Technologies Designed to Secure Networks From Cyber-Attacks Essay

Total Length: 607 words ( 2 double-spaced pages)

Total Sources: 10

Page 1 of 2

Technologies Designed to Secure Networks from Cyber-Attacks

In this paper, I examine different approaches to security designs intended to protect the integrity of the information contained on network databases in light of recent technological developments. Traditionally, network security has been designed either to protect the database of the network or to protect the specific applications that are executed upon the network. However, in the last decade, the implementation of Web services has proliferated, enabling the automated discovery and transfer of information according to various standards. Therefore, the types of exchanges of information have grown in complexity, creating a condition in which different forms of network authorization must be instituted in order to preserve the integrity of the database while allowing for the transfer of multiply defined documents between and among endpoints both within the network and outside of the network. End users, for instance, who interface with aspects of a database through Web services and their applications must be granted specifically tailored permissions so that they can conduct transactions, which are facilitated by APIs both inside and outside of the network, without possessing access to the network in its totality.

Stuck Writing Your "Technologies Designed to Secure Networks From Cyber-Attacks" Essay?

In response to this requirement, the best security practice is a multi-layered design that integrates network-level securities with application-level securities.

Network security has traditionally been conceptualized according to competing models, both of which are designed to protect the information contained on network databases. One approach attempts to protect the information from unauthorized access through securities implemented at the database level; meaning, a layer of security is established, which regulates access to network. This form of security can become rather complex depending upon structure of the database, because securities can be designed to protect its various aspects. Individual cells, for example, can be protected according to specific protocol (McGee, Vasireddy, Xie, Picklesimer,….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Technologies Designed To Secure Networks From Cyber-Attacks" (2011, January 09) Retrieved June 5, 2025, from
https://www.aceyourpaper.com/essays/technologies-designed-secure-networks-cyber-attacks-84013

Latest MLA Format (8th edition)

Copy Reference
"Technologies Designed To Secure Networks From Cyber-Attacks" 09 January 2011. Web.5 June. 2025. <
https://www.aceyourpaper.com/essays/technologies-designed-secure-networks-cyber-attacks-84013>

Latest Chicago Format (16th edition)

Copy Reference
"Technologies Designed To Secure Networks From Cyber-Attacks", 09 January 2011, Accessed.5 June. 2025,
https://www.aceyourpaper.com/essays/technologies-designed-secure-networks-cyber-attacks-84013