Preview

Network Security Concepts

Powerful Essays
Open Document
Open Document
1883 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Network Security Concepts
Network Security Concepts
Name
NTC 410
Instructor 's Name
November 1, 2005

File security falls into two categories, encryption and access. Access to files can mean physical access to a computer with unsecured files or access via user permissions or privileges in the form of access control lists (ACLs) (Strengthen Your Users ' File Security, 2003). The files kept on a server with NTFS storage can be locked to prevent anyone who does not have the correct permissions from opening them. This is secure but can be bypassed with physical access to an open computer and should not be used for sensitive information. The other method of securing files is by encrypting the information in the files using an Encrypting File System (EFS), which employs public key encryption privileges (Strengthen Your Users ' File Security, 2003).
A firewall prevents access to an internal system from the outside the company via the internet on any open ports. A firewall will also prevent internal network users from accessing certain internet sites which could be dangerous or offensive (Shay, 2004). The firewall acts at the OSI model 's layers three and four by searching packets for certain types of headers (Shay, 2004). So, firewalls differ from file security because anyone inside the company can theoretically access files behind the firewall, while file security provides internal security against a company 's own workers.
Symmetric and asymmetric encryption differ from each other in that with symmetric encryption, the same key is used for both the encryption and decryption process. With asymmetric encryption, the keys are in pairs but are not the same, and one is used for encryption and another for decryption (Matuszek, 1999). Symmetric encryption is simple and faster than asymmetric encryption, with the security of the key being directly related to the length of the key. Asymmetric encryption has one key that is known only to the person receiving the encrypted data, which does not



References: Aber, R. (2004, May 7). Network security basics. Retrieved on November 2, 2005 from http://www.ciscopress.com/articles/article.asp?p=170742&seqNum=2 Arizona enterprise architecture target technology table Convery, S. (2004, June 18). General design considerations for secure networks. Retrieved on November 2, 2005 from http://www.ciscopress.com/ Cryptography Frazier, R. (n.d). Security Frameworks. Retrieved on November 2, 2005 from http://www.ccc.de/congress/2004/fahrplan/files/89-security-frameworks-paper.pdf Kozierik, A Matuszek, Steve (1999, March). Encryption. Retrieved on October 31, 2005 from http://www.cs.umbc.edu/ Mitchell, R PKI. (2002). Retrieved on November 1, 2005 from http://searchsecurity.techtarget.com Shay, William Song, K. (2004, February). The ABC 's of network security. Retrieved on November 1, 2005 from http://www.certmag.com/ Strengthen Your Users ' File Security with Windows XP Professional TLS. (2005). Retrieved on November 1, 2005 from http://www.webopedia.com/TERM/T/TLS.html Tomsho, G., Tittel, E Vulnerabilities in TCP. (2004, April 20). Retrieved on November 2, 2005 from http://www.net-security.org/advisory.php?id=3243

You May Also Find These Documents Helpful

  • Powerful Essays

    INDP Final Project

    • 1793 Words
    • 4 Pages

    References: Banathy, A., Panozzo, G., Gordy, A., & Senese, J. (2013, July). A Layered Approach to Network Security. Retrieved from http://www.industrial-ip.org/en/knowledge-center/solutions/security-and-compliance/a-layered-approach-to-network-security…

    • 1793 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    ITNE455-1204A-01 U3GP3

    • 5030 Words
    • 21 Pages

    Security is embraced by the executive management staff at MJD Electronics. An important task for the Chief Security and Compliance Officer for MJD Electronics is to outline a plan that makes considerations for many of the important aspects of valid security architecture. This discussion presents more detailed information on many topics that should be included in a solid security architecture including border routers, demilitarized zones, proxy firewalls, access control lists and filters, fail-safe equipment, and more.…

    • 5030 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 9 Lab 1

    • 334 Words
    • 2 Pages

    8. symmetric-key: It only needs one key to encrypt the message. And both user only need the same key to decode the message. And the in order to create the key is by moving the bit. asymmetric-key: It needs two different keys- public key and private key. Everyone can see the public key and only the person who has private key can decode the message.…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Paquet, C. (2013, February 5). Security Policies > Network Security Concepts and Policies. Retrieved from http://www.ciscopress.com/articles/article.asp?p=1998559&seqNum=3…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Project 1

    • 300 Words
    • 2 Pages

    The purpose of this summary is to explain the changes made in the to-be diagram from the previous as-is diagram. Also, to note the protective hardware added, and the justification for the changes made. The to-be diagram has been changed or altered to reflect a defense in depth approach. This diagram is upgraded with the addition of multiple security layers. This diagram has the removal of its wireless access points and the addition of VLAN subnetting for improving network performance and reducing network congestion.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    wk 4 lab 2

    • 403 Words
    • 1 Page

    2. An access control list (ACL), with respect to a computer file system, is a list of permissions attached to an object. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects. Each entry in a typical ACL specifies a subject and an operation.…

    • 403 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    Oppliger, R. (1997, May). Internet security: firewalls and beyond. Communication of the ACM Volume 40 Issue 5, pp. 92-100.…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Cloud Computing

    • 1194 Words
    • 5 Pages

    Network security architecture is the design and planning of the campus network that are aimed at reducing security risks in accordance with the institution’s risk and analysis policies. The traditional network design focused on creating a secure network perimeter and strategically places a firewall at the point where the network is connected to the internet. However, the traditional design is problematic and there is concern about security threats from inside the perimeter that is protected by the firewall.…

    • 1194 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Keyboard Hacking

    • 287 Words
    • 2 Pages

    Network security is a never ending battle between the system design engineers and the computer hackers. In an effort to keep the hackers out, engineers have developed an impressive array of encryption algorithms, authentication protocols and intrusion detection systems. The hackers have developed an equally impressive way of bypassing the security walls.…

    • 287 Words
    • 2 Pages
    Satisfactory Essays