Tuesday, June 11, 2019

Technology of Information Security Essay Example | Topics and Well Written Essays - 500 words

Technology of Information Security - Essay Exampleat the present are a premix of these two solutions, where some entropy are stored on a centralized server and accessed by client computers, as well as some data is stored only on local computers which is never shared with other client computers (Microsoft, 2003 Shelly, Cashman, & Vermaat, 2005).In addition, all of the above discussed situations come with a variety of security problems to consider. In fact, for the majority of origin organizations, at the very least some of this data must be kept secure. Moreover, in order to help present impressive data security in the above discussed situations, there exist a wide variety of IT security technologies that can be used by the business organizations to keep their sensitive data and information secure during storage and network communication. Additionally, there is not a single IT security technology that has the capability to nourish all data against all kinds of attack. However, th ere are many security technologies that can be combined to carry out a wide-ranging security stand that protects against a wide variety of security attacks (Microsoft, 2003 Shelly, Cashman, & Vermaat, 2005). I have presented below three information security technologiesIt is an admitted fact that the majority of business organizations are exposing their own(prenominal) networks to meshing traffic as a result, the deployment of firewalls has become a basic need. Basically, a firewall stops illegal communication inside and outside of the network, facilitating the company to implement a security strategy on traffic running between its network and the Internet (Turban, Leidner, McLean, & Wetherbe, 2005 Laudon & Laudon, 1999). Additionally, firewalls can be either software or hardware. However, an stiff firewall arrangement will be based on both (Beal, 2004). In this scenario, a firewall divides a network into different domains. A wide-ranging implementation of the firewall has the Internet as un-trusted domain a semi

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.