Information Technology Management Review

Network Security Management

From the onset, it is important to note that for data to flow from one computer to another, such computers should be interconnected in what is referred to as a network. With such interconnectedness comes the risk of data interception and it is for this reason that network security is considered crucial.

Don't use plagiarized sources. Get Your Custom Essay on
Information Technology Management Review
Just from $9/Page
Order Essay

In the recent past, the number of corporations that have experienced attacks on their computing resources has been on the increase. Outages in this case have ranged from denial-of-service-attacks to viruses to other more sophisticated forms of attack. It is important to note that these attacks, which are rarely publicly acknowledged by the affected companies, are coming at a time when organizations are increasingly becoming dependent on information systems and networks to conduct their business. Today, business communications between an entity and the various groups of stakeholders, including but not limited to employees and customers, are primarily done or carried out through networks. Any disruption on these networks could be potentially catastrophic for individual firms.

It should also be noted that organizations stand to lose should an individual gain access to their networks and computer systems. In that regard, therefore, network security management is of great relevance to companies that wish to safeguard their most important and critical resources. A discussion highlighting the key benefits of network security management is, therefore, both relevant and timely.

The Importance of Network security Management


During the past few years, the internet has evolved greatly. Computer networks have also grown in terms of size, complexity, and relevance. Essentially, it is these changes that have triggered the emergence of a new breed of cyber criminals and other malicious individuals who are constantly on the lookout for ways of compromising vulnerable networks. This text largely concerns itself with the importance of network security. In so doing, it will amongst other things define network security and briefly discuss how network security management has evolved over time. The text will also address the implementation of an effective network security management strategy.

What is Network Security?

For purposes of this discussion, it is the definition that Richardson and Thies (2012) give to a network that will be utilized. According to the authors, a network is essentially “an interconnection of two or more computers with some means of sending messages back and fourth” (Richardson and Thies, 2012, p. 389) Given the role they play in the facilitation of remote access, networks tend to be specifically vulnerable to remote attacks and acts of sabotage. Network security comprises of all those initiatives and measures embraced by an entity in a bid to protect its network. Such initiatives and measures essentially protect not only the integrity but also the reliability and usability of data. Network security management, therefore, seeks to offer protection to the network from both misuse and unauthorized access.

Network Security Management and its Relevance

Before addressing the importance of network security management, it would be prudent to first highlight how network security management has evolved over time. The move to embrace effective network security strategies has been fueled by the increasing instances of theft and misuse of sensitive organizational data over networks. Indeed, many companies have in the past lost millions (mostly in silence) to hackers. It should, however, be noted that although interest in network security seems to have spiked within the last one decade, specific incidents in the early 90s may have convinced businesses that there was indeed need for a comprehensive network security policy.

The 1986 Computer Fraud and Abuse Act was created after it emerged that crimes relating to the use of computers to commit fraud and other related activities were on the increase (Senft, Gallegos, and Davis, 2012). However, as Senft, Gallegos, and Davis (2012, p. 11) further point out, despite being created to “protect against attacks in a network environment,” the act did have several weaknesses and faults. It is important to note that it is at around this time that authorities were beginning to come to terms with the theft of crucial information from military computers. Some of those who were either accused or convicted of computer related crime during this period include but they are not limited to Robert Morris and Ian Murphy. Later on, just as the world was coming to terms with how costly network security failures could become — primarily following the release of the Morris Worm, the U.S. Government orchestrated the formation of a response team that was essentially charged with responding to computer risk incidences. The said team was christened CERT — Computer Emergency Response Team (Wang and Ledley, 2012). It should, however, be noted that regardless of the measures that were being put in place, network security concerns continued to increase in the 1990s, after the internet became widely available to members of the public.

As I have already pointed out elsewhere in this text, it was during this decade that businesses begun to adopt far-reaching measures aimed at protecting their computing infrastructure from network attacks. In the recent past, many network security breaches have cost organizations billions of dollars. Some of the said breaches are never reported in the media.

In the words of Canavan (2001), “network and computer security is crucial to the financial health of every organisation.” This according to the author is more so the case given the increasing number of network security incidents being reported in the media on a daily basis not only across the nation but across the world as well. Indeed, within the past two decades, network security incidents have significantly increased, thus effectively validating the central claim made in this text: that the relevance of network security management cannot be overstated. From the onset, it should be noted that network security management comes in handy in the prevention or aversion of losses arising from misuse of data. In the absence of adequate network security management approaches, data manipulation, destruction and breaches of confidentiality would most likely be common occurrences.

