NETWORK SECURITY MANAGEMENT ISSUES Assignment Overview The Internet has grown faster than any telecommunications system in history continuing to grow and become more ubiquitous. This is particularly t

NETWORK SECURITY MANAGEMENT ISSUES Assignment OverviewThe Internet has grown faster than any telecommunications system in history continuing to grow and become more ubiquitous. This is particularly true with the advent of 5G networks. These networks are attractive targets for intruders. The Open Systems Interconnection (OSI) model and the standard of communication built on the TCP/IP protocol coupled with the everywhere computing in all types of devices enabled by 5G will fundamentality change our society. We must face this with clear security safeguards and thought into the implications of this for society.We live in a networked society, yet many are naive about how to protect the security of the information we exchange and store via this network. The pervasiveness of the networked culture often leads to patterns of behavior where we may engage in risky data behavior whether it is personal or work-related information that is networked. The purpose of this case is toraise your awareness of these issuesand how to begin to safeguard your networked systems.First you will read the ACM code of ethics:http://www.acm.org/about/code-of-ethicsWhile you see that this code of ethics was adopted in 1992, the network security violation events continue to occur.http://media.techtarget.com/searchSecurityChannel/downloads/security_computing_chapter.pdfThe chapter from Techtarget.com discusses the issues of computer security. I want you to specifically address the issues in the context of networks of the Internet of Things with the potential to monitor every action of our daily lives and to replace many jobs with robotic controls. How will these systems be secured?Case AssignmentWhen you have finished your research here, you will be able to write a short (5- to 7-page) paper discussing the question:How can you as the network administrator use network security principles to protect networked systems. You will use the principle ofDefense in Depthwhere you use routers, firewalls, intrusion detection systems (IDSs) and intrusion prevention systems (IPSs).