Saturday, June 27, 2020

Security and Privacy Architecture Essay - 275 Words

Security and Privacy Architecture (Essay Sample) Content: Security and Privacy ArchitectureName:Institution: This is the creation of an information channel that allow flow and dissemination of information within and without the organization environs without breach or leakage of the information. In ensuring that the information is safe, several measures need to be put in place. Through the formations of the three layers namely, service management, element management and network management layers the organization can ensure that authorization to access the companies system is granted to companys personnel only. Further, they will control the people who can modify the information. The first security mechanism to be employed is the use of signature in emails. The signatures will ensure that the disseminated information is only accessible to the intended recipient. To access the companys system use of passwords and codes should also be used, locking out the outsiders from accessing the companys information. The information is ex posed to a lot of threats one of them being exposed to unwanted programs, viruses worms and malware. The likelihood of such threat is very high since there is a lot of networking and it may be tricky to control the traffic of all the information at all levels of communication. As a result of the above mentioned, the company is forced to invest in anti viruses. In addition, to ensure unauthorized person do not access the companys system, use of a subnet firewall is employed. The firewall will work in such a way that it filters, regulate, control and manage the network traffic be it inbound or outbound. There is a close relationship between privacy and security mechanism; because it through the implementation of the privacy mechanism that that security is enhance hence the two ate intertwined. The two are also related to other architectural components, since the infrastructure is designed in such a way that, it ensures that there is no exposure of the disseminated information to unaut horized persons. My rational for choosing the network management architecture is pegged on several reasons. The...

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.