Network security keys, Computer Network Security

The three primary types of network protection are the same as the three primary areas where a network can be attacked. Every network needs protection against people-related, hardware-related, and software-related attack, so each of these areas of network security need to be managed carefully. To secure a network against people-related failures, good network security procedures must be implemented and put into use consistently. Network users must secure their passwords so that no one else can discover them, back up data so that it can be recovered if the network sustains an attack, put secure data in secure places on the network, know how to detect phishing and pharming, and use all network protection measures available. Other people-related protection measures involve good network management by the network administrator: avoiding systems with a single point of failure, staying current with operating system patches, watching for relevant security advisories, and being familiar with security practices.

Software-related network protection includes such software barriers as software firewalls, spyware, anti-virus and anti-spam software. These software packages are designed to protect a network from software-related attack such as worms and viruses, automated network penetration by software that redials a network number and systematically tries every conceivable password it can generate, and software that can get around network security and track activity on a network. In addition, selection of system and functional software can add another layer of protection to the network, since some software lends itself to the support of network security and some does not.

Hardware-related network protection includes such hardware barriers as servers, hubs, switches, routers, and hardware firewalls (Zimmerman, 1-2). So-called "secure networks" employ an additional layer of hardware protection by employing more secure hardware: secure servers, removable hard drives, secure modems that communicate over shielded lines, and crypto-capable routers, dial-back systems,.

A combination of both hardware and software security solutions is a virtual private network, that is abbreviated as VPA. A VPN offers "secure, scalable, encrypted tunnels across a public network" for remote access, or an intranet VPN which features "tunnelled connections with rich VPN services, like IPSec encryption and QoS to make sure reliable throughput" (Tyson, 3).As per to Abdullah experience the best way to secure any organisation network  by use two network which are intranet and internet. Intranet is spicily for the organisation which can depend on high secure for their treatment such as Air defence forces. Conversely the internet the organisation can use the internet but with different computer .

Posted Date: 2/25/2013 7:39:07 AM | Location : United States

Related Discussions:- Network security keys, Assignment Help, Ask Question on Network security keys, Get Answer, Expert's Help, Network security keys Discussions

Write discussion on Network security keys
Your posts are moderated
Related Questions
Electronic Mail: Electronic mail which is famous as e-mail, as it is known to its number of users, has been around for more than two decades. Before 1990, it was mainly used in

What key which if used to encrypt the ciphertext again would give back the plaintext (i.e. key is a weak key)? Define a formula for identifying weak keys for the cipher below (

TRANSMISSION ERRORS:  Transmission exceptions may happen due to different causes for example power surges or interference may delete data during transmission. In result of wh

Question requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption tec

Question: a) Explain what the following intermediate systems are and how they work? i. Repeater ii. Bridge b) A service is formally specified by a set of primitives (op

Question: (a) What are the various options to mitigate risks in an Information Security Management System (ISMS)? For each option specify an instance where it can be used.

COMPONENTS OF AN INFORMATION SYSTEM The components of an information system are software, data, hardware, people, procedures and Networks. These 6 components are critical to ena

Question: a. State briefly three reasons why computer networks are used? b. Differentiate between simplex, half-duplex and full-duplex mode of transmission. c. State any

IDS Deployment Overview The decision regarding control strategies, decisions about where to locate elements of intrusion detection systems is an art in itself. Planners should s

a) determine the RTT (round trip time) between a client requesting a web page of 1024 bytes in size from an internal web server on a 100 Base-T Ethernet. Assume a one-way propagati