Thursday, October 17, 2019
Computer Networking Research Paper Example | Topics and Well Written Essays - 1250 words
Computer Networking - Research Paper Example The discussion further analyses the importance of backup as an operation security strategy that helps avail the data stored in the database in case of an external damage. Security is one of the most fundamental factors in the installation and maintenance of a computer network. This follows the understanding that the information shared on such computer networks is a key asset to the institutions that develop the information system. Computer networks refer to telecommunication networks that permit computers and other similar media to transfer data thus enabling communication. The interconnection of computers among other appliances such as telephones, fax machines and printers thus creates an information network that facilitates communication either within the organization or on a larger context with third parties outside the organization. The integrity of the data flowing within the information system relies on the security features employed by the information technology department in the organization (Wood, 2010). Security of a computer network requires the incorporation of various technologies as essay below elaborates. Among the various security features used in a network is end-to-end encryption, which is arguably the most effective security tool. While not often considered a security feature, end-to-end encryption is a paradigm that permits data protection through a series of encoding and decoding through appropriate platforms only. This allows for selective access to the information communicated through the network thus maintaining a degree of integrity in the entire communication process. The party that originates the data encrypts to an appropriate format conveyable through the network while the receiving party decrypts the data thereby obtaining the intended message. The process is simple but requires an effective utilization of appropriate resources in order to maintain the fidelity of the data communicated in any network. Furthermore, while end-to-end
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.