SlideShare a Scribd company logo
1 of 6
Answer each question in one to two paragraphs
.
Question 1:
Layered Network Defense
Network security has become a complicated topic due to the
many types of threats to network information and systems. To
defend against these threats, a layered network defense strategy
must be utilized. What are the major components of a layered
network defense model and what role does each of the layers
play in the overall defense of the network against security
threats?
Question 2: Risk Analysis
Properly securing a network is like building security around
your home. You can invest a lot of money is security systems
that defend against threats that do not exist in your
neighborhood. The first step in developing good security is to
understand what threats exist. What are the major security
threats that exist for a typical company and how might they
determine which threats present the most risk for them and their
situation?
Question 3:
Security Policy
Securing a network consists of much more than just installing
the appropriate hardware and software. A company must have a
good set of policies in place to help make the decisions
necessary to properly implement their network security. Discuss
the major components of a good security policy.
Question 4: Goals of Network Security
One size does not fit all with regards to network security. A
company or organization must understand what they are trying
to accomplish with their network security. These goals will help
drive the decisions necessary to implement a good security
system. List some examples of goals a company or organization
might set for their security system and discuss what types of
security they might use to achieve these goals.
Question 5: Intrusion Detection
Networks often contain valuable information and are the target
of threats to acquire the information or damage the information.
Intruders pose a significant threat to networks and the first step
in thwarting intrusion is to understand when and how it is
occurring. What are some of the ways intruders can be detected
in a network and what can be done to reduce this network
threat?
Question 6: Digital Signatures
One of the most difficult aspects of network security is
identification. If all people and devices connected to the
network could be identified during every network transmission,
security would be greatly improved. Unfortunately, this is not
an easy task. Digital signatures help in identification of network
transmissions. Discuss how digital signatures work and what
aspects of network security they enhance.
Question 7:
Access Control Lists
A common method of gaining improved network security is to
create a list of authorized users for all network resources. These
lists are called Access Control Lists or ACLs. ACLs are like
airline reservations. You arrive at the gate and if you have a
boarding pass, you can get on the plane. Without a boarding
pass, you are left at the gate and the plane is off limits. Discuss
how Access Control Lists work and the role they play in
network security.
Question 8:
Authentication and Authorization
The terms authentication and authorization are often confused.
Authentication relates to determining who the user is and
authorization relates to what resources a user can access.
Discuss the definition of each of these terms with respect to
network security. Also discuss the role each of these concepts
plays in network security.
Question 9: Internet Security
The expansion of the Internet has created a significant number
of new network threats. While businesses combat Internet
security threats, employees continue to expand their use of the
Internet. What limitations should be placed on the use of the
Internet at work to reduce security threats while still allowing
employees to reap the benefits provided by Internet access?
Question 10: Web Security
The Web has become a major part of company and organization
network traffic. Virtually all businesses and organizations have
a Web presence, and most businesses have some type of Web
applications running to allow customers and employees to
interact with the company network in some fashion. Discuss the
security issues related to Web exposure for a company.
Question 11:
Security Models
Protection of a company network can be a complicated
endeavor. A good model helps in the design of these network
security systems just like a good model helps in the design of
any system. What are the major components of a good security
model and how do these components fit into the overall security
of the network?
Question 12: Firewalls
If you can build a big and strong enough wall around your
house, you should be safe from outside attacks. In order to
communicate with the outside world, you have to allow mail to
be delivered and you probably want to talk to people outside of
your house by telephone. Each bit of communication you allow
puts you at increased risk. Firewalls are for the perimeter
protection of a company network in much the same way as a
wall around your house is for your personal protection. Discuss
the basics of how firewalls work and the role they play in
network security.
Question 13: Wireless Networking
Wireless computing has become a significant part of business
networking due to the rapid expansion of the use of mobile
devices in business environments. Security risks have increased
as a result. What steps should a business take to ensure
productive support of wireless communications while
maintaining strong security?
Question 14: Remote Access Security
An increasing number of people work from home or while
travelling, and often need access to their company network.
This type of remote access can create significant security
issues. Discuss how these security risks can be minimized while
still allowing the type of remote access needed.
Question 15:
Cryptology
Regardless of how well data transmissions are protected, there
are still ways intruders can intercept the data and try to make
use of it for their own purposes. Cryptology adds another level
of defense against those by transforming the communications
into a format only decipherable by the people or systems with
the right information. Discuss the basics of how cryptology
works and how it can most effectively be used in network
security.
Question 16: Secure Data Transmission
If we had no need to transmit data from one user or device to
another, we would greatly reduce security problems. Data
transmission, and lots of it, is required to operate a business, so
the best approach is to make those transmissions secure.
Discuss the meaning of secure data transmission and the major
issues that must be addressed to achieve secure data
transmissions in a network.

