Network Security Plan for Excellence University Online Library

Document Type:Research Paper

Subject Area:English

Document 1

Network security requires authorization for a user to access the network under the control of the network administrator. The administrator ensures only authenticated individuals have access the network and that the firm’s databases are protected for confidentiality purposes (Zissis& Lekkas, 2012). It outlines daily operations that offer a secure and robust management environment. These practices will help to protect universities’ reputations, secure operations, and reputation in compliance with the international library standards. Features of an Effective Network Security Plan A network security plan should define users that are allowed to access and retrieve an organization’s data. It means that the information housed by a firm must remain as a private as possible (Zissis& Lekkas, 2012). On one hand, this requires an access of authenticated individuals.

Sign up to view the full document!

On the other hand, it should be the responsibility of the IT administrator to protect the information of other users. The integrity of the system and non-repudiation all elements that improve the reputation of the network security of an organization. These features of a network security are not only important for the protection and monitoring of the system use but also, for the privacy reasons. It requires a network of computers that store massive data and software that enhances its security. Additionally, there is a need of employing experts in IT system to manage a network security, which all attracts execution of substantial amounts of the firm’s resources. Secondly, some networks are difficult to access or retrieve information, making them consume more time of the user.

Sign up to view the full document!

From $10 to earn access

Only on Studyloop

Original template

Downloadable