You are on page 1of 5

Running Head: NETWORK SECURITY DISCUSSION RESPONSE 1

Network Security discussion response

Student name

Professor

Course date
NETWORK SECURITY DISCUSSION RESPONSE 2

Response 1

The post has outlined different articles that truly support information ethics and

surveillance processes. I must agree that privacy and surveillance have taken people's attention

because of the massive raids and threats posed by government and attackers who comprise stored

data. For instance, Snowden was among the Americans who exposed government ill intentions

to surveillance data without users' consent. For a fact, wen account on everything that we do on a

network. Increased data utilization and practical procedures of monitoring are of great

importance.

Nevertheless, the surveillance can affect privacy and confidentiality if it does not follow

the right access infrastructure. As outlined in (Bettelheim, 2001), monitoring should be

protected and based on the law processes. In case of a search, the court order should be valid and

must not contradict integrity and personality. Communication companies should well manage

personal bases commination with allot independence. In my opinion, the surveillance has

indeed supported security in a significant way.


NETWORK SECURITY DISCUSSION RESPONSE 3

References

Bejtlich, R. (2013). The practice of network security monitoring: understanding incident

detection and response. No Starch Press.


NETWORK SECURITY DISCUSSION RESPONSE 4

Response 2

Surveillance and privacy are part of the government, monitoring process that assures

enhanced security infrastructure. Nevertheless, the decline of procedures and violations of the

surveillance Act should be handled as a crime that undermined the rule of law. I must admit that

reduced privacy procedure and uncontrolled surveillance has resulted in attacks. As outlined,

when the government has enhanced monitoring, there is an advanced data tracking and launching

of the response framework. On the broader scope, the surveillance state boost perception and

notion framework associated with data transformation. (Timan, 2017) has genuinely given an

accurate picture and theoretical framework on the need to regulate surveillance and assurance.

As elaborated, data breaches harm the data. Upon attack, insertion, deletion, and compromise

can deny service delivery. In this case, we share the same though on monitoring behavior.

Defined networking procedures, spying policy, and transparency should be enhanced in a

significant way.
NETWORK SECURITY DISCUSSION RESPONSE 5

References

Knapp, K. (2009). Cybersecurity and global information assurance: Threat analysis and

response solutions: Threat analysis and response solutions. IGI Global.

You might also like