For providing the security, what are the pros and cons of it, Computer Network Security

Assignment Help:

There are various benefits related with providing the security. They are given below, 

(i)  Confidentiality/ Privacy

(ii)  Integrity 

(iii) Availability (iv)Authentication. (i)  Privacy 

Security ensures that the information available in the system is kept secret, by allowing access only to the authorized users.

(ii) Integrity has following sub types

(a) Hardware Integrity

The physical and the administrative security measures ensure that the hardware is secure from incidental (or) intentional damages and is willingly available round the clock.

(b) Software Integrity

Security ensures  that  the  system  software    free  from  any of the  illegitimate  alterations, damages etc.

(c)  Data Integrity

Security  also  ensures  that  data  files  are secured  from  the unauthorized  access  thereby availability, privacy and integrity is maintained.

(d) Network Integrity

Security mechanisms also prevent the network from theactive and passive attacks.

(iii). Resource Availability

Security also ensures that the computer resources are available only to the legitimate and the authorized users.

(iv). Authentication

Security also ensures that the authentication of users and the resources is done before initiating any of the transaction.

 Disadvantages/Cons of Providing Security:

Apart from the various advantages of it, the security also has certain disadvantages. They are as follows,

      (i) It quite Expensive

(ii) It is very much Time consuming

(iii)   Additional resource utilization are required in this

(iv) Increased employee count are required in this.

(i)  Expensive

Though security mechanisms protect the, software, hardware data and network from the intruders’ interference, they are quite expensive to implement and maintain.

(ii) Time Consuming

Providing privacy, availability, integrity, authenticity etc., involve number of steps to be taken. Thus, they need an additional time.

(iii) Additional Resource Utilization

The  implementation  of  the  security  mechanisms  includes  utilization  of  the additional bandwidth, memory space, hardware and software for storing, downloading  exchanging and implementing the encryption/decryption procedures.

(iv) Increased Employee/Staff Count

Providing security to the number of applications requires the involvement of more number of high-end professionals, hence, more staff must be employed.


Related Discussions:- For providing the security, what are the pros and cons of it

Important network security services, Question: (a) Consider that you en...

Question: (a) Consider that you enter the given URL in the address bar of a popular web client and that both the client and server accepts HTTP version 1.1. i. What can be t

Computer fundamentals, Ask You have been asked by a new client to assist i...

Ask You have been asked by a new client to assist in setting up a new computer for her coffee shop. She has just purchased the newest Apple computer from an online site. Should wou

Categories of controls-information security, Categories of Controls Cont...

Categories of Controls Controlling risk through mitigation, avoidance or transference is accomplished by implementing controls. There are 4 effective approaches to select the co

Design a network layout, QUESTION: (a) Below is a capture of an Ethern...

QUESTION: (a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. Give the source MAC address for the frame in hexadecimal; the sourc

Illustrate the label switching procedure in an mpls network, QUESTION ...

QUESTION a) Explain the terms traffic engineering, class-based queuing, shaping and grooming in an MPLS network. b) Using an example topology, illustrate the label swi

Virtual terminal protocol vtp, Write down the short notes on VTR.  Communic...

Write down the short notes on VTR.  Communication between different types of the equipment and software is made possible by making use of the networks. Full-screen text editor is s

Ipv6 datagram format, IPV6 DATAGRAM FORMAT It is given in the figure b...

IPV6 DATAGRAM FORMAT It is given in the figure below:

It service support within the itil framework, Problem (a) IT Service Suppo...

Problem (a) IT Service Support within the ITIL framework is divided in a number of processes. Compare and contrast the following processes: i. Incident Management and Problem M

Define the term enterprise network, a) Define the term "Enterprise Network"...

a) Define the term "Enterprise Network". b) Briefly discuss the similarity and differences between a switch and a router. c) A company XYZ has been renting the 1 st Floor of

Vigenere Cipher, What key which if used to encrypt the ciphertext again wou...

What key which if used to encrypt the ciphertext again would give back the plaintext (i.e. key is a weak key)? Define a formula for identifying weak keys for the cipher below (

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd