network security

         

πŸ‘‰Introduction of network security

Some of us can remember a time when securing a network environment was a far easier task that it seems to be today. As long as every user had a password and the correct levels of file per-missions had been set, we could go to sleeps at night confident that our network environment was relatively secure. This confidence may or may not have been justified, but at least we felt secure, then along came the internet and everything changes. The Internet has accelerated at an amazing rate the pace at which information is disseminated. In this early 1990s, most of us would not hear about a security vulnerability unless it was reported by a major magazine or newspaper. Even then, the news release typically applied to an old version of software that most of us no longer used anyway. These days, hundreds of thousands of people can be made privy to the details of a specific vulnerability in less than an hour.

A system analysis Approach to information technology 

[1]. An introduction to system analysis:-

[2]. Applying system analysis to information technology 

[1]. An introduction to system  analysis:-

system analysis is the formal for the process that  uses system principle to identify, reconstruct. optimize, and control a system. now the trick is you have to be able to walk through that process while taking into account multiple objectives, constraints, and resources. Simple , but what's the point? well ultimately we want to create possible courses of  action, together with their risks, and benefits. And that in a nutshell, is what network security is all about -- choosing among multiple security alternatives to find the best one our system given our constrains (technology or financial typically).

The following are some of these principles.

[1].   Complexity. 

[2]. mutuality.

[3]. complementarity. 

[4]. Evolvability.

[5]. constructivity. 

[6]. reflexivity. 

 

Comments