-
Essay / Novell Network for Company Security - 3390
Novell Network for Company Security As businesses grow in size, security needs become more pressing. Many companies today must answer the question: "When can I know if security is too high and which network system is the most secure for my company?" ยป To answer this question, many points of view must merge into the best compatible solution. Companies should consider involving many systems such as cost management and safety management system. Businesses don't want to be too secure when the solution costs more than the problem in time or money. In these aspects, if companies want to start a new system, here I consider two major operating systems such as Windows NT and Linux, giving them a careful look at how they work and what they use in their security system to insure corporate and corporate titles and how do they reduce security threats. Concerns about the security of an organization do not directly depend on the areas related to data communication, but also on the control mechanism that implements, restricts and protects threats from inside and outside the organization. 'organization. In our age of moral decadence, we see the need for security in all aspects of life. There are a huge number of people willing and able to take whatever they can that doesn't belong to them. We have security everywhere we look. There are armed guards in our stores and even in schools. Police officers patrol the streets to keep people safe. We have people to provide security in a world where things are physical, but what do we do in a computer world, where what we want to protect is information? This is where IT security comes in...... middle of paper ...... http://www.security.org.il/The Network Guys Network Security http://www.networkguys .com/ Magazine/Newspaper Articles: Application Discovers Flaws in Network Security IPGovernment Computer News May 10, 1999, v.18, 13, 1 (1Arming the Network with Digital Credentials. PC Week March 1, 1999, 123( 1)Agencies say security is a bigger task than Y2KGovernment Computer News May 10, 1999, v.18, 13, 6(1)Army firewall contracts are near Government Computer News April 5, 1999. , v.18, 8, 28(1)Authentication is the top priority on the RSA PC agenda January 18, 1999, v.16, 3, 32(1)Blocking agents can keep hackers' utilities at bay. distance.Government Computer News August 30, 1999, v.18, 28, 46Doss, George M., "Learn Red Hat Linux Security" published 2000Halfhil, Tom R. "Unix vs Win." May 1999: 42-52. Stephen A. "Windows NT Security" published 1997