.

Sunday, May 5, 2019

Computer Networking Research Paper Example | Topics and Well Written Essays - 1250 words

Computer Networking - Research Paper employmentThe discussion further analyses the importance of backup as an operation security strategy that helps avail the entropy stored in the informationbase in case of an external damage.Security is one of the most fundamental factors in the introduction and maintenance of a computer network. This follows the understanding that the information shared on such computer networks is a key asset to the institutions that develop the information system. Computer networks refer to telecommunication networks that permit computers and other uniform media to transfer data indeed enabling communication. The interconnection of computers among other appliances such as telephones, fax machines and printers thus creates an information network that facilitates communication either within the organization or on a big context with third parties outside the organization. The integrity of the data flowing within the information system relies on the security features employed by the information technology department in the organization (Wood, 2010). Security of a computer network requires the incorporation of various technologies as essay below elaborates.Among the various security features use in a network is end-to-end encryption, which is arguably the most effective security tool. While non often considered a security feature, end-to-end encryption is a paradigm that permits data protection done a series of encoding and decoding by appropriate platforms only. This allows for selective access to the information communicated through the network thus maintaining a degree of integrity in the entire communication process. The party that originates the data encrypts to an appropriate format conveyable through the network while the receiving party decrypts the data thereby obtaining the intend message. The process is simple but requires an effective utilization of appropriate resources in order to maintain the fidelity of the data commu nicated in any network. Furthermore, while end-to-end

No comments:

Post a Comment