Security Networks

Read Complete Research Material

SECURITY NETWORKS

Security Networks



Table of Contents

Introduction2

Discussion3

Five phases required to compromise a target of evaluation5

Reconnaissance6

Scanning6

Gaining Access6

Maintaining Access7

Covering Tracks Page7

The critical evaluation of the UK data protection Act13

Advantages and Disadvantages of the of using a specific technique15

Cost Efficient15

Unlimited Storage15

Recovery and Backup15

Rapid Deployment16

Technical Issues17

Cloud Security17

Prone to Attack17

Conclusion18

Abstract

There is always a question emerge that is the network secured and the information protected? Do we have some sort of powerful vulnerability that could be helpful in compromising with an attacker effectively on our system? Now in this revolutionized era of high technology, such questions have been become an essential component of questioning by a security officer every day. How can a person be sure about the security of his or her network? A modem is installed anonymously that opens up a backdoor and responds to the calls of the cooperate network without someone's knowledge. Ethical hacking and attacking is an evaluation regarding the testing and checking of a technology oriented environment for probable fragile vulnerabilities and links. The act of hacking illustrates the process of attacking an overall network by hacking some passwords, username, or other hidden information (Chapple, 2012, pp. 86). This assignment will focus on the security networks or on the networks for security purposes against some ethical hackers and attackers who used several kinds of methodologies and tools for hack and cause some damages to an entire system of network.

Security Networks

Introduction

Network security comprises of the laws and policies implemented by a administrator of network in order to monitor and prevent unauthorized misuse, access, denial, or modification of a network system of computer and other accessible resources of network. Security of networks consists of the authorized accessing to data in a system of network which is under controlled by the administrator of network. Users are assigned and chosen an ID with password or some other type of authentic information that permits them to access programs and information within their reserved rights to use that. The security of networks covers up a wide variety of networks of computer which are of both private and public type and are utilized in the jobs and tasks of everyday in order to conduct communications and transactions among several government agencies, businesses, and individuals. Such secured networks may be private as they work within the premises of a particular company, and some may be unlock and open to access of everyone publicly. Network security is implicated in the enterprises, organizations, and many other kinds of institutions. Its works as it's is shown exactly from its title that it protects and secures a network. Not only secures but also oversees and saves from any harm to the operations which are being executed (Marcel, 2009, p. 240). The most general and the simplest way to protect and secure a network are to assign that network with a matchless and unique name and also an analogous password.

The security of network begins with the authentication of the user, particularly with an ID along with ...
Related Ads