Sunday, June 9, 2019

606 week 1 Assignment Example | Topics and Well Written Essays - 250 words

606 week 1 - Assignment ExampleFor example, if someone is involved in criminal operations and security agents feel that getting into his arranging without his permission maybe the way to get evidence against him then that will be ethical. Also, if a company suspects something ravish is going on with its network then it maybe ethical to investigate the network connected to its network ( Bejtlich, 2003) .Ethical hacking is a good practice as it helps companies to enhance security of their computer system. Without proper audit of the computer system no real computer security exist. However, the certificate must be issued with a lot of caution and the authorized hackers should testify up on oaths.A defensive attitude Network Architecture is an information planning for the network security system which is well maintained and controlled and very closely remindered to identify weaknesses in the system (McClure et al., 1999). This architecture must be up to date to resist current forms of attack. Defensive network architect is important mostly for large organization since it helps to monitor their networks. Network monitoring also assist in evaluating environmental changes (McClure et al., 1999). For example, when there is an gain or decrease in traffic and assets which are currently maintained and secured. Our organization have an architecture in place which they use to control and monitor their security system. Since it is an organization which deals with confidential documents, this helps to secure their data.In conclusion, defensible network has become so important that on 14th March, 2014, Scott Air pierce origination III marked a major progression when they signed a department of Defenses Joint Information Environment (Shelly, 2014).Shell, Petruske (2014) Cyberspace milestone reached for Air Force Network. Retrieved on 8th April, 2014

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.