Network security keys, Computer Network Security

Assignment Help:

The three primary types of network protection are the same as the three primary areas where a network can be attacked. Every network needs protection against people-related, hardware-related, and software-related attack, so each of these areas of network security need to be managed carefully. To secure a network against people-related failures, good network security procedures must be implemented and put into use consistently. Network users must secure their passwords so that no one else can discover them, back up data so that it can be recovered if the network sustains an attack, put secure data in secure places on the network, know how to detect phishing and pharming, and use all network protection measures available. Other people-related protection measures involve good network management by the network administrator: avoiding systems with a single point of failure, staying current with operating system patches, watching for relevant security advisories, and being familiar with security practices.

Software-related network protection includes such software barriers as software firewalls, spyware, anti-virus and anti-spam software. These software packages are designed to protect a network from software-related attack such as worms and viruses, automated network penetration by software that redials a network number and systematically tries every conceivable password it can generate, and software that can get around network security and track activity on a network. In addition, selection of system and functional software can add another layer of protection to the network, since some software lends itself to the support of network security and some does not.

Hardware-related network protection includes such hardware barriers as servers, hubs, switches, routers, and hardware firewalls (Zimmerman, 1-2). So-called "secure networks" employ an additional layer of hardware protection by employing more secure hardware: secure servers, removable hard drives, secure modems that communicate over shielded lines, and crypto-capable routers, dial-back systems,.

A combination of both hardware and software security solutions is a virtual private network, that is abbreviated as VPA. A VPN offers "secure, scalable, encrypted tunnels across a public network" for remote access, or an intranet VPN which features "tunnelled connections with rich VPN services, like IPSec encryption and QoS to make sure reliable throughput" (Tyson, 3).As per to Abdullah experience the best way to secure any organisation network  by use two network which are intranet and internet. Intranet is spicily for the organisation which can depend on high secure for their treatment such as Air defence forces. Conversely the internet the organisation can use the internet but with different computer .


Related Discussions:- Network security keys

CS, Discuss how developers should apply the following countermeasures to im...

Discuss how developers should apply the following countermeasures to improve the security of their code:

Computer security, For this assessment, students must research and analyse ...

For this assessment, students must research and analyse two different scenarios. The two scenarios must be chosen from those described below and submitted as one Microsoft PowerPoi

Evaluate the percentage availability of the network, QUESTION a) "Two ...

QUESTION a) "Two of the key attributes of an enterprise network is that it have to be multi-platform and multisite." Decribe what you understand by this statement. b) A

Media, what is guided media or unguided media

what is guided media or unguided media

Man-in-the-middle attacker, - Alice, Bob and Charlie have a secret key a=3,...

- Alice, Bob and Charlie have a secret key a=3, b=4, c=5, in that order. - They would like to find a common secret key using Diffie-Hellan key exchange protocol (with g=2, p=5).

Introduction to planning for security, INTRODUCTION TO PLANNING FOR SECURIT...

INTRODUCTION TO PLANNING FOR SECURITY The creation of an information security program begins with creation and review of organization’s information security policies, standards,

Draw a suitable physical network diagram, Question a) From the capture ...

Question a) From the capture below: Give the datagram source IP address, upper layer protocol, Total length in decimal and header checksum in hexadecimal; the segment source po

Categories of controls-risk management, Categories of Controls Controlli...

Categories of Controls Controlling risk through mitigation, avoidance or transference is accomplished by implementing controls. There are 4 effective approaches to select the co

Address masks, ADDRESS MASKS To identify receiver, network apply addre...

ADDRESS MASKS To identify receiver, network apply address mask to receiver address and calculate to network address in routing table. It can use Boolean 'and' to calculate the

Define full-duplex., A  full-duplex (FDX) , accepts communication in both...

A  full-duplex (FDX) , accepts communication in both ways, and, unlike half-duplex, accept this to occur simultaneously. Land-line telephone networks are full-duplex, since they

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd