The information and telecommunications services currently in use within local, national and global economies help facilitate the exchange of data at an unprecedented rate. The utility offered through information technologies has improved productivity and performance within for-profit organisations that have availed themselves of networked infrastructures that promote ease of access, remote access to data and enhanced speed and service. However, these assets also entail potentially damaging outcomes through threats to the network. Problems in network security have emerged from the different priorities that stakeholders have in respect to the data management infrastructure. These priorities are highly subjective and range from increased ease of use to increased limitations placed upon access and every point in between. These priorities are the result of two separate criteria that exist for users of a networked system: first, users want to enjoy efficient and pleasant experiences when using a system; second, users recognise specific risks and associate these with computer networks. Risk management is a significant component of network security, especially in respect to how the prerogatives of any network security system are defined.
History
Start page
237
End page
262
Total pages
26
Outlet
Handbook of Electronic Security and Digital Forensics
Editors
Hamid Jahankhani ,David Lilburn Watson,Gianluigi Me and Frank Leonhardt