.

Tuesday, July 23, 2019

606 week 1 Assignment Example | Topics and Well Written Essays - 250 words

606 week 1 - Assignment Example For example, if someone is involved in criminal operations and security agents feel that getting into his system without his permission maybe the way to get evidence against him then that will be ethical. Also, if a company suspects something wrong is going on with its network then it maybe ethical to investigate the network connected to its network ( Bejtlich, 2003) . Ethical hacking is a good practice as it helps companies to enhance security of their computer system. Without proper audit of the computer system no real computer security exist. However, the certificate must be issued with a lot of caution and the authorized hackers should testify up on oaths. A Defensive Network Architecture is an information planning for the network security system which is well maintained and controlled and very closely monitored to identify weaknesses in the system (McClure et al., 1999). This architecture must be up to date to resist current forms of attack. Defensive network architect is important mostly for large organization since it helps to monitor their networks. Network monitoring also assist in evaluating environmental changes (McClure et al., 1999). For example, when there is an increase or decrease in traffic and assets which are currently maintained and secured. Our organization have an architecture in place which they use to control and monitor their security system. Since it is an organization which deals with confidential documents, this helps to secure their data. In conclusion, defensible network has become so important that on 14th March, 2014, Scott Air Force Base III marked a major progression when they signed a department of Defenses Joint Information Environment (Shelly, 2014). Shell, Petruske (2014) Cyberspace milestone reached for Air Force Network. Retrieved on 8th April, 2014

No comments:

Post a Comment