StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Usage to Support National Defence of the UK - Essay Example

Cite this document
Summary
The paper "Network Usage to Support National Defence of the UK" highlights that the need to protect information and monitor the same is solely a government responsibility. This is because no other body can be entrusted with the security of people and in a common ground…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.5% of users find it useful
Network Usage to Support National Defence of the UK
Read Text Preview

Extract of sample "Network Usage to Support National Defence of the UK"

Thesis: Network usage should be monitored by the government in order to support national defence. Introduction Computer networking is essentially anengineering related discipline which involves the study of computer systems and devices and how they relate to each other ensuring that there is communication between them. Computer networks basically entail a connection between communication devices which enable the exchange of data. Networking involves several devices which enable the relaying of required messages which include: routers/routing protocols. Essentially, computer networks are not a single entity which just describes a single type of networks but they involve several types of networks these being: extranet, intranet and internet. This essay is based on the primal reasons for government to regulate and examine information gathered or communicated by individuals either within the country or without. In line with the thesis statement, this essay is essentially centred at providing information/evidence as to why the government should be solely in charge of networks that keep the various communications within a country. To form a valid argument, we will examine the United Kingdom's pursuit to control information. The United Kingdom government has always been faced with the need to secure information within the country mainly to help ensure that no threat is forthcoming at least not through the communication networks. This has been a debate for a long time and has seen the two main parties in the Kingdom draw various opinions. While the labour party wanted the formation of a single database for storing individual communications, the conservatives wanted a monitoring system which would ensure information is filtered; only that information which poses a threat to the people is stored. This they said was due to two facts; one, the government would infringe on the privacy of individuals something that had been done in the past but which they wanted a departure from. Of concern however is not how the politicians fought for the balance between security and privacy but the main point I want to draw is that they all agreed on the need to monitor information; notably, for the sole reason of security. In the same way, the United Kingdom government through its home secretary found the need to monitor information. The following part thus gathers the various parts of concern for these individuals and examines the information handled within and without the government quarters to help cement the need to monitor information. PART TWO-Government and Networks Government and Information Understanding the above discussed network components will help in the discussion of the government's need to secure networks for the purpose of security promotion and maintenance; especially, with the growing threats of terrorism, fraud cases and other major scandals. (Barret et al 2006) These have caught the government either unprepared or have overwhelmed government forces due to the extent and level of the technology used. This necessities that the government prepares fully for such occurrences or situations and since it is usually not possible to harness the entire human knowledge and make use of the same in developing government networks, it is then important for it to ensure that the information and methods used by these outside developers is monitored or regulated. Notice that the use of outside developers means those that are not part of the government. The other point of concern is that the corporate as well as the entire private sector has embarked in developing powerful technological equipments which enable the coding and encoding of data transported to allies of these companies or entities. If this is not monitored, then the security of the nation is likely to be in jeopardy as this information if not traced or decrypted, may contain matters likely to affect the well being of the society. Thus in conclusion, the government is definitely the one to control the amount of data that flows within the networks as it is the single and most influential entity that can safeguard people from unscrupulous companies out to harm them. This part is basically meant to confound the fact that the government should under all situations be aware of the information that is relayed in the networks within its jurisdiction. Stemming from the fact that the private sector which is dominated by people driven by their own dreams and egos, cannot be entrusted in monitoring information that they themselves may have helped process. (Barret et al 2006) Besides the information from outside sources, the government also requires to secure the information within its own quarters. This is for the simple reason that most of the information gathered within government ought to be classified and leakage may spell doom for the country. All these are issues that have to do with technology and security exclusively for government and related agencies. Of great challenge to public information technology personnel is to ensure that there exists efficient and flexible ways to relay government information to the required quarters and at the same time, ways to monitor the information sent to the government as well as that circulating within the private sector. This amounts to an enormous challenge for these people as they strive to ensure that the networks are not only efficient and available but are also secure. (Brag et al 2002) For inside government information, the government may want to ensure that information circulating from its own agencies only goes to the designated areas. Among the most sensitive areas of government are the criminal justice departments and the criminal intelligence departments; these hold equally sensitive information and any information in circulation needs to be fully secured. Besides interdepartmental information, there is also the information supplied by individuals to these agencies that to need to be secured and retrieved on time to ensure that justice is administered for purposes of security and the general well being of the entire society. (Barret et al 2006) Another area of concern is the communication of governments to numerous diplomats all over the world. Diplomats normally provide information about the countries they reside in