When it comes to networking and the security of networks, there are several different methods of protecting networks. Of these differing methods, some of them sound similar, but provide differing levels of security. In the following paragraphs, I will try to explain the differences between some of the methods used.
Explain the difference between historical and statistical logging.
Logging is a simple way of keeping a record of activity on a network. There are several types of logs that can be kept, each providing different data that can be analyzed to provide information on potential ways of improving security over time. With historical logging, records are kept of all data passing through a particular network device. This might be the gateway separating a network from the outside world or an internal router on the network. In either case, the record kept can then be analyzed at a later date and hopefully provide insight on the security of the network.
Statistical logging is a more efficient form of logging and includes some analysis already built into the report. This information might include which users were logged in during which time frames, what files were accessed, and how long they were logged in. By watching for different trends in this type of report, potentially harmful activity is more easily identifiable and mitigated.
Explain the difference between file security and firewalls.
Firewalls provide a barrier between internal networks and the outside world. Firewalls can be used anywhere there is data transferred between two systems. Individual computers can each have their personal firewall for filtering data. Firewalls are a filtering system to determine information that is allowed and...
... middle of paper ...
...there are different aspects of network security. Each type protects the network and files on it in a different way. It is up to the network manager to decide which methods work best for his individual business needs, and he may apply some or all of the methods mentioned here.
Costlow, T. (2004). IEEE Distributed Systems Online: Digital Postmark Helps Fight Spam, Virus Attacks. Vol. 5, No 5; Retrieved June 19, 2006, from http://csdl2.computer.org/comp/mags/ds/2004/05/o5004.pdf
Srinutapong, Supoet Stephen. (2001). Data Integrity and Security. Retrieved June 19, 2006, from http://www.s-t.au.ac.th/~supoet/5212012.htm
Webopedia. 2006. Digital Certificate. Retrieved June 18, 2006, from http://www.webopedia.com/TERM/D/digital_certificate.html
Wikipedia. 2006. Digital Postmark. Retrieved June 11, 2006, from http://en.wikipedia.org/wiki/Digital_postmark
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Today’s corporate infrastructure is not the same as it was 10 years ago. In the past you were able to control the amount of attacks on a network because of the reasonable number, which is not the case today. At any given time an organizations network will be attacked or try to be attacked several hundred times in one day. For larger more well-known organizations this number could grow significantly. To ensure your organization is not one of the ones on the 10’oclock news you have to ensure you have proper security practices in place to secure your network.... [tags: Network Security]
799 words (2.3 pages)
- Computer Network Security Alternatives Computer network security and integrity is a large concern among all types and sizes of companies. The options for solving security risks are as varied as the companies themselves. However, it is possible to break down the methods for dealing with security risks into three major categories. Companies have the option to: 1. Select best of breed products for their various security needs and assemble the products together to form their own customized solutions.... [tags: Computer Network Security Essays]
776 words (2.2 pages)
- Network Security When it comes to networking and the security of networks, there are several different methods of protecting networks. Of these differing methods, some of them sound similar, but provide differing levels of security. In the following paragraphs, I will try to explain the differences between some of the methods used. Explain the difference between historical and statistical logging. Logging is a simple way of keeping a record of activity on a network. There are several types of logs that can be kept, each providing different data that can be analyzed to provide information on potential ways of improving security over time.... [tags: Network Security Hacking ]
932 words (2.7 pages)
- Network Security 1. What is network security. Network security has changed significantly over the past years. There is more and more data to monitor and analyze in order to detect the activity of your data and systems. Securing a network has many variables. Password authentication, network access, patches, anti-virus protection, intrusion detection, firewall and network monitoring tools are just a few of the things you can do to protect yourself. Threats to your network is becoming more complex and it is requiring lots of money, time and sacrifices to keep up with the growing amount of potential attacks.... [tags: Technology Security Network]
1619 words (4.6 pages)
- Network Security Installing firewall or anti-virus software on enterprise workstations can help prevent some of the security problems the Internet can cause; but not everything. By understanding the different Open Systems Interconnect (OSI) levels and security threats involved with each one of them, it is easier to plan a strategy to combat security problems. Purpose and Scope To cover all areas I have listed the network security measures that are associated with each level of the Open Systems Interconnect (OSI).... [tags: Security Network Technology]
980 words (2.8 pages)
- Everything that is connected in a network is a part of a bigger network. Hence, a lot of information that is exchanged in a network is also accessible to a wide range of threats. There has to be some form of security, which can protect this valuable information from falling into the wrong hands. Major concerns of threats are misuse of information, manipulation of data and also destruction of valuable information. Network security plays a major role in protecting a network’s data from these types of threats.... [tags: Computer network, Internet]
1184 words (3.4 pages)
- Abstract— the network has become an important component of an organizational business process hence its management must be as secure as possible. Administrators are, hence, faced with the challenge of securing the network. Network security encompasses monitoring and securing the enterprise. The network security comprises of a system that keeps track of the status of a range of elements within a network. Enterprises, therefore, monitor, lock and secure their domains to ensure their security and possibly prevent cyber-attacks.... [tags: Security, Information security, Computer security]
1661 words (4.7 pages)
- We have conducted an audit of the Network Security Audit. This audit was conducted under the authority of Article VII, Section 5 of the Garland City Charter and in accordance with the Annual Audit Plan approved by the Garland City Council. Objective The objective of this audit is to: A. Provide management with an independent assessment relating to the effectiveness of physical controls in place to prevent unauthorized access to sensitive material. B. Provide management with an evaluation of the IT’s administrative controls that sets tone of an organization, influencing the controls consciousness of its people.... [tags: Security, Information security, Computer security]
1335 words (3.8 pages)
- Slide 8 Now that the network security team contained the incident and restored service, it was time to move to eradication. Eradication involves taking necessary steps to eliminate damage done during the incident and removing any vulnerabilities which may have allowed the incident to have success. Eradication in this incident means the removal of remote administration in the firewall configurations and patching of the system to remove critical vulnerabilities. If an attacker still maintains access to a system while the network team is investigating, eradication would involve disconnecting and denying further connections to or from the attacker.... [tags: Computer security, Information security, Security]
889 words (2.5 pages)
- ABSTRACT : This paper describes the basic threats to the network security and the basic issues of interest for designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers INTRODUCTION Over the past few years, Internet-enabled business, or e-business, has drastically improved efficiency and revenue growth. E-business applications such as e-commerce, supply-chain management, and remote access allow companies to streamline processes, lower operating costs, and increase customer satisfaction.... [tags: Networks Telecommunications]
1526 words (4.4 pages)