Network security keys, Computer Network Security

Assignment Help:

The three primary types of network protection are the same as the three primary areas where a network can be attacked. Every network needs protection against people-related, hardware-related, and software-related attack, so each of these areas of network security need to be managed carefully. To secure a network against people-related failures, good network security procedures must be implemented and put into use consistently. Network users must secure their passwords so that no one else can discover them, back up data so that it can be recovered if the network sustains an attack, put secure data in secure places on the network, know how to detect phishing and pharming, and use all network protection measures available. Other people-related protection measures involve good network management by the network administrator: avoiding systems with a single point of failure, staying current with operating system patches, watching for relevant security advisories, and being familiar with security practices.

Software-related network protection includes such software barriers as software firewalls, spyware, anti-virus and anti-spam software. These software packages are designed to protect a network from software-related attack such as worms and viruses, automated network penetration by software that redials a network number and systematically tries every conceivable password it can generate, and software that can get around network security and track activity on a network. In addition, selection of system and functional software can add another layer of protection to the network, since some software lends itself to the support of network security and some does not.

Hardware-related network protection includes such hardware barriers as servers, hubs, switches, routers, and hardware firewalls (Zimmerman, 1-2). So-called "secure networks" employ an additional layer of hardware protection by employing more secure hardware: secure servers, removable hard drives, secure modems that communicate over shielded lines, and crypto-capable routers, dial-back systems,.

A combination of both hardware and software security solutions is a virtual private network, that is abbreviated as VPA. A VPN offers "secure, scalable, encrypted tunnels across a public network" for remote access, or an intranet VPN which features "tunnelled connections with rich VPN services, like IPSec encryption and QoS to make sure reliable throughput" (Tyson, 3).As per to Abdullah experience the best way to secure any organisation network  by use two network which are intranet and internet. Intranet is spicily for the organisation which can depend on high secure for their treatment such as Air defence forces. Conversely the internet the organisation can use the internet but with different computer .


Related Discussions:- Network security keys

Define shift operation, SHIFT OPERATION:  This operation replaced all...

SHIFT OPERATION:  This operation replaced all bits to the left one position. For example in the diagram below a 16-bit CRC hardware is given, which needs three Exclusive OR (

Security policies, implementing password policy in organisation

implementing password policy in organisation

Draw the full network diagram, Problem (a) Below is a capture of an E...

Problem (a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. The second screen capture is from the data portion of the frame.

Intrusion detection and classification, i want to detec and classify networ...

i want to detec and classify network anomaly detection based on KDD99 data set using swarm intelligence

Does ssl protect against eavesdropping, QUESTION (a) Consider the follo...

QUESTION (a) Consider the following authentication options A. Using password B. Using pin and fingerprint Which option A or B provides stronger security and why? (b

Bus topology, BUS TOPOLOGY In a bus topology all devices are attached ...

BUS TOPOLOGY In a bus topology all devices are attached to a single long cable and any device can send data to any other device. For this function, coordination is needed to d

Non-repudiation and auditing, Proof that the sender forwards the message. I...

Proof that the sender forwards the message. It also prohibits the author of the code from falsely denying that he forward the message. This is achieved by record using the exact ti

Problem of spam mail, Topic -Spam is an ever-growing problem, with some net...

Topic -Spam is an ever-growing problem, with some network administrators reporting that 90% or moreof the email delivered to their mail servers is spam. Identify and briefly evalua

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd