AllFreePapers.com - All Free Papers and Essays for All Students
Search

Information Security

Autor:   •  November 30, 2015  •  Research Paper  •  1,917 Words (8 Pages)  •  896 Views

Page 1 of 8

Security for computer systems and networks evolved from a simple firewall to multiple arrays of security measures. Security is involved with the entire process of the network design. The security of a network impacts all aspect the system and how the system can function. Security has a major impact on computer networks and should be thoroughly analyzed in the first stage of system design. The following will detail possible measures to install a secure system.

Authentication

One of the first parts of a secure system is authentication. Security authentication provides first level protection to a computer system. Authentication involves the input of information from the user. The information in the form of a user name or account name and password allows access the system. An example of this step is logging in to check an email account.

The authentication process can track the access of the system including the users who log in, which files are viewed, and can even control when files are available. Authentication can add different levels of access to documents and protect from unauthorized changes. When applied correctly the authentication process give the system administrator better control of who uses the system.

Affects on Design

The security of the system affects the process of design and development of the system from the original layout to the final testing. Designing a large system is challenging but if security is not addressed in the early design stage there can be greater challenges. In the beginning of the design process security should have an impact on the system and should address all system failure possibilities. If the configuration of the security for the system is in place from the beginning of the design phase the rest of the system’s functions start more securely. With system security is place the design team can set the rest of the system within those boundaries and will understand how all parts of the network can function with less risk

Any network that connects to outside sources has increased risk of a security breech. The security settings will outline how external components connect to the system and what connections are safe. The design of the security should be able to adapt to changes in the system. The administrators may not want personal devices connecting to the network in the beginning but could be flexible to the idea at a later date.

The design must also include how security will handle Internet based attacks or breeches. Most systems connect to the Internet at some time. The process of handling information to and from the Internet is an important part of the security of the system. The security should not be so strict that it blocks all activity but must keep up with Internet based threats. The firewall system can help control what is allowed to access the

...

Download as:   txt (12.2 Kb)   pdf (242.6 Kb)   docx (12.6 Kb)  
Continue for 7 more pages »