In the year 2000, a report on network attacks pointed out that companies would lose close to $1.6 trillion in hacking and other network attack incidents. According to Canavan (2001), whichever way one looks at it, this “is a staggering amount of money with a direct effect on companies’ return on investment or assets.” It is important to note that the said report was released approximately thirteen years ago. Today, companies continue to lose billions of dollars to credit card thieves, hackers, and other individuals (or entities) of shadowy character who take advantage of system and network vulnerabilities to steal customer private information, stall organizational operations, or spy on competitors. As a matter of fact, and as I will demonstrate shortly by making use of real life examples and occurrences, network security breaches can be particularly expensive. In addition to suffering financial losses, businesses that fall victim to network security breaches could have their operations severely disrupted. The said business disruptions are more likely than not to negatively affect productivity. By extension, this could have a negative impact on the bottom-line.

One classic example of a business that has been there, and lived to tell the story, is Sony. Sony has been one of the dominant players in the electronics marketplace for decades. According to Richardson and Thies (2012, p. 366), in what came to be popularly referred to as the Sony PlayStation Network Attack back in the year 2011, attackers made use of what in the authors’ own words was a “potentially known vulnerability” to access the records of scores of the Sony PlayStation Network customers. As the authors further point out, “at stake were the records of possibly 70 million users’ credit card information….” (Richardson and Thies, 2012, p. 366). Thanks to the said attack, Sony was forced to suspend the Network for a total of 24 days. Further, as a result of the entire debacle, Sony is said to have lost millions (and possibly billions) of dollars. Sony according to Tassi (2011) acknowledged a total loss of $170 million. It is, however, important to note that some analysts have speculated that this figure could have been much higher — perhaps close to a billion dollars. In this particular case, the effective management of network security could have saved Sony from the financial mess it found itself in thanks to the PS Network outage.

Still on financial losses, it is important to note that failure to have in place an effective approach to network security management could expose a company to legal suits. Indeed, it is important to note that many businesses have in the past been sued for failure to embrace effective security measures. Court action in this case could come from the affected customers or the relevant regulatory authorities. For instance, following the Sony PS Network attack, authorities in the UK deemed it fit to fine the technology company a total of $396,100 for what it termed a preventable breach. According to the BBC (2013), in fining the company, UK’s Information Commissioner’s Office (ICO) maintained that the hacking incident “could have been prevented” (BBC, 2013). This, again, goes a long way to demonstrate just how important it is to have in place appropriate and effective network security management initiatives and measures. As I have already pointed out, customers could also sue a company for negligence. This is particularly the case should their private or personal information be compromised as a result of an avoidable network attack. For instance, to use the case of Sony again, the company according to Malcom (2012) ended up having a total of 55 lawsuits (in the U.S. alone!) as a result of the PlayStation Network hacking debacle. Again, it is not difficult to see why effective network security management plays a very important role in the protection of client data, and hence in the reduction of the risk of legal action resulting from the exposure or theft of such data.

It should also be noted that in some instances, a business could have its reputation severely soiled as a result of just a single instance of security breach. As I have already pointed out elsewhere in this text, most businesses chose not to report cases of network attacks. The motivation for this kind of behavior could come from a variety of quarters. For instance, according to Finkle and Hosenball (2014), a number of retailers experienced security breaches on their networks last year alone. Some of the well-known retailers who fell victim to the said attacks include Neiman Marcus and Target Corp. However, as Finkle and Hosenball (2014) points out, and rightly so, these were not the only business enterprises to be on the receiving end. In the words of Finkle and Hosenball (2014), the two companies “are not the only U.S. retailers whose networks were breached over the holiday shopping season last year….” One of the reasons as to why most businesses fail to publicly acknowledge network attack instances is fear of possible backlash from various stakeholders. As Finkle and Hosenball (2014) further point out, most business entities fear that the said disclosures could in some way hurt their business operations. For instance, as the authors observe, Target points out that the disclosure of the 2013 network attack prompted numerous inquiries from investors and journalists. It is, however, important to note that going forward, companies will be compelled to report all instances of data breach. According to Finkle and Hosenball (2014), quite a number of states now require that entities that have experienced network attacks leading to the exposure of client information should contact the affected customers. A single instance of network breach could seriously erode the confidence customers have on the affected company. It therefore beats logic as to why a business would choose not to embrace sound network security management practices in the face of constant threats and possible losses.

