Network Security

Network Security



Network Security

Normally, users tend to engage in actions that compromise the level of security that their computer networks possess. Most times, the networks are compromised through the downloading of programs that may contain malicious programs such as viruses and Trojan horses. In addition to this, accessing certain sites without the proper protection by users may enables malicious activities such as hacking, cracking, and eavesdropping to occur. Such activities tend to infringe the privacy of users especially in terms of the information they possess. In this respect, it is important to consider the various mechanisms that can aid users in the protection of their networks. Nowadays, the level of technology continues to progress at an alarming rate forcing malicious persons to modify their attacks on respective networks. Hence, while considering this, the user needs to implement measures that actually comply and acclimatize with recent technological developments. Foremost, firewalls are the safest techniques that users can implement in order to protect their networks. Accordingly, they control the entering and exiting network traffic via an implemented rule set (Cuppens-Boulahia, Cuppens, Autrel, & Debar, 2009). Simply, firewall systems prohibit unauthorized access from or to a private user network. Secondly, anti-malware systems can also aid considerably in the protection of computer networks. Usually, malware systems collect personal information via internet connection without the knowledge of the user. Once they are installed into the computer, they become capable of deploying several well-hidden files such as Trojan horses, spyware, and adware (Cuppens-Boulahia, Cuppens, Autrel, & Debar, 2009). Anti-malware systems can prohibit this by eliminating most of these threats. In addition to this, anti-malware systems can warn the user from accessing sites that may actually contain spyware (Cuppens-Boulahia, Cuppens, Autrel, & Debar, 2009). For instance, certain sites such as music-sharing websites comprise pop-up dialogs whereby a user can answer a question by clicking ‘yes’ or ‘no’. If the user responds to these pop-ups, the browser may initiate a download of an adware or spyware program. As such, anti-malware systems prevent this by cautioning the user from clicking on the pop-up dialogs.


Cuppens-Boulahia, N., Cuppens, F., Autrel, F., & Debar, H. (2009). An ontology-based approach to react to network attacks. International Journal of Information and Computer Security, 3, 280-305.

Calculate your order
275 words
Total price: $0.00

Top-quality papers guaranteed


100% original papers

We sell only unique pieces of writing completed according to your demands.


Confidential service

We use security encryption to keep your personal data protected.


Money-back guarantee

We can give your money back if something goes wrong with your order.

Enjoy the free features we offer to everyone

  1. Title page

    Get a free title page formatted according to the specifics of your particular style.

  2. Custom formatting

    Request us to use APA, MLA, Harvard, Chicago, or any other style for your essay.

  3. Bibliography page

    Don’t pay extra for a list of references that perfectly fits your academic needs.

  4. 24/7 support assistance

    Ask us a question anytime you need to—we don’t charge extra for supporting you!

Calculate how much your essay costs

Type of paper
Academic level
550 words

How to place an order

  • Choose the number of pages, your academic level, and deadline
  • Push the orange button
  • Give instructions for your paper
  • Pay with PayPal or a credit card
  • Track the progress of your order
  • Approve and enjoy your custom paper

Ask experts to write you a cheap essay of excellent quality

Place an order
Verified by MonsterInsights