When it comes to networking and the security of networks, there are several different methods of protecting networks. Of these differing methods, some of them sound similar, but provide differing levels of security. In the following paragraphs, I will try to explain the differences between some of the methods used.
• Explain the difference between historical and statistical logging.
Logging is a simple way of keeping a record of activity on a network. There are several types of logs that can be kept, each providing different data that can be analyzed to provide information on potential ways of improving security over time. With historical logging, records are kept of ...view middle of the document...
File security is about setting permissions for people on individual files and folders, giving some people more options than others. For some people, they may be given read-only permissions, but not the ability to write to files. This insures that users cannot overwrite or delete files. Others may have full writing and editing rights. File security protects the integrity of the files and provides version controlling on files and documents.
•Explain the difference between secret and public keys.
Encryption can be a useful deterrent in keeping sensitive information out of the hands of those not authorized and for maintaining the security of a network. Some encryption schemes utilize a secret key and a public key. Each person on the protected network has both a public and a secret key. Everyone who wants to be able to send encrypted information to another person on the network uses the public key. The recipient then uses a secret key to decrypt the information sent. A user must have a secret key to unlock the information.
• Explain the difference between symmetric and asymmetric keys.
Symmetric and asymmetric keys are very similar in their use. With symmetric keys, both the sender and the receiver use the same secret key for encryption and decryption. One of the drawbacks with symmetric keys is that if the key is compromised on one end, it is compromised on both ends.
With asymmetric keys, also known as public key encryption, the sender and the receiver each use a different key for encryption and decryption. These keys are known as the public key and a secret key. The public key is used to encrypt data, which the recipient can then decrypt using the secret key.
• Explain the difference between digital certificate and digital postmark.
In simplest terms, a digital certificate is an attachment to an electronic message used for security purposes. A digital certificate is a means of insuring the authenticity of a message and that it actually originated...