In an increasingly competitive business environment, it has become necessary for businesses to secure that information which they deem proprietary. Such information could relate to supplier deals, customer sourcing methods, future approaches to competition, new service and product releases, etc. Should organizations fail to have in place sufficient and effective network management policies in place, competitors can easily get hold of such information and use it against the affected businesses. In a bid to get rid of their rivals in the marketplace, some competitors could also try to sabotage the networks of their competitors — real or perceived. Given that quite a number of businesses conduct their businesses online, thanks to ecommerce, acts of sabotage on networks could spell doom for the affected businesses. Network security management significantly reduces the risk of such theatrics.

Today, computer networks have become rather commonplace as businesses position themselves to benefit from the convenience such networks provide; i.e. with regard to file sharing and communication. It is therefore likely that as business entities further strive for full automation, networking will become an imperative. If they are to continue being in operation, businesses must take the issue of network security management seriously. This is particularly the case given that organizations are increasingly making use of the internet and intranets to transfer volumes of sensitive information. Networks making use of, or utilizing internet links, are seen as being far more cost effective in comparison to dedicated leased lines.

Implementation of an Effective Network Security Management Strategy

Based on the discussion above, with regard to the relevance of network security management, it would be prudent to highlight (in brief) the best approach businesses could take in the implementation of sound network security management strategies. To begin with, all network activities and components must in this case be secured through the application of various policies relating to authorization and authentication. Network activity must also in this case be constantly monitored and the relevant safeguards erected. The relevance of tests to assess network security policy vulnerabilities cannot also be overstated. Assessments could in this case be conducted in a number of ways. For instance, the organization could invite a trusted entity to attack its network. Such entities/individuals are commonly referred to as white hat attackers. Such an attacker according to Wang and Ledley (2012) “breaks security for non-malicious reasons.” A white hat attacker could therefore be distinguished from a black hat attacker, in which case the latter seeks to violate the security of a computer for personal gain or pure malice (Wang and Ledley, 2012). Should the safeguards in place be deemed to be ineffective, the organization should immediately implement safeguards that are more stringent and effective.

A good network security management strategy must also be dynamic and flexible. Further, the concerned entity must ensure that the safeguards in place are reviewed, tested, and maintained on a regular basis. It is important to note that attackers are typically persistent. They also constantly update their approaches and methods of attack. In that regard, therefore, it is not enough to have in place safeguards that are neither maintained nor reviewed or tested — as they will most likely be breeched.

Thanks to the growing sophistication of network attacks, businesses must not also shy away from investing heavily on both the equipment and personnel necessary to protect critical organizational resources from being exposed, misused, or damaged as a result of a network attack. According to Canavan (2001), “in general, businesses spend money on computer and network security only when they have to.” This is sad given that as I have demonstrated elsewhere in this text, a single instance of attack could seriously affect a company’s financial standing and reputation. Further, as I have also noted in the earlier sections of this text, cyber attacks have already caused significant damage to companies in the U.S. (and across the world) in the past. By extension, such attacks also threaten the economic competitiveness of our country across the globe. All the relevant players, including the relevant government agencies, must therefore be involved in efforts bring down the number of cyber attacks taking place across nation.

Disclosures should also be treated as part and parcel of effective network security management initiatives. More companies must therefore be ready to disclose instances of attacks on their networks going forward. In my opinion, in addition to helping others identify the pervasiveness of the problem, this will come in handy in the development of effective mechanisms and strategies to defeat attackers. Although the said disclosures could have a temporal impact on the affected business entity’s reputation in the market, they are the only effective “learning avenues” in these very interesting (and perhaps confusing) technological advancement times.

It should be noted that it is not possible for a business entity to eliminate all the threats and problems related to network security. Additionally, the implementation of network security management strategies could come across as being burdensome in some cases. In addition to affecting the flexibility of operations, network security could also hinder quick and convenient access of organizational files and data. This should be seen as an unavoidable flipside of network security.

The most important thing for businesses operating in today’s business environment to understand is that solutions that seem effective today may not necessarily be effective or provide adequate protection tomorrow. This is more so the case given that as technology further advances, so does the sophistication of attacks. Indeed, as I have already pointed out elsewhere in this text, attackers are continuously varying their techniques. Essentially, an effective network security management strategy should be made up of preventive, detection, and response strategies. Prevention has largely got to do with encryption, firewalls, and effective access controls. One other hand, detection involves the installation of an effective detection intrusion system, conduction of audit logs, and constant testing and evaluations.

