Network security in an organisation, Computer Network Security

Network security is an issue for companies regardless of whether they participate in electronic commerce; however, since most organizations have a Web site that allows some interaction with outside individuals, that perspective will be used for the purposes of this analysis. Network security has to be concerned along with protecting the integrity of the data used by the company for its operations. Sales, costs, customer information, and similar data must be precise in order for the company to be able to function at even the most rudimentary level. This means that if the company sells 10 units for $37 per unit, it is recorded accurately as a sale of $370, recorded in accounts receivable appropriately, set up for delivery based on the contract, and have inventory quantities adjusted, as well. This is occasionally considered as data integrity (Smith n.p.). At the same time, that information must be kept secure from prying eyes, or from individuals with more nefarious purposes. Companies want to keep competitors from learning information about the company's operations, and they have a responsibility to their vendors and their customers to keep that information secure. This is important when companies are dealing with other companies in a business-to-business environment, but can be even more critical when companies are dealing with the public through Internet sales. If a company is unable to protect the security or the privacy of its Internet customers, those customers are likely to move to other Internet sites in order to transact their business. Similarly, consumers may be concerned that their personal information is being sold to other companies with whom they may not have a business relationship; as a result, privacy policies have become an important part of network security (Smith n.p.).

Posted Date: 2/25/2013 7:35:58 AM | Location : United States







Related Discussions:- Network security in an organisation, Assignment Help, Ask Question on Network security in an organisation, Get Answer, Expert's Help, Network security in an organisation Discussions

Write discussion on Network security in an organisation
Your posts are moderated
Related Questions
Problem 1: What is the function of AUC in the GSM architecture? Explanation of HLR(AUC) Architecture of GSM Problem 2: Show the layered architecture of t

Question: (a) Describe how IPSec provides data source authentication. (b) Which protocol can be used to provide limited traffic analysis confidentiality? Why is it "limite

CONCEPT OF PACKET : Network systems splits data in small junks or blocks known as packets, which they send individually. Why we required packets rather than bits? The answer to

(a) Describe briefly the difference between flow control and congestion control in relation to a connection-oriented protocol such as TCP. (b)  What is the initial rate of data

Question (a) Name 3 popular electronic mail access protocols? (b) i. What is DNS? ii. Briefly, describe what it does and how it works? iii. Why does DNS use a dist

Question: (a) Explain the following security services: Confidentiality, Availability. (b) Which attack will be used to bypass even the best physical and logical security m

Question requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption tec

QUESTION : a) A datagram of 3000 bytes has to travel over a network with a MTU size of 1000 bytes. Describe how fragmentation can be used to solve this problem. You should pr

Question: a) There are two basic approaches to dealing with errors in the presence of pipelining. One way is Go-Back-N and the other strategy is Selective Repeat. i. Explain

Problem (a) Using Vigenère cipher and given the key abc, find the ciphertext for the message: simplicity Only the 26 lower-case alphabetical characters are used in messa