More Related Content

Similar to Answer each question in one to two paragraphs.Question 1

McNair_Paper_Hill
McNair_Paper_HillMcNair_Paper_Hill
McNair_Paper_Hill
Dennis Hill
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
audeleypearl
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
cuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
salmonpybus
 
Policy DB2 WEEK 3Discussion #2 Week 3 Minimun 250 words an
 Policy DB2 WEEK  3Discussion #2 Week 3   Minimun 250 words an Policy DB2 WEEK  3Discussion #2 Week 3   Minimun 250 words an
Policy DB2 WEEK 3Discussion #2 Week 3 Minimun 250 words an
sachazerbelq9l
 

Similar to Answer each question in one to two paragraphs.Question 1 (13)

GITA March 2015 Newsletter
GITA March 2015 NewsletterGITA March 2015 Newsletter
GITA March 2015 Newsletter
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
McNair_Paper_Hill
McNair_Paper_HillMcNair_Paper_Hill
McNair_Paper_Hill
 
Intrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIntrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile Networks
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
 
Security Transformation
Security TransformationSecurity Transformation
Security Transformation
 
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESE-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Security
 
Network_Security1.pdf.pdf
Network_Security1.pdf.pdfNetwork_Security1.pdf.pdf
Network_Security1.pdf.pdf
 
Career guide on cyber security
Career guide on cyber securityCareer guide on cyber security
Career guide on cyber security
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Policy DB2 WEEK 3Discussion #2 Week 3 Minimun 250 words an
 Policy DB2 WEEK  3Discussion #2 Week 3   Minimun 250 words an Policy DB2 WEEK  3Discussion #2 Week 3   Minimun 250 words an
Policy DB2 WEEK 3Discussion #2 Week 3 Minimun 250 words an
 

More from brockdebroah

Title Domestic violence.I just need Body ( main point 1 interper.docx
Title Domestic violence.I just need Body ( main point 1 interper.docxTitle Domestic violence.I just need Body ( main point 1 interper.docx
Title Domestic violence.I just need Body ( main point 1 interper.docx
brockdebroah
 
Throughout this course, you have completed journal entries that were.docx
Throughout this course, you have completed journal entries that were.docxThroughout this course, you have completed journal entries that were.docx
Throughout this course, you have completed journal entries that were.docx
brockdebroah
 
Throughout this unit, you have learned about many changes and social.docx
Throughout this unit, you have learned about many changes and social.docxThroughout this unit, you have learned about many changes and social.docx
Throughout this unit, you have learned about many changes and social.docx
brockdebroah
 
Though there is still much to learn, you have been considering found.docx
Though there is still much to learn, you have been considering found.docxThough there is still much to learn, you have been considering found.docx
Though there is still much to learn, you have been considering found.docx
brockdebroah
 
those are the topic... among 4 you can choose any oneThe Hebrew Bi.docx
those are the topic... among 4 you can choose any oneThe Hebrew Bi.docxthose are the topic... among 4 you can choose any oneThe Hebrew Bi.docx
those are the topic... among 4 you can choose any oneThe Hebrew Bi.docx
brockdebroah
 

More from brockdebroah (20)

Title Apple IncorporationI.Organization Background A..docx
Title Apple IncorporationI.Organization Background A..docxTitle Apple IncorporationI.Organization Background A..docx
Title Apple IncorporationI.Organization Background A..docx
 
Title Domestic violence.I just need Body ( main point 1 interper.docx
Title Domestic violence.I just need Body ( main point 1 interper.docxTitle Domestic violence.I just need Body ( main point 1 interper.docx
Title Domestic violence.I just need Body ( main point 1 interper.docx
 
Times Roman 12pt, double spaced, in-text citations, APA Format and R.docx
Times Roman 12pt, double spaced, in-text citations, APA Format and R.docxTimes Roman 12pt, double spaced, in-text citations, APA Format and R.docx
Times Roman 12pt, double spaced, in-text citations, APA Format and R.docx
 
Times Roman 12 and double spacedCreate an illustration of th.docx
Times Roman 12 and double spacedCreate an illustration of th.docxTimes Roman 12 and double spacedCreate an illustration of th.docx
Times Roman 12 and double spacedCreate an illustration of th.docx
 
