Network security keys, Computer Network Security

Assignment Help:

The three primary types of network protection are the same as the three primary areas where a network can be attacked. Every network needs protection against people-related, hardware-related, and software-related attack, so each of these areas of network security need to be managed carefully. To secure a network against people-related failures, good network security procedures must be implemented and put into use consistently. Network users must secure their passwords so that no one else can discover them, back up data so that it can be recovered if the network sustains an attack, put secure data in secure places on the network, know how to detect phishing and pharming, and use all network protection measures available. Other people-related protection measures involve good network management by the network administrator: avoiding systems with a single point of failure, staying current with operating system patches, watching for relevant security advisories, and being familiar with security practices.

Software-related network protection includes such software barriers as software firewalls, spyware, anti-virus and anti-spam software. These software packages are designed to protect a network from software-related attack such as worms and viruses, automated network penetration by software that redials a network number and systematically tries every conceivable password it can generate, and software that can get around network security and track activity on a network. In addition, selection of system and functional software can add another layer of protection to the network, since some software lends itself to the support of network security and some does not.

Hardware-related network protection includes such hardware barriers as servers, hubs, switches, routers, and hardware firewalls (Zimmerman, 1-2). So-called "secure networks" employ an additional layer of hardware protection by employing more secure hardware: secure servers, removable hard drives, secure modems that communicate over shielded lines, and crypto-capable routers, dial-back systems,.

A combination of both hardware and software security solutions is a virtual private network, that is abbreviated as VPA. A VPN offers "secure, scalable, encrypted tunnels across a public network" for remote access, or an intranet VPN which features "tunnelled connections with rich VPN services, like IPSec encryption and QoS to make sure reliable throughput" (Tyson, 3).As per to Abdullah experience the best way to secure any organisation network  by use two network which are intranet and internet. Intranet is spicily for the organisation which can depend on high secure for their treatment such as Air defence forces. Conversely the internet the organisation can use the internet but with different computer .


Related Discussions:- Network security keys

Elliptic Curves, #questioAn elliptic curve y^2=x^3+ax+b(mod29) includes poi...

#questioAn elliptic curve y^2=x^3+ax+b(mod29) includes points P=(7, 15) and Q=(16, 13) a)Determine the equation of the crve b) Determine all values of x for which there is no point

Explain briefly the role of the physical layer, a) Calculate the CRC for th...

a) Calculate the CRC for the frame below: Frame: 1101011011 Generator: 10011 Message after appending 4 zero bits: 11010110110000 b) OSI refers to a system in which any

How does message switching operate, Question: Human telephone conversat...

Question: Human telephone conversations are characterized by irregular pauses, alternating with irregular bursts of speech. In contrast, communication via computers is char

Issue specific security policy, Why an organization need the issue specific...

Why an organization need the issue specific security policy

Describe what the term session hijacking means, An overall rise in mobility...

An overall rise in mobility, coupled with the falling cost of Wi-Fi equipment, has led to a proliferation of Wi-Fi hot spots in public areas to provide Internet accessibility. Thus

Wireless sensor networks, The project will be involving a design and a repo...

The project will be involving a design and a report of which explain the simulation and how it functions. The aim of the project is to help the administrators and staff at the war

Venn Diagram Problem, Students were asked about search engine they used.90 ...

Students were asked about search engine they used.90 of them said they used google chrome,70 used Internet Explorer,40 used Mozilla Firefox,30 used Google Chrome and Internet Explo

Briefly list functions of a public key infrastructure, Question: (a) Wh...

Question: (a) What is the major problem with public key encryption when compared to symmetric key encryption? (b) Consider the following protocol for communication between t

Explain characteristics of associative memory networks, (a) Describe the pr...

(a) Describe the principal characteristics of associative memory networks? (b) Name the two basic types of associative memories and the differences between them. (c) Give an

Layering, ADDRESS RESOLUTION AND PROTOCOL ADDRESSES Address resolution...

ADDRESS RESOLUTION AND PROTOCOL ADDRESSES Address resolution (ARP) is a network interface layer protocol. Protocol addresses are used in all upper layers. Address resolution s

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd