Popular in Course
verified elite notetaker
Popular in Department
This 2 page Study Guide was uploaded by expert Notetaker on Tuesday November 17, 2015. The Study Guide belongs to a course at a university taught by a professor in Fall. Since its upload, it has received 15 views.
Reviews for Security Disadvantages
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 11/17/15
Security Disadvantages While there may be an abundance of reasons in order to implement as many security measures as one could dream of there are drawbacks to some of these implementations As previously stated there are many attack points that a hacker can find in which to infiltrate a corporate network An internal hacker can steal the login and password of a careless employee thereby having unfettered access to company networks under the guise of legitimate work In this case the hacker can steal corporate documents that can be leaked to competitors Outside hackers can gain access via the TCPIP protocol by imitating a legitimate network IP address thereby fooling the corporate servers into thinking the hacker is actually a company workstation Firewalls can be circumvented in this same manner By spoofing a legitimate IP address the firewall is fooled into allowing the hacker entry beyond the firewall Virus can wreak havoc on corporate networks by initiating as a regular program such as svchostexe thereby going undetected as anything harmful by the virus scan program These are but a few of the vantage points that a hacker may take to perform his dirty deeds The question that remains is To what extent is one willing to go to in order to safeguard a network Is there a point where having too many precautions becomes a burden for a network The simplest and most basic security measure to initiate is a user login and password for every user on a corporate network This in theory means that only authorized users will be using corporate resources However this is only as good as the users safeguard their information Careless users will often write their passwords down and leave them taped to the back of their keyboards Any disgruntled employee who has a motive can delete or damage any resource that the stolen ID may have access to Not only that server logs will show that the damage was done by the stolen ID rather than the actual person Encryption is a valuable tool in providing security for sensitive data Network data can easily be intercepted in any number of ways In order to prevent that encryption scrambles the message making it nearly impossible for a person to intercept and decipher However doing so requires a considerable increase in computing power and time The message must be encrypted by the sending computer then sent where the receiving computer must decrypt the message This may seem trivial but on a larger scale the increase requires greater computing power and delays in message delivery thereby necessitating computers of greater scale Computer virus scanning programs are very effective in scanning for most transgressing programs bugs viruses and Trojan programs that are in currently in existence There are a multitude of malicious programs whose sole intent is to wreak havoc on ones network An antivirus program will scan programs for signature lines of code against a known inventory of malicious programs This is very effective but once again there is an increase in the amount of required computing power and the associated delays in computer response time Another possible detractor is that the majority of these programs often require a licensing fee per computer So the larger the business the greater the amount of money the corporation must pay to maintain a certain level of security There are other disadvantages to implementing security measures and they all come down to what a corporation is willing to endure Covering all possible aspects that a hacker may use to infiltrate a network is extensive and takes its toll on a computer systems resources Does the corporation find that the nature of their networks is worth the financial investment to upgrade their hardware and software to secure their networks Or would a corporation rather risk downtime as their network is assaulted on a daily basis More times than not a corporation will seek to ensure they are protected from all forms of attacks especially if it has ever happened before
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'