Network Security Infrastructure Research Paper by scribbler

A discussion of the key concepts and ideas that surround the operation and the laying down of a proper network security infrastructure.
# 152046 | 2,037 words | 9 sources | APA | 2012 | US
Published on Nov 18, 2012 in Computer and Technology (Networks)


$19.95 Buy and instantly download this paper now

Description:

This paper examines how the field of network security has increasingly gained importance due to the sensitive nature of the information being exchanged between different computer networks. This paper explains the various technologies that are employed in order to improve the current and future network security and explores the key causes of concern and the type of attacks to which a network system is exposed to. The paper further investigates the eminent future trends of network security. Some major companies that participate in this area of information technology are also explored as are the regulatory issues that surround the network security domain. The paper concludes by analyzing the global implications of network security.

Outline
Abstract
Introduction
Example Companies involved in Network Security
Bit Armor Securities
Cryptolex Trust Systems
Declude
KoolsSpan
Exploit Prevention Labs
Savant Protection
Regulatory Issues Surrounding the Area
Global Implications for Network Security
Conclusion

From the Paper:

"The BitArmor security was founded in the year 2003 by Mathew White and Patrick McGregor who were undergraduate students at Carnegie Mellon University. They got involved in a thorough research that established their BitArmor Security suite; which would eventually cost them a capital investment of $5 million. They eventually managed to get this starting capital form Clear Water Capital Partners and Draper Triangles Ventures. With its headquarters located in Pittsburgh, they had a very hard time finding a name for their company, since most Greek or Roman god's names were already taken by other companies. They eventually decide to focus on a name that defines the function of their product. Though management of policy is a growing concern with data encryption, BitArmor Securities engages its administrators in data encryption, and creating policy for data storage and retention."

Sample of Sources Used:

  • Schneier,B (1995)Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
  • Wesley,V (2002)Building Secure Software: How to Avoid Security Problems the Right Way
  • Garfinkel ,S (2001) Database Nation: The Death of Privacy in the 21st Century
  • Wyk ,K and Forno,R (2001)Incident Response
  • Kaufman ,C, Perlman ,R and Speciner ,M(1995) Network Security.

Cite this Research Paper:

APA Format

Network Security Infrastructure (2012, November 18) Retrieved November 14, 2019, from https://www.academon.com/research-paper/network-security-infrastructure-152046/

MLA Format

"Network Security Infrastructure" 18 November 2012. Web. 14 November. 2019. <https://www.academon.com/research-paper/network-security-infrastructure-152046/>

Comments