Tuesday, August 27, 2019
Company Security Essay Example | Topics and Well Written Essays - 2000 words
Company Security - Essay Example The needs of users ofà the data provided via a network and subsequently develop a security policy and plan that addresses the security issues concerned (Langer, 2001). The ensuing distribution of data in client or server networks leads to increased susceptibility of the system to fraud, damage by malicious software, misuse, as well as physical damage. With business organizations and their stakeholders developing complex networks, security issues become a key factor of consideration. The security systems developed by such organizations must seek to protect all areas of concern across the network to prevent the occurrence of unethical practices in relation to the information flowing through the system. The value of security in a client/server network plays an inevitable role in protecting the data, as well as the ethical concerns of the parties involved thus, requiring the development of a comprehensive network security policy as reviewed in this context and with reference to ZXY Cor poration. In order to enhance secure access control over the network, the company can apply advanced authorization, as well as access control methodologies that would subsequently enhance network security. The interrelated methods of user authentication and authorization that are applicable will depend on the sensitivity of the section of the network and the information that may be accessible. Shared resources in the network are available for all the users except the resource owner. As such, the security system needs to protect such information from unauthorized access and use. In the networkââ¬â¢s access control framework, unique security identifiers (SIDs) may embody the users in the system, and they are subsequently assigned permissions and rights that provide information to the operating system concerning what each of the users can do in the system. Each of the resources in the network has a designated owner who grantsà permissionà to users. In
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.