StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Microsoft Word : - Research Paper Example

Cite this document
Summary
Network security was identified as the mechanism for the protection of computer networks from different sorts of threats. Some core issues…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.9% of users find it useful
Microsoft Word Research Paper:
Read Text Preview

Extract of sample "Microsoft Word :"

RESEARCH goes here] [Your goes here] [Your college In this paper, the issue of network security was discussed toknow its importance, as well as some main threats associated to networks. Network security was identified as the mechanism for the protection of computer networks from different sorts of threats. Some core issues related to network security were identified and discussed. Those issues included the risks and negative aspects associated with the mechanisms of authentication, access types, and authorization.

Network Security Network security is the mechanism for the protection of computer networks from different sorts of threats. Network security works by identifying the potential threats to the network and applying the most appropriate measures to deal with the identified threats. It is a fact that current mechanisms of network security are not able to handle the threat of network attacks properly which mainly occurs through worms and viruses. Worms and viruses are considered two of the main threats to computer networks (Thomas & Stoddard, 2012, p. 293). Although computer science professionals have developed suitable mechanisms to reduce the occurrences of virus and worm attacks, yet they need to deal with the information theft issue, which is one of the main network security concerns these days.

Software-Defined networking is one of the main mechanisms that can be used in the future to improve the security of networks (Fehr, 2013, p. 17).Some of the main mechanisms related to network security include authentication, access types, and authorization.Authentication Authentication is the process of recognizing accesses to a network (Ciampa, 2012, p. 367). Authentication of the users is still a major issue related to network security. Sometimes networks fail to correctly recognize unregistered users which results in creating security risks for the network.

Access Types Access types means mechanisms to access information from the network. One can access the information from the network using WIFI-Protected Access. However, hacker attempts on such networks can be harmful for the security of data being sent onto the network. Authorization Authorization makes use of file permissions which are the lists of users allowed to access the network. Sometimes file permissions become unable to differentiate between authorized and unauthorized users as the result of which hacker and virus attacks may occur on the network.

Summing it up, network security is one of the critical issues related to the field of computer science. IT professionals need to resolve this issue properly in order to enhance network security and improve user experience.ReferencesCiampa, M. (2012). Security+ Guide to Network Security Fundamentals (4th ed.). Boston: Cengage Learning.Fehr, S. (2013). Flexible networks for better security. Network Security, 2013(3), 17-20.Thomas, T., & Stoddard, D. (2012). Network Security First-Step (2nd ed.).

Indianapolis: Cisco Press.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Microsoft Word Research Paper: Paper Example | Topics and Well Written Essays - 250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1622044-microsoft-word-research-paper
(Microsoft Word Research Paper: Paper Example | Topics and Well Written Essays - 250 Words)
https://studentshare.org/information-technology/1622044-microsoft-word-research-paper.
“Microsoft Word Research Paper: Paper Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1622044-microsoft-word-research-paper.
  • Cited: 0 times

CHECK THESE SAMPLES OF Microsoft Word Research Paper:

Entering the Age of Controller-Free Interactive Technology

A tiny built-in fan turns on in demand when Kinect assesses a hot environment when the heat produced by the the three sensors and the atmosphere around it mix to create conditions warmer than microsoft would like (Gizmodo, 2010).... Accessibility microsoft is an organization committed to serving people of all kinds of abilities.... microsoft is working to improve the system's skeletal tracking technology.... Now, three gaming consoles dominate the market namely Nintendo Wii, Sony Play Station 3 and microsoft's Xbox 360....
10 Pages (2500 words) Research Paper

The Difference between Office Automation System and Knowledge System

In this scenario, the system makes use of inbuilt modules that facilitate clients to change information, data, and image characteristics by means of an interface extremely related to the one offered by "Microsoft Word".... In other words, anybody who knows how to use microsoft Windows and can browse the internet will have no problem with this system.... In other words, anybody who knows how to use microsoft Windows and can browse the internet will have no problem with this system....
3 Pages (750 words) Research Paper

A Detailed Analysis of the OpenOffice

In this scenario, one of the key applications is word processor application for creating documents.... This paper presents an overview of the open source application.... For this research, the author chose OpenOffice software application which fundamental objective is to develop a superlative office suite, which is accessible to all....
5 Pages (1250 words) Research Paper

Types of Network Attacks

After identifying the IP address by IP Address Spoofing, the attacker next proceeds to modifying or deleting important data (microsoft TechNet, 2012).... This research paper aims to identify the types of network attacks and discuss them with the help of research so that it becomes clear which types are prevalent and what precautionary measures need to be taken by the government and public as a defense mechanism....
4 Pages (1000 words) Research Paper

History of the Stuxnet Worm

microsoft found a way to fix this vulnerability with MS10-061 which varies in risk from one type of windows to another.... 2 October 2012.... Research Paper: The Stuxnet Worm History of the Stuxnet Worm A security company named VirusBlokAda first identified the Stuxnet worm around the mid of June in 2010....
5 Pages (1250 words) Research Paper

Microsoft Word Funtionality

Microsoft Word is one of the most popular and well-used productivity softwares available to Microsoft/PC users, though it also has a version that has been adapted for Macintosh operating systems.... Microsoft Word is at a high demand for anybody that owns a computer or is a… The interface of Microsoft Word is so simple that even computer novices are able to work their way around the various features and functions that the program has to offer, providing them with many Microsoft Word functionality July 5, Teacher Microsoft Word functionality Microsoft Word is one of the most popular and well-used productivity softwares available to Microsoft/PC users, though it also has a version that has been adapted for Macintosh operating systems....
2 Pages (500 words) Research Paper

Research a Healthcare Facility along with a Information System (IS) used at this facility

In order to meet the requirements of MedStar Health professionals and also reduce the resources and costs needed to run an international healthcare organization, the health facility adopted a hospital information system called microsoft Amalga (also known as Azyxxi) (microsoft Corporation, 2008)....
5 Pages (1250 words) Research Paper

Active Directory - a Contemporary Network Management Techniques

Mostly large organizations handle right of entry to their employee network and security policies by means of microsoft Active Directory.... The project “Active Directory - a Contemporary Network Management Techniques” discusses a development and implementation of the tool which allows handling assign rights and security parameters....
5 Pages (1250 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us