This website uses cookies to ensure you have the best experience. Learn more

Network Security Concepts Essay

1772 words - 7 pages

Network Security Concepts

File security falls into two categories, encryption and access. Access to files can mean physical access to a computer with unsecured files or access via user permissions or privileges in the form of access control lists (ACLs) (Strengthen Your Users' File Security, 2003). The files kept on a server with NTFS storage can be locked to prevent anyone who does not have the correct permissions from opening them. This is secure but can be bypassed with physical access to an open computer and should not be used for sensitive information. The other method of securing files is by encrypting the information in the files using an Encrypting File System (EFS), which employs public key encryption privileges (Strengthen Your Users' File Security, 2003).
A firewall prevents access to an internal system from the outside the company via the internet on any open ports. A firewall will also prevent internal network users from accessing certain internet sites which could be dangerous or offensive (Shay, 2004). The firewall acts at the OSI model's layers three and four by searching packets for certain types of headers (Shay, 2004). So, firewalls differ from file security because anyone inside the company can theoretically access files behind the firewall, while file security provides internal security against a company's own workers.
Symmetric and asymmetric encryption differ from each other in that with symmetric encryption, the same key is used for both the encryption and decryption process. With asymmetric encryption, the keys are in pairs but are not the same, and one is used for encryption and another for decryption (Matuszek, 1999). Symmetric encryption is simple and faster than asymmetric encryption, with the security of the key being directly related to the length of the key. Asymmetric encryption has one key that is known only to the person receiving the encrypted data, which does not have to be shared with any users and one key that is public and known to many users (Matuszek, 1999).
Secret and private keys are very similar and are often used interchangeably. The difference is that secret keys are used for both encryption and decryption, while a private key is part of the public/private key system and is used only for decryption (Cryptography, 2005). In both cases, the key may be known only to a single person or a limited group of people in order to keep the key secure.
Public-Key Infrastructure (PKI) is a method of verifying users on a network, while a digital certificate is a reference from a neutral company that confirms the identity of an internet site (Shay, 2004, p. 321) and (Tomsho, G., Tittel, E. Johnson, D., 2004, P. 378). The digital certificate is issued by a Certificate Authority (CA) such as Verisign, and a registration authority (RA) that acts as a reference to identify an entity to a user of the website, and uses a directory that holds the certificate and can revoke a company's digital status. The PKI...

Find Another Essay On Network Security Concepts

Renewable Energy: Wind Energy Essay

983 words - 4 pages infrastructure should satisfy the bandwidth and latency requirements for proper data exchange and operation of the wind turbines and the control center. Conventional WPF communication infrastructure is a switch-based architecture, where independent sets of switches and communication links are used for different network applications including wind turbine generator networks, protection and control networks, and telephone and security networks. The design of

Executive Summary for Network Design Essay

4852 words - 19 pages organization. A firewall can contribute to the security of a network and the security administrator should have a sound understanding of network concepts and implementation. For instance, since most firewalls are transmission protocol based, a thorough understanding of this protocol is compulsory (The Sans Institute, 2000). Although a firewall is an important part of network security, data files and system configuration files should be backed up in

Networking and Management

4169 words - 17 pages , however a dedicated computer should be chosen. Anyone with a computer and modem can join this network by using a standard phone. Dedicating the server that is, using a computer as a server only helps avoid some security and basic problems that result from sharing the functions of the server. To gain access to the Internet you will require an engineer to install the broadband modem. Then you will be able to use the server to network the Internet on

Functions of A Wide Area Network

2186 words - 9 pages ) Circuit ISDN 64 Kbps – 1.92 Mbps Circuit xDSL 600 Kbps – 51.84 Mbps receive 64 Kbps – 2.3 Mbps send Packet X.25 Up to 64K Packet Frame Relay 56 Kbps – 1.5 Mbps (for T1) 45 Mbps (T3) Packet ATM 25 Mbps, 100 Mbps, 155 Mbps, 622 Mbps, 2.488 Gbps Packet (cell) Wide Area Network Threat Analysis Top Network Security Risks 1. Un-patched servers The user of the server in the corporate network which is the two people who are exposed to

Security in the Business Environment

1919 words - 8 pages are required when you send sensitive data outside of a trusted network. The SMF does not consider mandates for conversations about the same sensitive information. The following elements are within the scope of this SMF: • Developing security leadership and methods of assessing security risks within the overall enterprise security blueprint • Identifying strategic and tactical components (policy and plans, respectively) • Providing a

