorded accurately as a sale of $370, recorded in accounts receivable appropriately, set up for delivery based on the contract, and have inventory quantities adjusted, as well. This is occasionally considered as data integrity (Smith n.p.). At the same time, that information must be kept secure from prying eyes, or from individuals with more nefarious purposes. Companies want to keep competitors from learning information about the company's operations, and they have a responsibility to their vendors and their customers to keep that information secure. This is important when companies are dealing with other companies in a business-to-business environment, but can be even more critical when companies are dealing with the public through Internet sales. If a company is unable to protect the security or the privacy of its Internet customers, those customers are likely to move to other Internet sites in order to transact their business. Similarly, consumers may be concerned that their personal information is being sold to other companies with whom they may not have a business relationship; as a result, privacy policies have become an important part of network security (Smith n.p.).

Posted Date: 2/25/2013 7:35:58 AM | Location : United States







Related Discussions:- Network security in an organisation, Assignment Help, Ask Question on Network security in an organisation, Get Answer, Expert's Help, Network security in an organisation Discussions

Write discussion on Network security in an organisation
Your posts are moderated
Related Questions
Problem (1) - Alice, Bob and Charlie have a secret key a=3, b=4, c=5, respectively. - They want to find a common secret key using Diffie-Hellan key exchange protocol (with g

define .

Illustrate about TinySec Protocol TinySec is implemented on the link layer and addresses security requirements of the resource staffed nodes in the WSN based on the link layer

Digital Certificates Digital Certificates are electronic document having key value and identifying information about entity which controls key. Digital signature which is attach

Question: (a) What do you understand by the term "integrity"? (b) Which type of attack denies authorized users access to network resources? (c) You have discovered tha

Consider a computer system with three users: Alice, Bob and Cindy. Alice owns the file alicerc, and Bob and Cindy can read it. Cindy can read and write the file bobrc, which Bob ow

Explain how can we achieved privacy in an e-mail system.  The full form of PEM is Privacy Enhanced Mail: PEM  is  the  internet  Privacy  Enhanced  Mail  standard  adopted

Five years ago, Calgary Kids' Cloth Ltd was just a small retail store in downtown Calgary. The company started their own factory in SE Calgary to produce outdoor clothes for kids.

CRC can detect the following errors better than check sums. a) Vertical errors b) Burst errors a) VERTICAL ERRORS:  This kind of error happens due to a hardware fai

QUESTION: (a) Explain, with the aid of a diagram, a Star topology of a network of your choice. (b) Illustrate on the use of a MAN and give an example of one. (c) Describe