Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Security + network chapter 4 quizlet
Network design quize
Network infrastructure logical design
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Security + network chapter 4 quizlet
In today’s technological environment, there are many tools that are easily obtainable and deployed by individuals with nefarious intent. From Windows or Linux based applications, to entire operating systems and software suites are readily available for a quick download. These facts drive network administrators to use innovative means with which to keep the attackers at bay. When designing a network, architects and administrators must make security an integral part of drafting the documentation, physical and software requirements that go into building a secure network.
Regardless of the size of the project, a good plan should be the first step in the process. The principal question that should be asked is: What is the purpose of this network and what are the resources required to meet this purpose? This will lead to creating a project plan that will include all of the standards which will be utilized to design, implement, test, review and revise the entire process as required. Amongst those standards should be a clear, thorough and concise security policy to use during the implementation of every network asset. Physical security, software and configuration for all aspects of the network design must be addressed in the security policy.
Detailed plans for meeting the physical security requirements are paramount to achieve the creation of a secure network. The physical security for critical network assets must be adequate when compared to the severity of damages that a breach could cause. Integrity of construction, cypher locks, access cards, keypads, biometrics, cameras, and guards with access logs are all considerations that must be specified as appropriate for the network and the data which will be used on it. The level of clea...
... middle of paper ...
...and IPS they make the entire network more secure by adding more layers of security at the host to harden the security posture. Doing so reduces the risk of an accidental breach from an employee or a malicious internal threat by policing the software and data on each workstation.
The final aspect they cannot be overlooked is people. A proper security screening for individuals that are to be granted any access, right, or permission for any portion of the network is instrumental. Lots of work goes into creating a secure network environment, and it can all be circumvented by a malicious inside threat. Additionally, sufficient training for every member of the organization on proper handling of data and use of network resources will mitigate the risk of accidental exposure to security threats. These are all consideration that must be taken when creating a secure network.
The Operating System (OS) is the heart of computer server and client systems; therefore they are the pivotal components of the Information Technology (IT) architecture. The OS contains the crucial data, information, and applications, which are vulnerable, and can be infiltrated to cripple the entire IT architecture of the organization. Therefore, it becomes mandatory to properly safeguard the OS from an internal or external intrusion (Stallings & Brown, 2012). This critical thinking report will highlight the security concerns that may impact the OS. Further, the security guidelines and best practices for the OS in general, along with the specific fundamentals regarding the Windows and Linux OS are comprehensively illustrated.
Physical and environmental security programs are generally considered to be a collection of mechanisms and controls put into place that help ensure the availability of information technology capabilities. These programs protect an organization from fire, flood, theft, power failure, intentional, and even unintentional damage through negligence. Implementation of these programs at the organizational level can take place in a number of ways but most organizations choose to follow the application of a body of standards, usually set forth by an organization such as the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). Once such body of standards put forth by ISO/IEC is 27002, Information technology – Security techniques – Code of practice for information secur...
...common risks and their mitigating techniques are: Unauthorized access to data centers, computer rooms, and wiring closets – this risk can be mitigated by applying policies, standards, procedures, and guidelines for staff and visitors to secure facilities. Servers must sometimes be shut down to perform maintenance – this can be mitigated by creating a system to tie servers, storage devices, and the network together and created redundancy to prevent down time on mission critical services. Server operating systems vulnerability – this can be mitigated by ensuring all server operating system environments are defined with the proper patches and updates. And lastly cloud computing virtual environments are not secure by default configurations – can be mitigated with setting up virtual firewalls and server segments on separate VLANs to help prevent failure in the network.
Network Security is the protection of the computer’s network though out the entire infrastructure. It can protect very important information and computer files to help prevent theft, spyware, malware, viruses, and more. Depending on if you have a public or private network, can determine what type of security settings you need for your network. All people are different on what they want to have secured or not, but most people do not know how to prevent people or things from getting in their network. “You must have a general understanding of security terminology and specifications as it relates to configuring hardware and software systems.”(Roberts, Richard M. 599). That quote states that by knowing and understanding security terms and specifics, you can
This proposal is for a small office that will have users who are connected by Wi-Fi or cable. The network will include devices and resources that is shared among all the users. The network will need to have security measures in place to protect the entire network and keep the wireless access secure and available only to employees of the company.
On 5 October 2009, computer equipment from a network data closet was stolen from BCBST. The items stolen were 57 unencrypted hard drives which contained over 300,000 video recording and over one million audio recordings. According to Whitman & Mattord (2010), confidentiality, integrity, and availability makes up the C.I.A triangle which is the basis of Committee on National Security model for information security, an industrial standard, (Whitman & Mattord, 2010). Confidentiality can be a synonym for encryption but also means only the people with the correct permission can access the information. One of the major security issue is the hard drives were not encrypted. The hard drives should be encrypted to prevent people from reading the information the computer. Software can be purchased which will encrypt files on hard drive with such as Folder Lock, SensiGuard, Secure IT, and more. There are open source encrypting software which are free for use which could have been used. If the hard drives were not needed, the data should hav...
It has been demonstrated that a number of interoperable systems must be implemented to fully protect a network; a strategy known as Defense in Depth. Due to the multitude of security devices and device categories available, it can be very difficult to identify the correct tools for meeting security goals. Using the Defense in Depth strategy will require an understanding of the interactions between devices occuring within the network.
Principle of Security Management by Brian R. Johnson, Published by Prentice-Hall copyright 2005 by Pearson Education, Inc.
To combat those threats and ensure that e-business transactions are not compromised, security technology must play a major role in today's networks. Why Networks Must Be Secured? Attacks: -. Without proper protection, any part of any network can be susceptible to attacks or unauthorized activity. Routers, switches, and hosts can all be violated by professional hackers, company competitors.
...vantage of the overall network design and implement usable subnets with virtual local area networks. Use encryption and encapsulation to secure communications of public segments to enable extranets and cross-Internet company traffic. Use items such as intrusion detection systems and firewalls to keep unauthorized users out and monitor activity. Taken together, these pieces can make a secure network that is efficient, manageable, and effective.
Conklin, W.A., White, G., & Williams, D. (2012). Principles of Computer Security: CompTIA Security+™ and Beyond (Exam SY0-301) (3rd ed.). Retrieved from The University of Phoenix eBook Collection database.
Implement physical security: - “Physical security protects people, data, equipment, systems, facilities and company assets” (Harris,
People have been using physical security measures such as barriers for protection for centuries (McCrie, 2007). Every living thing uses physical security to protect their home, family, and themselves with some form of barriers. These barriers can be either man-made or natural as long as they define, delay, or detect unauthorized access (Fennelly, 2004). These barriers are used to protect not only the facility but the assets located inside. I will describe these barriers starting from the outside and working into the facility.
The network management plan and security plan is important to help the company figure out how they will improve its network and security procedures for the company. Planning involves outlining objectiv...
The first and most crucial step is to create a solid plan. Plan should include the techniques, tools and data that are going to used in the project. The responsibilities of all the members should be distributed at this step. The utilization of resources and budgeting of the project should be done here. Management tools such as probability and Impact Matrix, FMEA are useful at this point.