A report on Network Security based on the text: Ahuja, V. (1996). Network & Internet Security. Massachusetts: Academic Press Inc

1343 words - 5 pages A secure network is critical for the survival and success of many businesses. The rapid evolution of client/server networks, the phenomenal increase in the number of networks attached to the Internet, the widespread use of web browsers, and the growing commerce on the internet each require that communication networks are secure. Security concerns for private networks as well as for the Internet range from exposures to computer viruses to break

Week 9 Final

1396 words - 6 pages the concepts of objects, subjects and tag. Mandatory admission controls are of much interest in governmental and military systems and are of less interest commercially. In this system, objects are usually tag with a classification. 5.3 Working from distant locations leads to the employment of unsafe networks and hence cause in additional security issues. Additional access control mechanisms are needed to manage with these problems and to defend

How the OSI model works

600 words - 2 pages starters.That's not all there is to it though. At the applicationlayer, I may not want people in my room to talk about sexor drugs. These are "services" that I won't allow. So, asa technician I can manage the security of the network sothat I can control what type of communications occur. Imay also NOT want a particular crowd of people to enter myroom. So, I can install a firewall to filter out who isallowed to enter my room (network).

Auditing the IT Security Function: An Effective Framework

3483 words - 14 pages environment and objectives. For example, Goodman Network Inc. (2002) offers security consulting service under 4 security control groups: Management Control, Application Control, Operational Control and Network Security that is different security scope from NIST SP 800-26.Finding and Management Response for IT Security SystemsIn order to match organisation's requirement and environment with IT security function, an organisation should review the IT

Security Management at The Tower

735 words - 3 pages . This thing increased the risk to the highest level. Also the IT directors and the IT staff should carry all responsibilities about all Vulnerabilities happened to the system. This is my fourth case study and I hope you like it. Best Regards Mohammed Almohdar References [1], [2]. Stallings, W., & Brown L. (2012). Computer security: Principles and practice. Boston, MA: Prentice Hall. Raggad, B. (2010). Information security management : concepts and practice. Boca Raton, FL: CRC Press/Taylor & Francis. Tipton, H. & Nozaki, M. (2007). Information security management handbook. Boca Raton: Auerbach Publications.

Major Concepts Define and explain how the major concepts of Forests, Domains, and Organizational Units and how they are used when developing an AD schema for any company

576 words - 2 pages Major Concepts PAGE 1 Running head: MAJOR CONCEPTSMajor ConceptsMelissa SanoUniversity of PhoenixMajor ConceptsThis paper will define and explain the major concepts of Domains, Forests, and Organizational Units. This paper will also address how each is used when developing an Active Directory schema for any company.DomainsA domain consists of a group of computers and resources that share a mutual security database, such as Active Directory

Similar Essays

Network Design Essay

1566 words - 6 pages Concepts). Availability is “one that delivers consistent, reliable performance, 24 hours a day, 7 days a week”(Introducing Network Design Concepts). Security is “a feature that must be designed into the network, not added on after the network is complete. Planning the location of security devices, filters, and firewall features is critical to safeguarding network resources”(Introducing Network Design Concepts) and Manageability is “No matter how good

Implementing A New Wide Secure Wireless Network At Brigham Young University Hawaii

2628 words - 11 pages organization requirements of the wireless networks. Wireless Network Security threats and attacks and their requirements: Network security is one of the major concepts to be looked into while designing a network. Network security refers to various policies adopted by a network administrator to prevent the unauthenticated access and misuse of the various computer networks. With the change of wireless networks in almost each and every environment

Workplace Systems Support Essay

637 words - 3 pages administrator implements to improve the security of a network. If the network is connected to an ISP, the primary defense is to install either a software or hardware firewall between the network and its access to the internet. Firewalls are devices that monitor entry into a network. A firewall examines data and determines whether to pass it through or to discard it based on a set of predefined rules. Firewall products can take many forms, from a

Security Audit Essay

2192 words - 9 pages place to protect the company against loss of information to the outside world. This paper addresses all the issues involved in security auditing of Ariam travel agency’s network and its premises. Security Audit Ariam travel agency handles bulk information that contains sensitive customers and employees’ information; it contains multiple external users and various e-commerce applications. Therefore, data security at this company is very