Lastly, we have response, in which case a business entity should, amongst other things, have effective and reliable backup measures. Businesses should also constantly keep themselves updated on the various kinds of threats they face in the digital environment. According to Richard and Thies (2012), there are four common network attack scenarios. These according to the authors include sniffing or snooping, IP address spoofing, password attacks, denial of service attack, and man-in-the-middle attack (Richard and Thies, 2012). However, essentially, there are two main categories of threats to network security that businesses should (and must) be aware of. These include resource attacks and logic attacks. A logic attack according to Cole, Krutz, and Conley (2005, p. 559) involves the use of a logic bomb which in the words of the authors “is a malicious code that is appended to an application and is triggered by a specific occurrence, such as a logical condition…” They are in most cases designed to exploit system weaknesses. Weaknesses in this case could include but they are not limited to backdoors and software vulnerabilities. Resource attacks on the other hand seek to collapse network resources by amongst other things flooding servers with an unusually high volume of service requests.


In conclusion, it should be noted that the elimination of all network security problems is virtually impossible. This is particularly the case given that as I have already pointed out, as technology continues to advance, approaches to network security that were considered effective today may not be as effective tomorrow. Further, individuals with ulterior motives continue to work even harder as they seek (and some times find) vulnerabilities and ways of going round the network security measures already in place. It should, however, be noted that in a bid to minimize instances of network security breaches, organizations should make it expensive and quite difficult for intruders to break through the security mechanisms in place.


BBC. (2013). Sony Fined Over ‘Preventable’ PlayStation Data Hack. BBC. Retrieved from

Canavan, J.E. (2001). Fundamentals of Network Security. Norwood, MA: Artech House.

Cole, E., Krutz, R.L. & Conley, J. (2005). Network Security Bible. Indianapolis, IN: John Wiley & Sons.

Finkle, J. & Hosenball, M. (2014). Exclusive: More Well-Known U.S. Retailers Victims of Cyber Attacks — Sources. Reuters. Retrieved from

Malcom, J. (2012). Consumers in the Information Society: Access, Fairness and Representation. Kuala Lumpur, Malaysia: Consumers International.

Richardson, T. & Thies, C.N. (2012). Secure Software Design. Burlington, MA: Jones & Bartlett Publishers.

Senft, S., Gallegos, F. And Davis, N. (2012). Information Technology Control and Audit (4th ed.). Boca Raton, FL: CRC Press.

Tassi, P. (2011). Sony Pegs PSN Attack Costs at $170 Million, $3.1B Total Loss for 2011. Forbes. Retrieved from

Wang, S.P. & Ledley, R.S. (2012). Computer Architecture and Security: Fundamentals of Designing Secure Computer Systems. New York, NY: John Wiley & Sons.

Get Professional Assignment Help Cheaply

Buy Custom Essay

Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?

Whichever your reason is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.

Why Choose Our Academic Writing Service?

  • Plagiarism free papers
  • Timely delivery
  • Any deadline
  • Skilled, Experienced Native English Writers
  • Subject-relevant academic writer
  • Adherence to paper instructions
  • Ability to tackle bulk assignments
  • Reasonable prices
  • 24/7 Customer Support
  • Get superb grades consistently

Online Academic Help With Different Subjects


Students barely have time to read. We got you! Have your literature essay or book review written without having the hassle of reading the book. You can get your literature paper custom-written for you by our literature specialists.


Do you struggle with finance? No need to torture yourself if finance is not your cup of tea. You can order your finance paper from our academic writing service and get 100% original work from competent finance experts.

Computer science

Computer science is a tough subject. Fortunately, our computer science experts are up to the match. No need to stress and have sleepless nights. Our academic writers will tackle all your computer science assignments and deliver them on time. Let us handle all your python, java, ruby, JavaScript, php , C+ assignments!


While psychology may be an interesting subject, you may lack sufficient time to handle your assignments. Don’t despair; by using our academic writing service, you can be assured of perfect grades. Moreover, your grades will be consistent.


Engineering is quite a demanding subject. Students face a lot of pressure and barely have enough time to do what they love to do. Our academic writing service got you covered! Our engineering specialists follow the paper instructions and ensure timely delivery of the paper.


