For providing the security, what are the pros and cons of it, Computer Network Security

Assignment Help:

There are various benefits related with providing the security. They are given below, 

(i)  Confidentiality/ Privacy

(ii)  Integrity 

(iii) Availability (iv)Authentication. (i)  Privacy 

Security ensures that the information available in the system is kept secret, by allowing access only to the authorized users.

(ii) Integrity has following sub types

(a) Hardware Integrity

The physical and the administrative security measures ensure that the hardware is secure from incidental (or) intentional damages and is willingly available round the clock.

(b) Software Integrity

Security ensures  that  the  system  software    free  from  any of the  illegitimate  alterations, damages etc.

(c)  Data Integrity

Security  also  ensures  that  data  files  are secured  from  the unauthorized  access  thereby availability, privacy and integrity is maintained.

(d) Network Integrity

Security mechanisms also prevent the network from theactive and passive attacks.

(iii). Resource Availability

Security also ensures that the computer resources are available only to the legitimate and the authorized users.

(iv). Authentication

Security also ensures that the authentication of users and the resources is done before initiating any of the transaction.

 Disadvantages/Cons of Providing Security:

Apart from the various advantages of it, the security also has certain disadvantages. They are as follows,

      (i) It quite Expensive

(ii) It is very much Time consuming

(iii)   Additional resource utilization are required in this

(iv) Increased employee count are required in this.

(i)  Expensive

Though security mechanisms protect the, software, hardware data and network from the intruders’ interference, they are quite expensive to implement and maintain.

(ii) Time Consuming

Providing privacy, availability, integrity, authenticity etc., involve number of steps to be taken. Thus, they need an additional time.

(iii) Additional Resource Utilization

The  implementation  of  the  security  mechanisms  includes  utilization  of  the additional bandwidth, memory space, hardware and software for storing, downloading  exchanging and implementing the encryption/decryption procedures.

(iv) Increased Employee/Staff Count

Providing security to the number of applications requires the involvement of more number of high-end professionals, hence, more staff must be employed.


Related Discussions:- For providing the security, what are the pros and cons of it

Calculate the false rejection, Divide the user data into 6 equal sets. Use ...

Divide the user data into 6 equal sets. Use the first set for the enrollment phase of your system, and the rest for the verification phase. Use the following formula to calculate t

Information security policy practices and standards, INFORMATION SECURITY P...

INFORMATION SECURITY POLICY PRACTICES AND STANDARDS Management from all the communities of interest should consider policies as basis for all information security efforts. Polic

Http request message, Question (a) Consider that you enter the subsequent ...

Question (a) Consider that you enter the subsequent URL in the address bar of a popular web client and that both the server and client accepts HTTP version 1.1. i. What can be

Information and network security, Information and Network Security Part ...

Information and Network Security Part 1- Recovery of an encrypted `word' using a forward search attack. Complete and correct summary for part 1. Adequately commented, clea

Routing protocol for a banking network, You have been asked to design a Ban...

You have been asked to design a Banking Network with two primary types of locations.  Branches that will have 3 subnets, one /25 subnet one /26 subnet for ABMS and one /26 s

Packet filtering firewall-stateless packet filtering, Stateless Packet Filt...

Stateless Packet Filtering Stateless or static packet filtering is the most straightforward kind of packet filtering that allows or disallows data transfer based on the addres

Explain the close procurement project process, Question 1: Why do we ne...

Question 1: Why do we need a Law of Contract? a Explanation Reasons to have a law of contract b Explain the close procurement project process - Explanation (causes,

Encryption key size-cryptography, Encryption Key Size When using ciphers...

Encryption Key Size When using ciphers, the size of crypto variable or key is quite important as the strength of many encryption applications and cryptosystems were measured by

Perimeter network security system, Title: Perimeter Network Security System...

Title: Perimeter Network Security System Outline Requirements The University is based in Glasgow, and provides higher education services to its students and staff. It is loc

Describe the process of components identification, Probelm 1: Give the ...

Probelm 1: Give the History and Evolution of Wireless Communication System. Complete explanation Probelm 2: Describe the process of Components Identification and cal

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd