This website uses cookies to ensure you have the best experience. Learn more

Network Security Essay

966 words - 4 pages

Network Security
When it comes to networking and the security of networks, there are several different methods of protecting networks. Of these differing methods, some of them sound similar, but provide differing levels of security. In the following paragraphs, I will try to explain the differences between some of the methods used.
• Explain the difference between historical and statistical logging.
Logging is a simple way of keeping a record of activity on a network. There are several types of logs that can be kept, each providing different data that can be analyzed to provide information on potential ways of improving security over time. With historical logging, records are kept of ...view middle of the document...

File security is about setting permissions for people on individual files and folders, giving some people more options than others. For some people, they may be given read-only permissions, but not the ability to write to files. This insures that users cannot overwrite or delete files. Others may have full writing and editing rights. File security protects the integrity of the files and provides version controlling on files and documents.
•Explain the difference between secret and public keys.
Encryption can be a useful deterrent in keeping sensitive information out of the hands of those not authorized and for maintaining the security of a network. Some encryption schemes utilize a secret key and a public key. Each person on the protected network has both a public and a secret key. Everyone who wants to be able to send encrypted information to another person on the network uses the public key. The recipient then uses a secret key to decrypt the information sent. A user must have a secret key to unlock the information.
• Explain the difference between symmetric and asymmetric keys.
Symmetric and asymmetric keys are very similar in their use. With symmetric keys, both the sender and the receiver use the same secret key for encryption and decryption. One of the drawbacks with symmetric keys is that if the key is compromised on one end, it is compromised on both ends.
With asymmetric keys, also known as public key encryption, the sender and the receiver each use a different key for encryption and decryption. These keys are known as the public key and a secret key. The public key is used to encrypt data, which the recipient can then decrypt using the secret key.
• Explain the difference between digital certificate and digital postmark.
In simplest terms, a digital certificate is an attachment to an electronic message used for security purposes. A digital certificate is a means of insuring the authenticity of a message and that it actually originated...

Other Papers Like Network Security

Network Security Assessment Essay

3062 words - 13 pages  Network Security Assessment Prepared for: University of Maryland University College Prepared by: David Yurchak I. Vulnerability Assessments In the same way as other associations in the monetary administrations and different segments, agent merchants (firms) are the objective of digital assaults. The recurrence and complexity of these assaults are expanding, and individual intermediary merchants and the business, in

Network Security Administration Essay

823 words - 4 pages Unit 2. Assignment 1. Disk Redundancy Research 1. What does RAID stand for? RAID (originally redundant array of inexpensive disks, now commonly redundant array of independent disks) (unknown, 2015) 2. When would we use RAID? You would use RAID when you have a lot of important data that you are constantly changing and need to back up often. 3. Define the following types of RAID. a. RAID 0 RAID 0 consists of striping, without mirroring or Lab Cnaa

608 words - 3 pages Lab – Researching Network Security Threats Objectives Part 1: Explore the SANS Website Navigate to the SANS website and identify resources. Part 2: Identify Recent Network Security Threats Identify several recent network security threats using the SANS site. Identify sites beyond SANS that provide network security threat information. Part 3: Detail a Specific Network Security Threat Select and detail a specific recent network threat


269 words - 2 pages Ruben Quinones IT245 - Introduction to Network Management Colorado Technical University Online Professor: Dr. Shawn P. Murray Phase 1 Individual Project Due January 13, 2013 Table of Contents Section 1: Target Organization - Identifying the Network 3 Section 2: Diagramming the Network - Network Architecture 4 Section 3: Network Models 5 Section 4: Network Protocols and Agents 6 Section 5: Network Security 7 Section 6: Network


874 words - 4 pages Essay Designing a Security Strategy Geo-Probe Inc. (GPI) 20 years in business, a company with constant growth and success. GPI provides construction management, engineering design, programming and environmental planning, and other A-E projects in support of a, industry, different government and commercial clients. GPI has 300 employees and ten branch office locations. GPI has many computers and network device attach to their network like any

Computer Security In Education

330 words - 2 pages Maintaining internet security is of the utmost importance to higher education systems. The majority of universities’ administrative, financial, and clinical systems are available through a campus-wide network (Rasmussen, 2011). This means that highly confidential documents, such as student’s personal information, medical records, and much more are housed on campus servers. This information is vulnerable to security threats and puts the

Week 7 Project Paper

3453 words - 14 pages American Military University All about Network Security: Network Security Means Never Giving an Adversary a Chance. Anthony Portz 4199864 ISSC340 I001 SPR 14 Professor Alidad Jalinous June 16th, 2014 11:55 PM Introduction In this paper I will discuss network security and I will give a detailed description of the area while discussing different technologies that are involved. There are many ways to provide network security and a

Conduct a Network Traffic Analysis & Baseline Definition

606 words - 3 pages tools and protocol analyzers as an information systems security professional? Protocol capture tools and protocol analyzers are important tools for an information systems security professional. These utilities can be used to troubleshoot issues on the network. They can verify adherence to corporate policies, such as whether or not clear text privacy data is being sent on the network. They can be used to test security countermeasures and firewall

Ethical Hacking

1144 words - 5 pages reports findings, does not solve problems  Security test  More than an attempt to break in; also includes analyzing company’s security policy and procedures  Tester offers solutions to secure or protect the network Hands-On Ethical Hacking and Network Defense 3  Hackers  Access computer system or network without authorization  Breaks the law; can go to prison  Crackers  Break into systems to steal or destroy data

Face Detetction

1038 words - 5 pages scalable. The Peer-to-peer network are useful only for a network with fewer computers and are suitable for applications that do not require a high level of security as * There is a lack of security * The links in the network are not reliable * The system is not centralized, making the network administration difficult. * Network security has to be applied to individual computers on the network * Lack of centralized server to

Network Design

863 words - 4 pages location information for the devices. Provide a comprehensive list of devices including the quantity of each device needed. Justification Justify your determination that the selected network devices will meet the business needs. D. Network Security Devices Business Needs Assess the business needs. Proposed Network Security Devices Select network security devices to use to secure the network. Include setup and location information for

Related Essays

Network Security Essay

1846 words - 8 pages A 5 page paper on network security with 5 references NETWORK SECURITY Let us go back, twelve years. Where's Internet? Concentrated in the cables that connect the offices and cubicles of the American ministry of defense. Things were simple, and despite the sensitive nature of the data transferred no body talked about net work security, no body knew what was to follow. Some how a revolution was triggered, the information net burst out of its

Network Security Essay

586 words - 3 pages Nasario Birrueta IT 200: Milestone Three Network Security Network security is one of the most important aspects of implementing a fully functional working network, downtime caused by poor network security can cause major economic loses. The two matters that need to be addressed is the User and Physical equipment. Network security begins with the user. As such would implement a Network Use policy that the employee must sign and

Network Security Essay

1817 words - 8 pages data between networks, and serving as a router when routing data to individual systems. Brouter functions as a filter that allows some data into the local network and redirects unknown data to the other network. 2) Enhance security using NAC/NAP methodologies Network access control (NAC) products entered the market a few years ago to fill this gap. A typical NAC solution provides an endpoint assessment of the computer and then enables access

Network Security And Management Essay

3952 words - 16 pages Network Security and Management Brandi Schoch CTU Online Introduction to Network Management IT245-1403A-09 Jennifer Gaddy August 11, 2014 Table of Contents Table of Contents 2 Identifying the Network 3 The Organization 3 Network Servers 3 Network Personnel 3 Diagramming the Network 5 Network Architecture 5 Speed and Distance 6 Access Method 6 Network Models 8 OSI Model 8 FCAPS Model 11 The Diagrams 13