Tire shop, call it Goodyear project.  Ideas include a facility m.docx
Tire shop, call it Goodyear project.  Ideas include a facility m.docxTire shop, call it Goodyear project.  Ideas include a facility m.docx
Tire shop, call it Goodyear project.  Ideas include a facility m.docx
 
Throughout this course, you have completed journal entries that were.docx
Throughout this course, you have completed journal entries that were.docxThroughout this course, you have completed journal entries that were.docx
Throughout this course, you have completed journal entries that were.docx
 
Throughout this course you have been considering many aspects, chara.docx
Throughout this course you have been considering many aspects, chara.docxThroughout this course you have been considering many aspects, chara.docx
Throughout this course you have been considering many aspects, chara.docx
 
Throughout the years, scientists have engaged in an array of ethical.docx
Throughout the years, scientists have engaged in an array of ethical.docxThroughout the years, scientists have engaged in an array of ethical.docx
Throughout the years, scientists have engaged in an array of ethical.docx
 
Thyme Herbal Plant Research Term Project, Part 3 Folklore, Myths an.docx
Thyme Herbal Plant Research Term Project, Part 3 Folklore, Myths an.docxThyme Herbal Plant Research Term Project, Part 3 Folklore, Myths an.docx
Thyme Herbal Plant Research Term Project, Part 3 Folklore, Myths an.docx
 
Throughout this unit, you have learned about many changes and social.docx
Throughout this unit, you have learned about many changes and social.docxThroughout this unit, you have learned about many changes and social.docx
Throughout this unit, you have learned about many changes and social.docx
 
Thwarted AttacksResearch recent cases of thwarted domestic terror .docx
Thwarted AttacksResearch recent cases of thwarted domestic terror .docxThwarted AttacksResearch recent cases of thwarted domestic terror .docx
Thwarted AttacksResearch recent cases of thwarted domestic terror .docx
 
Through the years, nursing has tried to improve care to patients by .docx
Through the years, nursing has tried to improve care to patients by .docxThrough the years, nursing has tried to improve care to patients by .docx
Through the years, nursing has tried to improve care to patients by .docx
 
Though there is still much to learn, you have been considering found.docx
Though there is still much to learn, you have been considering found.docxThough there is still much to learn, you have been considering found.docx
Though there is still much to learn, you have been considering found.docx
 
Three discussion questions, APA1. Discuss the advantages and disad.docx
Three discussion questions, APA1. Discuss the advantages and disad.docxThree discussion questions, APA1. Discuss the advantages and disad.docx
Three discussion questions, APA1. Discuss the advantages and disad.docx
 
Those charged with sentencing embraces a number of philosophies to s.docx
Those charged with sentencing embraces a number of philosophies to s.docxThose charged with sentencing embraces a number of philosophies to s.docx
Those charged with sentencing embraces a number of philosophies to s.docx
 
those are the topic... among 4 you can choose any oneThe Hebrew Bi.docx
those are the topic... among 4 you can choose any oneThe Hebrew Bi.docxthose are the topic... among 4 you can choose any oneThe Hebrew Bi.docx
those are the topic... among 4 you can choose any oneThe Hebrew Bi.docx
 
Thoroughly analyze the term white collar crime.  How has the meani.docx
Thoroughly analyze the term white collar crime.  How has the meani.docxThoroughly analyze the term white collar crime.  How has the meani.docx
Thoroughly analyze the term white collar crime.  How has the meani.docx
 
this work is handled by jahguy.... please fixed nowwwwyou .docx
this work is handled by jahguy.... please fixed nowwwwyou .docxthis work is handled by jahguy.... please fixed nowwwwyou .docx
this work is handled by jahguy.... please fixed nowwwwyou .docx
 
Thisprovidesanopportunitytoputintopracticethepri.docx
Thisprovidesanopportunitytoputintopracticethepri.docxThisprovidesanopportunitytoputintopracticethepri.docx
Thisprovidesanopportunitytoputintopracticethepri.docx
 
This will be an Peer-reviewed article using the APA guidelines, that.docx
This will be an Peer-reviewed article using the APA guidelines, that.docxThis will be an Peer-reviewed article using the APA guidelines, that.docx
This will be an Peer-reviewed article using the APA guidelines, that.docx
 

