menu

login

 
user
pw
register
search

language    
 
... welcome to open academic research library project ...


All documents from essays.org are for research assistance purpose only. Do not present the material as your own work!

bookmark & share the essay...

Bookmark and Share
All /

Shervin E, B.Victor Lawrence, Manu Malek, and Binay Suglated (1990) Network Management: Emerging Trends and challenges.

This paper discusses on a journal by Shervin E, B.Victor Lawrence, Manu Malek, and Binay Suglated on Data networking whereby they review a key area of data networking theory. It looks at the Seven Layer Network Model which include: Application, presentation, session, transport, network, data and physical layer.

Details
language english
wordcount 2275 (cca 6.5 pages)
contextual quality N/A
language level N/A
price free
sources 10
Table of contents

none

Preview of the essay: Shervin E, B.Victor Lawrence, Manu Malek, and Binay Suglated (1990) Network Management: Emerging Trends and challenges.

Shervin E, B.Victor Lawrence, Manu Malek, and Binay Suglated (1990) Network Management: Emerging Trends and challenges. In their Journal, Shervin et al discuss Data networking as a critical area of focus in the study of information security. They focus on reviewing a key area of data networking theory - The Open Systems Interconnect (OSI) Seven Layer Network Model. They demonstrate the application of the model’s concepts into the context of information security. This approach in overall, presents the perspective that common information security problems map directly to the logical patterns presented in the OSI Seven Layer Network Model, and they seek to demonstrate the Seven Layer Model’s usefulness in evaluating information ...





... incoming and outgoing data, and assume that communications could and will be subjected to attack, requiring the use of strong authentication and encryption to validate and protect data as it goes across the network. Applications should also implement their
Own security controls, that allows for careful control of privilege to access resources
And data, using a mechanism that is straightforward and bringing a balance
Between usability and effectiveness. Detailed logging and audit capability should be a
Standard feature of any application that handles sensitive or valuable data.
All the levels therefore partner up in the processing to ensure security of the information in the system.
Essay is in categories

 / 

Engineering
 / 
Information Technologies
 / 
Comments
Princess R.

Mind boggling and puzzling but very intriguing!




topbonusesguideshomefaqENIT
terms of use | contact us |  © essays.org - all rights reserved