and the general relationship between these countries and them. This again is essential for countries; thus, they need their systems to be safe for relaying such information. All these are government related facilities and systems that have a direct consequence on the security of the country. The handling and monitoring of such information cannot be entrusted to a private entity as it may have a profit motive. This is because private entities are more oriented to profits and their own well being; this excludes them from handling and monitoring such sensitive information. Government and keeping networks secure In view of the above reasons and many others, the government is unquestionably faced with the mounting challenge of ensuring that it non-intrusively monitors, intercepts and captures all the information sent through its networks. These networks have soared with time and the rate of growth does not seem to be subsiding. Besides, the size and speed of these networks is also rising day by day and as if this is not enough, the complexity of the networks also gives the government something to worry about at the end of the day as it figures out how to discharge its responsibility. It is apparent that without having the best and most recent technology, it would be quite impossible for the government to ensure that its information is monitored and consequently, security is enhanced. (Brag et al 2002) Just to recap the information discussed earlier, the sensitivity, magnitude and value of information available in the networks is the sole reason for monitoring networks. Under normal circumstances, the government just incorporates network monitoring solutions which do the following: monitor information entry and exit, monitor network elements, troubleshoot and reconstruct breaches; these being just a few of the network regulation protocols. The other option is forming a database such as was the initial UK suggestion but then depending on the nation's view on privacy, the same may be agreed upon or refused as an ideal idea. But all in all, the need to secure networks and monitor information is undoubtedly essential. (Brag et al 2002) These solutions though being products themselves cannot be always relied upon to make sure that the networks function as required. In fact, the networks sometimes may become porous as a result of using these solutions. Besides, the level of information going through these networks is unpredictable and the amount of data flowing may overwhelm the monitoring systems; this necessities the government to keep watch over the system and keep reviewing the monitoring systems. This would ensure that the information is monitored in granular detail and examined to ensure that it is of no security threat, nor does it pose a danger to any of the existent quarters in and out of the country. Limitations in Monitoring Data/Information Finally, there are numerous challenges to government monitoring systems aimed at ensuring security. These are sometimes not as a result of flaws within the systems but are inherent to the use of technology. Other limitations are "artificial" in the sense that they are intentionally caused by individuals operating or designing the systems Sometimes, there maybe a general failure in the monitoring systems; this may be as a result of more than the anticipated flow level of data. This incapacitates the network roles; especially, the entrance channel which is not receptive to the information from the main networks. The result of this may be a system break down or simply, the system may not be able to carry out the functions of monitoring the relayed data. (Brag et al 2002) The other limitation may be as a result of technology invalidity. This is mainly as a result of superior networks developed by other sectors for purposes of invalidating the government monitoring system (Palmer 2005). Besides, the networks may be developed to help overcome any existent technological gap and at the same time, incapacitate the monitoring system. All these are technological problems which require the government to keep up with developments in the information technology field. (Barret et al 2006) Finally, it's the human factor; the people in charge of these systems may not be honest enough and they may willingly disable the system to ensure some information they are interested in is not detected by the system. All these are limitations/challenges eminent in the government's efforts to monitor and regulate information in our networks. Part Three-Conclusion The need to protect information and monitor the same is solely a government responsibility. This is because no other body can be entrusted with the security of people and in a common ground; common ground in the sense that it is only a government that has a common coverage for the entire nation. The achievement of this role though would require a massive investment in state of the art equipment that not only matches development in other sectors but also aims to have a better system. It's the mandate of the government not to keep abreast with technology but lead the way in technological developments; otherwise, it will get overwhelmed and its monitoring role will fizzle out. Besides, there is a need to ensure that the thin line between the security of individuals and their privacy is not crossed. This will ensure that all vital government functions of maintaining security through information monitoring are successful and supported by the populace. References Barret, J and Wilson R (2006). Securing Global Transportation Networks McGraw-Hill Brag, R and Strassberg, K (2002). Network Security: The complete reference McGraw-Hill Osborne Media. Palmer, M (2005). Hands-On Networking Fundamentals 1st edition, Course Technology. Sudama, R and Chiu, D (1992). Network monitoring Explained: Design and Application, Prentice Hall Publishers. Valacich, J and Jessup, L (2007).Information Systems Today: Managing in the Digital world. Prentice Hall The Insider (2009). UK government to monitor all internet use, after secret collusion with online ad corporation http://www.theinsider.org/news/article.aspid=2745, Retrieved November, 16, 2009. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Network Monitoring Essay Example | Topics and Well Written Essays - 1750 words, n.d.)
Network Monitoring Essay Example | Topics and Well Written Essays - 1750 words. https://studentshare.org/information-technology/1505018-network-monitoring
(Network Monitoring Essay Example | Topics and Well Written Essays - 1750 Words)
Network Monitoring Essay Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/information-technology/1505018-network-monitoring.
“Network Monitoring Essay Example | Topics and Well Written Essays - 1750 Words”. https://studentshare.org/information-technology/1505018-network-monitoring.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Usage to Support National Defence of the UK

