Standards, Ethics and Compliance in Network Security: A Report

Verified

Added on  2020/03/28

|6
|1264
|64
Report
AI Summary
This report delves into the multifaceted realm of network security, exploring the critical interplay of standards, ethics, and compliance in contemporary business environments. It examines the evolution of network security from the advent of the internet to the present day, highlighting the increasing complexity of securing information technologies across all aspects of business operations. The report discusses the implementation of game theory for effective security and privacy determination, and analyzes the advantages and challenges of cloud computing in relation to network security, including issues of confidentiality and integrity. It emphasizes the importance of proactive design and implementation to prevent security breaches, especially given the growing vulnerability associated with online mediums. Furthermore, the report underscores the significance of cost-effectiveness and flexibility in network security systems, and highlights the need for organizations to effectively manage security threats and adapt to the evolving landscape of network security.
Document Page
Running head: STANDARDS, ETHICS AND COMPLIANCE
Standards, ethics and compliance
Name of the student
Name of the university
Author note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1STANDARDS, ETHICS AND COMPLIANCE
Reference 1: Manshaei et al. (2013)
This article discussed about the implementation of different theories and concepts on the
network security. According to the author, in the current business scenario, determination of the
issues in the network security is much complicated than ever. This is due to the reason that,
information technologies are being used in every aspects of the current of the current scenario.
Thus, identification of the origination of the issue in the network gets difficult. Thus, according
to the author, it is necessary that various effective concepts and theories should be implemented
in order to determine the network security effectively. This article discussed about the game
theory. According to this article, game theory will help to effectively and accurately determine
the overview of the security and privacy in a particular network.
In the article, game theoretic approaches are being involved along with various other
aspects. The research work is being further divided in to various applications based on the
security and privacy problems. Afterwards, six categories are being initiated, which includes
security of the physical and MAC layers, security of self organizing networks, anonymity and
privacy, intrusion detection system, cryptography and economics of network security. This
article concludes that, effective implementation of the game theory will help to determine the
network security more effectively.
Reference 2: Ren, Wang and Wang (2012)
This article states the disadvantages of the cloud computing in determining the network
security systems. According to the authors, cloud computing offers huge opportunities for the
business organizations. This is due to the reason that, in the case of the cloud computing, more
numbers of data can be stored in the system and in a more secured manner. Thus, it helps in
Document Page
2STANDARDS, ETHICS AND COMPLIANCE
effectively determining and classifying the complex data management systems. In addition, the
initiation of the cloud computing also helps in reducing the huge cost or investment being
involved in maintaining the network security systems. Another key advantage of cloud
computing being identified in this article is the flexibility. Cloud computing enables the user in
modifying the utility according to the requirement of the organizations.
However, there are various challenges of cloud computing are also being stated in this
article. According to the author, apart from the advantages being possessed by the cloud
computing, there are challenges such as lack of confidentiality and integrity may be faced by the
organizations. This is due to the reason that, in the case of the cloud computing, all the
information is being uploaded in the online portal, which may cause breach of security.
Reference 3: Daya (2013)
This article has given a holistic approach of network security system. This article
discussed about the evolution of the network security from the time of emergence of internet to
the present time. According to the author, emergence of the internet is the key enhancing factor
for the network security systems. This is due to the reason that, in the present business scenario,
the majority of the network systems are being regulated online. Thus, the contemporary approach
of the network system is much more effective as well as efficient for the business organizations.
this article also discussed the importance about the intranet also along with the initiation of the
internet. According to the author, intranet for the internal communication system in the business
organizations also helps in effectively manages the network system. The more will be the
effectiveness in the usage of the internet and other networking tools, the more will be the
effectiveness of the network system.
Document Page
3STANDARDS, ETHICS AND COMPLIANCE
This article concludes that, network security systems faces different types of security
breaches along with other challenges. In addition, in the current business scenario, the emergence
of the online medium in the network support systems is also enhancing the vulnerability of
security breaches for them. Thus, according to this article, the design and the process of
implementation of the network systems will help to enhance and prevent the breaches in the
network security systems.
Abstract
The key motive of this case study is to discuss about the effectiveness of the network
security systems in relation to the past and present business scenario. In this case study, it is
being discussed that, in the current business scenario, majority of the institutions faces
diversified security breaches (Hoque et al. 2012). Thus, it is much difficult for them to identify
the origination of the issue in the particular network security systems. In this case study, various
advantages are also being discussed regarding the effectiveness of the network security systems.
One of the key advantages being identified is the cost effectiveness (Jadeja and Modi 2012). It is
being concluded that initiation of the cloud computing in the network security systems will help
the business organizations in reducing their associated cost (Zissis and Lekkas 2012). Moreover,
another advantage that can be tapped by the business organizations in the case of the cloud
computing is the flexibility. It will help the business organizations in modifying the systems
according to their requirements.
Thus, evaluation of various aspects in this case study helped to conclude that effective
implementation of the network security systems will help the organizations in reducing or
preventing the associated risk with the network systems. Security threats such as breach of the
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4STANDARDS, ETHICS AND COMPLIANCE
privacy and confidentiality should be effectively managed by the organization in order to
maintain their privacy. Thus, it is being concluded that, from the emergence of the internet,
network security systems has evolved radically and the it is important for the business
organizations to effectively adhere with the change.
Document Page
5STANDARDS, ETHICS AND COMPLIANCE
Reference
Daya, B., 2013. Network security: History, importance, and future. University of Florida
Department of Electrical and Computer Engineering.
Hoque, M.S., Mukit, M., Bikas, M. and Naser, A., 2012. An implementation of intrusion
detection system using genetic algorithm. arXiv preprint arXiv:1204.1336.
Jadeja, Y. and Modi, K., 2012, March. Cloud computing-concepts, architecture and challenges.
In Computing, Electronics and Electrical Technologies (ICCEET), 2012 International
Conference on (pp. 877-880). IEEE.
Manshaei, M.H., Zhu, Q., Alpcan, T., Bacşar, T. and Hubaux, J.P., 2013. Game theory meets
network security and privacy. ACM Computing Surveys (CSUR), 45(3), p.25.
Ren, K., Wang, C. and Wang, Q., 2012. Security challenges for the public cloud. IEEE Internet
Computing, 16(1), pp.69-73.
Zissis, D. and Lekkas, D., 2012. Addressing cloud computing security issues. Future Generation
computer systems, 28(3), pp.583-592.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]