In the nursing course, you may have difficulties with literature reviews, annotated bibliographies, critical essays, and other assignments. Our nursing assignment writers will offer you professional nursing paper help at low prices.


Truth be told, sociology papers can be quite exhausting. Our academic writing service relieves you of fatigue, pressure, and stress. You can relax and have peace of mind as our academic writers handle your sociology assignment.


We take pride in having some of the best business writers in the industry. Our business writers have a lot of experience in the field. They are reliable, and you can be assured of a high-grade paper. They are able to handle business papers of any subject, length, deadline, and difficulty!


We boast of having some of the most experienced statistics experts in the industry. Our statistics experts have diverse skills, expertise, and knowledge to handle any kind of assignment. They have access to all kinds of software to get your assignment done.


Writing a law essay may prove to be an insurmountable obstacle, especially when you need to know the peculiarities of the legislative framework. Take advantage of our top-notch law specialists and get superb grades and 100% satisfaction.

What discipline/subjects do you deal in?

We have highlighted some of the most popular subjects we handle above. Those are just a tip of the iceberg. We deal in all academic disciplines since our writers are as diverse. They have been drawn from across all disciplines, and orders are assigned to those writers believed to be the best in the field. In a nutshell, there is no task we cannot handle; all you need to do is place your order with us. As long as your instructions are clear, just trust we shall deliver irrespective of the discipline.

Are your writers competent enough to handle my paper?

Our essay writers are graduates with bachelor's, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college degree. All our academic writers have a minimum of two years of academic writing. We have a stringent recruitment process to ensure that we get only the most competent essay writers in the industry. We also ensure that the writers are handsomely compensated for their value. The majority of our writers are native English speakers. As such, the fluency of language and grammar is impeccable.

What if I don’t like the paper?

There is a very low likelihood that you won’t like the paper.

Reasons being:

  • When assigning your order, we match the paper’s discipline with the writer’s field/specialization. Since all our writers are graduates, we match the paper’s subject with the field the writer studied. For instance, if it’s a nursing paper, only a nursing graduate and writer will handle it. Furthermore, all our writers have academic writing experience and top-notch research skills.
  • We have a quality assurance that reviews the paper before it gets to you. As such, we ensure that you get a paper that meets the required standard and will most definitely make the grade.

In the event that you don’t like your paper:

  • The writer will revise the paper up to your pleasing. You have unlimited revisions. You simply need to highlight what specifically you don’t like about the paper, and the writer will make the amendments. The paper will be revised until you are satisfied. Revisions are free of charge
  • We will have a different writer write the paper from scratch.
  • Last resort, if the above does not work, we will refund your money.

Will the professor find out I didn’t write the paper myself?

Not at all. All papers are written from scratch. There is no way your tutor or instructor will realize that you did not write the paper yourself. In fact, we recommend using our assignment help services for consistent results.

What if the paper is plagiarized?

We check all papers for plagiarism before we submit them. We use powerful plagiarism checking software such as SafeAssign, LopesWrite, and Turnitin. We also upload the plagiarism report so that you can review it. We understand that plagiarism is academic suicide. We would not take the risk of submitting plagiarized work and jeopardize your academic journey. Furthermore, we do not sell or use prewritten papers, and each paper is written from scratch.

When will I get my paper?

You determine when you get the paper by setting the deadline when placing the order. All papers are delivered within the deadline. We are well aware that we operate in a time-sensitive industry. As such, we have laid out strategies to ensure that the client receives the paper on time and they never miss the deadline. We understand that papers that are submitted late have some points deducted. We do not want you to miss any points due to late submission. We work on beating deadlines by huge margins in order to ensure that you have ample time to review the paper before you submit it.

Will anyone find out that I used your services?

We have a privacy and confidentiality policy that guides our work. We NEVER share any customer information with third parties. Noone will ever know that you used our assignment help services. It’s only between you and us. We are bound by our policies to protect the customer’s identity and information. All your information, such as your names, phone number, email, order information, and so on, are protected. We have robust security systems that ensure that your data is protected. Hacking our systems is close to impossible, and it has never happened.

How our Assignment  Help Service Works

1.      Place an order

You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.

2.      Pay for the order

Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.

3.      Track the progress

You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.

4.      Download the paper

The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.

smile and order essaysmile and order essay PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET A PERFECT SCORE!!!

order custom essay paper