Wepons and selfdefence concerns in the USA and the UK

No doubt guns where on one hand are used to commit crime, on the other hand are used to self-defence.... hellip; No doubt guns where on one hand are used to commit crime, on the other hand are used to self-defence.... Do guns really help private citizens prevent crime through active self-defence and deterrence Or are they mostly used by criminals.... 35) There is another aspect of the same picture which states that there is much more concern of crime with weapons and self defence other than psychological one....
11 Pages (2750 words) Essay

Supply Chain Strategy for British Army

The objective of the following assignment is to provide an analysis of the effectiveness of modern chain supply strategies.... Particularly, the writer of the assignment will evaluate the application of supply chain management techniques in regard to the British army.... hellip; Supply chain management can be referred as “the systematic, strategic coordination of the traditional business functions with in a particular company and across businesses with in the supply chain, for the purposes of improving the long term performance of the individual companies and the supply chain as a whole” (Mentzer, 2003)....
7 Pages (1750 words) Assignment

Effective Techniques to Mitigate Risks, Incorporating Voice Signatures

From the paper "Effective Techniques to Mitigate Risks, Incorporating Voice Signatures" it is clear that the uk has launched a free of charge guide called 'Avoiding Identity Theft' from IVA-info-UK.... This guide enables consumers within the uk to raise awareness.... hellip; The Voice Commerce has opened a National Trust Centre in the uk by collaborating with Nuance Communications.... The definition of security, in the context of data theft on the internet, consists of concerns linked to i) communication privacy on the network, ii) data confidentiality over the network, iii) unauthorized access to classified data, iv) entry into prohibited network domains and v) internet utilization for hidden communication....
8 Pages (2000 words) Essay

UK and Chinas 3G Technology Development

The author of this research paper "UK and Chinas 3G Technology Development" asserts that the proponent included the environmental analysis of 3G technology development in the uk and China which includes analysis on political, environmental, social, technological, legal and environmental aspects.... nbsp;The proponent finds out that the uk has an entirely different approach of 3G technology.... The reason is that the uk is ahead of the development while China will now just focus on the refinement of standard in the development of 3G technology....
20 Pages (5000 words) Research Paper

The Role of IS for The 2012 Olympics

the uk police force, in anticipation of high visitor volumes, has been forced to re-examine their information systems capabilities and have improved their fingerprint identification systems.... the uk police force, in anticipation of high visitor volumes, has been forced to re-examine their information systems capabilities and have improved their fingerprint identification systems.... his report identifies the specific information systems requirements, in terms of usage and development, that will be included as part of the information technology infrastructure at the 2012 Olympics....
10 Pages (2500 words) Coursework

Humanitarian Intervention Exception and Respect for National Sovereignty

This report "Humanitarian Intervention Exception and Respect for national Sovereignty" discusses the disagreements about humanitarian intervention have sound and credible theoretical bases.... hellip; Humanitarian intervention must be allowed to safeguard human rights only in instances where severe violations of individual rights prevail over the other moral aspects encompassed by the moral unwritten rule obliging regard for national sovereignty.... And (2) how should the international community reconcile the principles of humanitarian intervention and the rights of national sovereignty?...
11 Pages (2750 words) Report

The Growth in Internet Use Has Affected Cultures around the World Leading to Westernised Homogenous World Culture

nbsp; Lately, the network connection was also used for Pentagon aims but a wide usage of these benefits was spread among scientific circles and with the aim of developing new technologies and science study (A Brief Guide to the History of the Internet, 2014).... This paper " The Growth in Internet Use Has Affected Cultures around the World Leading to Westernised Homogenous World Culture" focuses on the fact that the Internet is considered to be a global system of network interconnection with the help of technical devices....
8 Pages (2000 words) Essay

Ethical Hacking

the uk government has established a body called CHECK that assists organizations in selecting providers (CPNI 2006, p.... This software is prone to security risks owing to the fact that support of this software ceased since April 8, 2014 (Stamper 2014, p.... It has been observed that there are some serious consequences that can be suffered by the network on which the penetration test is being run if its vulnerability is high.... The vulnerability in Clangers' network is high and penetration testing can cause damages, which include congestion and system crashing....
8 Pages (2000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us