Recently uploaded

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 

Answer each question in one to two paragraphs.Question 1

  • 1. Answer each question in one to two paragraphs . Question 1: Layered Network Defense Network security has become a complicated topic due to the many types of threats to network information and systems. To defend against these threats, a layered network defense strategy must be utilized. What are the major components of a layered network defense model and what role does each of the layers play in the overall defense of the network against security threats? Question 2: Risk Analysis Properly securing a network is like building security around your home. You can invest a lot of money is security systems that defend against threats that do not exist in your neighborhood. The first step in developing good security is to understand what threats exist. What are the major security threats that exist for a typical company and how might they determine which threats present the most risk for them and their situation? Question 3: Security Policy
  • 2. Securing a network consists of much more than just installing the appropriate hardware and software. A company must have a good set of policies in place to help make the decisions necessary to properly implement their network security. Discuss the major components of a good security policy. Question 4: Goals of Network Security One size does not fit all with regards to network security. A company or organization must understand what they are trying to accomplish with their network security. These goals will help drive the decisions necessary to implement a good security system. List some examples of goals a company or organization might set for their security system and discuss what types of security they might use to achieve these goals. Question 5: Intrusion Detection Networks often contain valuable information and are the target of threats to acquire the information or damage the information. Intruders pose a significant threat to networks and the first step in thwarting intrusion is to understand when and how it is occurring. What are some of the ways intruders can be detected in a network and what can be done to reduce this network threat? Question 6: Digital Signatures One of the most difficult aspects of network security is identification. If all people and devices connected to the network could be identified during every network transmission, security would be greatly improved. Unfortunately, this is not an easy task. Digital signatures help in identification of network
  • 3. transmissions. Discuss how digital signatures work and what aspects of network security they enhance. Question 7: Access Control Lists A common method of gaining improved network security is to create a list of authorized users for all network resources. These lists are called Access Control Lists or ACLs. ACLs are like airline reservations. You arrive at the gate and if you have a boarding pass, you can get on the plane. Without a boarding pass, you are left at the gate and the plane is off limits. Discuss how Access Control Lists work and the role they play in network security. Question 8: Authentication and Authorization The terms authentication and authorization are often confused. Authentication relates to determining who the user is and authorization relates to what resources a user can access. Discuss the definition of each of these terms with respect to network security. Also discuss the role each of these concepts plays in network security. Question 9: Internet Security The expansion of the Internet has created a significant number of new network threats. While businesses combat Internet security threats, employees continue to expand their use of the Internet. What limitations should be placed on the use of the
  • 4. Internet at work to reduce security threats while still allowing employees to reap the benefits provided by Internet access? Question 10: Web Security The Web has become a major part of company and organization network traffic. Virtually all businesses and organizations have a Web presence, and most businesses have some type of Web applications running to allow customers and employees to interact with the company network in some fashion. Discuss the security issues related to Web exposure for a company. Question 11: Security Models Protection of a company network can be a complicated endeavor. A good model helps in the design of these network security systems just like a good model helps in the design of any system. What are the major components of a good security model and how do these components fit into the overall security of the network? Question 12: Firewalls If you can build a big and strong enough wall around your house, you should be safe from outside attacks. In order to communicate with the outside world, you have to allow mail to be delivered and you probably want to talk to people outside of your house by telephone. Each bit of communication you allow puts you at increased risk. Firewalls are for the perimeter protection of a company network in much the same way as a wall around your house is for your personal protection. Discuss
  • 5. the basics of how firewalls work and the role they play in network security. Question 13: Wireless Networking Wireless computing has become a significant part of business networking due to the rapid expansion of the use of mobile devices in business environments. Security risks have increased as a result. What steps should a business take to ensure productive support of wireless communications while maintaining strong security? Question 14: Remote Access Security An increasing number of people work from home or while travelling, and often need access to their company network. This type of remote access can create significant security issues. Discuss how these security risks can be minimized while still allowing the type of remote access needed. Question 15: Cryptology Regardless of how well data transmissions are protected, there are still ways intruders can intercept the data and try to make use of it for their own purposes. Cryptology adds another level of defense against those by transforming the communications into a format only decipherable by the people or systems with the right information. Discuss the basics of how cryptology works and how it can most effectively be used in network security.
  • 6. Question 16: Secure Data Transmission If we had no need to transmit data from one user or device to another, we would greatly reduce security problems. Data transmission, and lots of it, is required to operate a business, so the best approach is to make those transmissions secure. Discuss the meaning of secure data transmission and the major issues that must be addressed to achieve secure data transmissions in a network.