Network security keys, Computer Network Security

Assignment Help:

The three primary types of network protection are the same as the three primary areas where a network can be attacked. Every network needs protection against people-related, hardware-related, and software-related attack, so each of these areas of network security need to be managed carefully. To secure a network against people-related failures, good network security procedures must be implemented and put into use consistently. Network users must secure their passwords so that no one else can discover them, back up data so that it can be recovered if the network sustains an attack, put secure data in secure places on the network, know how to detect phishing and pharming, and use all network protection measures available. Other people-related protection measures involve good network management by the network administrator: avoiding systems with a single point of failure, staying current with operating system patches, watching for relevant security advisories, and being familiar with security practices.

Software-related network protection includes such software barriers as software firewalls, spyware, anti-virus and anti-spam software. These software packages are designed to protect a network from software-related attack such as worms and viruses, automated network penetration by software that redials a network number and systematically tries every conceivable password it can generate, and software that can get around network security and track activity on a network. In addition, selection of system and functional software can add another layer of protection to the network, since some software lends itself to the support of network security and some does not.

Hardware-related network protection includes such hardware barriers as servers, hubs, switches, routers, and hardware firewalls (Zimmerman, 1-2). So-called "secure networks" employ an additional layer of hardware protection by employing more secure hardware: secure servers, removable hard drives, secure modems that communicate over shielded lines, and crypto-capable routers, dial-back systems,.

A combination of both hardware and software security solutions is a virtual private network, that is abbreviated as VPA. A VPN offers "secure, scalable, encrypted tunnels across a public network" for remote access, or an intranet VPN which features "tunnelled connections with rich VPN services, like IPSec encryption and QoS to make sure reliable throughput" (Tyson, 3).As per to Abdullah experience the best way to secure any organisation network  by use two network which are intranet and internet. Intranet is spicily for the organisation which can depend on high secure for their treatment such as Air defence forces. Conversely the internet the organisation can use the internet but with different computer .


Related Discussions:- Network security keys

RESPONSE, Dropbox’s tool shows how chatbots could be future of cybersecurit...

Dropbox’s tool shows how chatbots could be future of cybersecurity

Http request message, Question (a) Consider that you enter the subsequent ...

Question (a) Consider that you enter the subsequent URL in the address bar of a popular web client and that both the server and client accepts HTTP version 1.1. i. What can be

Draw the waveform for an asynchronous transmission, Question: (a) Draw...

Question: (a) Draw the waveform for an asynchronous transmission with the following specifications: Character "H", one even parity bit, one start bit, one stop bit, and a b

Calculate the minimum required signal strength, Question 1: (a) (i) Ra...

Question 1: (a) (i) Radio waves are subject to several propagation problems. Name any three of them. (ii) A Wi-Fi receiver requires a signal power of 50mW to operate correc

Attackers motives behind the cyber attack, Attacker's Motives behind the Cy...

Attacker's Motives behind the Cyber Attack Before adapting the necessary measures to deal with the problem, understanding and evaluating the blogger's psyche and his motivation

Explain the basic network topologies, Question: (i) ‘Implementation' is...

Question: (i) ‘Implementation' is a critical stage of the Systems Development Life Cycle. Show the four approaches which are commonly used to implement information systems in

Arp responses, ARP RESPONSES Let's search out how does a computer know...

ARP RESPONSES Let's search out how does a computer know whether an incoming frame have an ARP message. The type field in the frame header defines that the frame contain an ARP

Example of an attack against a windows, The objective of this example is to...

The objective of this example is to demonstrate the steps required for a successful attack against a vulnerable Windows XP SP2 system. It will show: a) how Nessus can be used to di

Hashing, Hashing is the transformation of a string of characters into a g...

Hashing is the transformation of a string of characters into a generally shorter fixed-length key or a value that presents the original string. Hashing is used to index and retri

Implement database security, Question: (a) Describe fully with example ...

Question: (a) Describe fully with example the two access control methods available to implement database security. (b) Discuss why database statistics (meta data) provide es

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd