Wednesday, May 6, 2020

Information Security And Network Redundancy Free Sample Paper

Question: Discuss about theInformation Security and Network Redundancy. Answer: Introduction: In this report we are going to discuss about two important topics Information Security and Network Redundancy. All network users must have knowledge about these two essential topics and the purpose of this report is to discuss about these concepts in some detail. Description In this segment of report, first of all we will discuss about information security which is very much important to maintain into databases and to use it for sharing and communication purposes. Information Security Information Security is shortly known as InfoSec and it is a practice to defend information from unauthorized access, disclosure, modifications, use and its damage. This information can be business information, records of customers or clients and other essential information that is stored into database. In a business organization large amount of data is used and stored into databases and that data is confidential. Any kind of leakage of data may lead to heavy loss to business organizations. Importance of Information Security There are various reasons of information security that are listed as below: Confidentiality: This is the first reason to maintain security of information. Confidentiality ensures that data will only be accessed by person who have write to view data, no one else can access private data. Integrity: Integrity is also form of information security and according to this, data can be relied upon accuracy and correctness. Availability: Availability of information also ensure that information is secured. It means information should be available when needed. Unavailability of information at time may lead to lack of security. These are some reasons that information security is necessary. (Dark Reading, 2016) How Information Security can be Applied? There are various ways that can be used to maintain information security, but these options must be implemented appropriately and users must have knowledge about these information security options. Following are some common ways to apply information security: Usage of Anti-Virus, Firewall and network monitoring systems, are necessary to maintain security. These solution do not allow unknown entries to enter into system. Every entity is scanned by these security solutions. Strict security policies need to be followed in business organizations and all employees should follow these security policies. In these security policies, all rules should be mentioned properly to maintain security of computer systems and databases. Login credentials must be applied to computer systems by employees of organization and this must be done by computer administrator and he must give this access to authorized person. Identification of system anomalies is also necessary and after identification, these must be removed. System anomalies can be bugs and errors that are encountered by users while operating computer systems. (Host Duplex Blog, 2010) Main Component of Information Security According to analysis, it is found that main component of information security is to maintain its confidentiality which leads to security, integrity and availability of Information. What is CIA? CIA stands for Confidentiality, Integrity and Availability. Confidentiality refers to privacy of information and no unauthorized access, integrity means accuracy of information and availability means availability of information when it is required. (University, 2016) Network Redundancy This is another essential topic that we will discuss here in this report. Here in this segment of report we will discuss about this concept with its important aspects. Network redundancy is a process through which additional network devices, communication channels and equipments are installed within network infrastructure. The main purpose of network redundancy is to ensure network availability in case of failure of a network device or unavailability of that device. This is an important technique to reduce impact of failure of network device on whole networks. (Techopedia.com, 2016) Importance of Network Redundancy Today hi-speed and hi-tech networks are used for communication and for sharing information. In this high speed, it is possible that device failure can occur and whole network can stuck. In case of small networks, this problem can be managed but in case of large networks it is difficult to control this problem of device failure and there is requirement of an alternate device or equipment that can immediately response to network. Before implementing network redundancy, its identification is necessary and this can be done by periodic testing. To implement successful network redundancy there is requirement to make a project plan and every step should be decided while implementing this network redundancy. (Open.edu, (2016) How Network Redundancy can be Applied? Network redundancy can be applied in following ways: The first step in creation of network redundancy is to set up a plan of project and it will help to examine the current architecture. Make a plan to convert network into redundant. Planning for deployment of plan. Implementation of Testing. (ComputerWeekly, 2016) In this way, a successful network redundancy can be applied and network privacy can be maintained for long time. Testing is essential part of this whole plan of network redundancy and while implementing testing we can know about reasons of failure of network device and which device is necessary to replace. (Shimonski, 2010) Main Components of Network Redundancy In network redundancy plan, various components are used and these are all important for network redundancy. So it is difficult to find a single important component of network redundancy. Main components of network redundancy consists of nodes and links. Here nodes are different devices of a network and links that connect all devices properly. Routers, switches and other devices are used as network redundancy devices and for linking spanning tree protocol (STP) and routing protocols such as ECMP i.e. Equal Cost Multipath are used. All these components are required for implementing network redundancy successfully. (EETimes, 2016) In this way, network redundancy can be implemented and used by network experts to get prevention from network failure. Information security and network redundancy both are necessary to consider by developers and users to get high level security from network attacks such as hacking, phishing and denial of service attacks. These attacks are very harmful for database information and network activities. These attacks can damage whole information that is stored into database or transforms over network. That is why protection is necessary. References Dark Reading. (2016). 7 Top Information Security Trends For 2013. [online] Available at: https://www.darkreading.com/risk-management/7-top-information-security-trends-for-2013/d/d-id/1107955? [Accessed 2 Sep. 2016]. University, S. (2016). Why is Information Security important?. [online] Staffordshire University. Available at: https://www.staffs.ac.uk/support_depts/infoservices/rules_and_regulations/Infosecurimp.jsp [Accessed 2 Sep. 2016]. Open.edu. (2016). An introduction to information security: 1 Why is information security important? - OpenLearn - Open University - M886_1. [online] Available at: https://www.open.edu/openlearn/science-maths-technology/computing-and-ict/introduction-information-security/content-section-1 [Accessed 2 Sep. 2016]. Techopedia.com. (2016). What is Network Redundancy? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/29305/network-redundancy [Accessed 2 Sep. 2016]. Shimonski, R. (2010). The Importance of Network Redundancy. [online] WindowsNetworking.com. Available at: https://www.windowsnetworking.com/articles-tutorials/netgeneral/Importance-Network-Redundancy.html [Accessed 2 Sep. 2016]. EETimes. (2016). Redundancy: Choosing the Right Option for Net Designs | EE Times. [online] Available at: https://www.eetimes.com/document.asp?doc_id=1276954 [Accessed 2 Sep. 2016]. ComputerWeekly. (2016). Information security means better business. [online] Available at: https://www.computerweekly.com/opinion/Information-security-means-better-business [Accessed 3 Sep. 2016]. Host Duplex Blog. (2010). What is Redundancy and Why is it Important?. [online] Available at: https://blog.hostduplex.com/2010/04/13/what-is-redundancy-and-why-is-it-important/ [Accessed 3 Sep. 2016].

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.