Technological Innovations in Security Over Research Paper

Total Length: 648 words ( 2 double-spaced pages)

Total Sources: 2

Page 1 of 2

This helps the nation to be able to protect its most vital secrets, by having a system that determines how and when information is released.

Identify and discuss at least three modern-day security applications that help both private and public security personnel secure locations and facilities.

Three different security applications that are being currently used include: network, host and anomaly-based protocols. A network-based solution is when you are analyzing the traffic patterns at your servers. This is important, because many unfriendly regimes will often try to conduct cyber attacks as a way to gain access to sensitive information. One way to monitor for this is to analyze the traffic patterns, where you are looking for unusual spikes. This will tell an organization early, if they are being targeted. A host-based protocol is when you are watching user logins and the kind of pages that people are visiting.

Stuck Writing Your "Technological Innovations in Security Over" Research Paper?

In this case, security personnel want to identify anything that could be suspicious (i.e. A hacker obtaining a user name and password). Anomaly-based solutions are when you are looking for unusual changes to consistent patterns. This would include everything ranging from: unusual activity at a server to receiving strange phone calls. The basic idea is to combine all of the different security solutions together to: identify if a possible physical or virtual threat exists. ("Maximum Security," 2003, pp. 235- 242)

Clearly, the overall nature of the threat facing most organizations has been continually changing. Part of the reason for this, is because many unfriendly regimes have begun to: target various government and military infrastructure projects. As a result, the tactics that are being utilized to defend against these kinds of challenges has been continually shifting......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Technological Innovations In Security Over" (2011, May 08) Retrieved July 1, 2025, from
https://www.aceyourpaper.com/essays/technological-innovations-security-44423

Latest MLA Format (8th edition)

Copy Reference
"Technological Innovations In Security Over" 08 May 2011. Web.1 July. 2025. <
https://www.aceyourpaper.com/essays/technological-innovations-security-44423>

Latest Chicago Format (16th edition)

Copy Reference
"Technological Innovations In Security Over", 08 May 2011, Accessed.1 July. 2025,
https://www.aceyourpaper.com/essays/technological-innovations-security-44423