interlock Security
Brian K. Mann
29 Sept 2012
American Military University
ISSC340: topical anesthetic Area Network Technologies
Professor Jeff Wang
The term mesh aegis encompasses exclusively activities that sm only and large businesses undertake to defend their operations. A successful network security tactic requires identifying threats and then choosing the more or less effective set of tools to combat them. Network Security is a broad area to discuss. The portion of network security I will explain is the defense, starting with cryptography and its functions within a network and end with physical security.
The following are considered coarse threats to the Network.
* Viruses - Software programs that cause damage and are spread from unrivalled computer to another.
* Trojan horse A type of malware that appears to be good software but as soon as it is loaded it will cause damage.
* Worm A writhe replicates itself and generally travels by email.
* Denial of Service attack - Floods the network with useless teaching.
* Social engineering getting technical information using nontechnical ways.
Tools that help against Network attacks
* Antivirus
* Layer 2-3 devices
* realistic Private Network (VPN)
* Authentication
* Encryption
* Security Management
One of the core principals of Network Security is the CIA Triad. The CIA Triad stands for Confidentiality, Integrity and Availability. Confidentiality is protecting your entropy from unauthorized access. Integrity is protecting your data from modification or undercut from unauthorized use. Availability ensures that data is available at all times to authorized users.
Confidentiality
Confidentiality
Network Security
Network Security
Integrity
Integrity
Availability
Availability
Putting it all together the CIA triad provides data confidentiality, while keeping data safe and available to the users it belongs to. Authentication, Authorization and Accounting help support...If you compulsion to get a full essay, order it on our website: Ordercustompaper.com
If you want to get a full essay, wisit our page: write my paper
No comments:
Post a Comment