SlideShare a Scribd company logo
1 of 6
Answer each question in one to two paragraphs.
Question 1: Layered Network Defense
Network security has become a complicated topic due to the
many types of threats to network information and systems. To
defend against these threats, a layered network defense strategy
must be utilized. What are the major components of a layered
network defense model and what role does each of the layers
play in the overall defense of the network against security
threats?
Question 2: Risk Analysis
Properly securing a network is like building security around
your home. You can invest a lot of money is security systems
that defend against threats that do not exist in your
neighborhood. The first step in developing good security is to
understand what threats exist. What are the major security
threats that exist for a typical company and how might they
determine which threats present the most risk for them and their
situation?
Question 3: Security Policy
Securing a network consists of much more than just installing
the appropriate hardware and software. A company must have a
good set of policies in place to help make the decisions
necessary to properly implement their network security.
Discuss the major components of a good security policy.
Question 4: Goals of Network Security
One size does not fit all with regards to network security. A
company or organization must understand what they are trying
to accomplish with their network security. These goals will
help drive the decisions necessary to implement a good security
system. List some examples of goals a company or organization
might set for their security system and discuss what types of
security they might use to achieve these goals.
Question 5: Intrusion Detection
Networks often contain valuable information and are the target
of threats to acquire the information or damage the information.
Intruders pose a significant threat to networks and the first step
in thwarting intrusion is to understand when and how it is
occurring. What are some of the ways intruders can be detected
in a network and what can be done to reduce this network
threat?
Question 6: Digital Signatures
One of the most difficult aspects of network security is
identification. If all people and devices connected to the
network could be identified during every network transmission,
security would be greatly improved. Unfortunately, this is not
an easy task. Digital signatures help in identification of
network transmissions. Discuss how digital signatures work
and what aspects of network security they enhance.
Question 7: Access Control Lists
A common method of gaining improved network security is to
create a list of authorized users for all network resources.
These lists are called Access Control Lists or ACLs. ACLs are
like airline reservations. You arrive at the gate and if you have
a boarding pass, you can get on the plane. Without a boarding
pass, you are left at the gate and the plane is off limits. Discuss
how Access Control Lists work and the role they play in
network security.
Question 8: Authentication and Authorization
The terms authentication and authorization are often confused.
Authentication relates to determining who the user is and
authorization relates to what resources a user can access.
Discuss the definition of each of these terms with respect to
network security. Also discuss the role each of these concepts
plays in network security.
Question 9: Internet Security
The expansion of the Internet has created a significant number
of new network threats. While businesses combat Internet
security threats, employees continue to expand their use of the
Internet. What limitations should be placed on the use of the
Internet at work to reduce security threats while still allowing
employees to reap the benefits provided by Internet access?
Question 10: Web Security
The Web has become a major part of company and organization
network traffic. Virtually all businesses and organizations have
a Web presence, and most businesses have some type of Web
applications running to allow customers and employees to
interact with the company network in some fashion. Discuss the
security issues related to Web exposure for a company.
Question 11: Security Models
Protection of a company network can be a complicated
endeavor. A good model helps in the design of these network
security systems just like a good model helps in the design of
any system. What are the major components of a good security
model and how do these components fit into the overall security
of the network?
Question 12: Firewalls
If you can build a big and strong enough wall around your
house, you should be safe from outside attacks. In order to
communicate with the outside world, you have to allow mail to
be delivered and you probably want to talk to people outside of
your house by telephone. Each bit of communication you allow
puts you at increased risk. Firewalls are for the perimeter
protection of a company network in much the same way as a
wall around your house is for your personal protection. Discuss
the basics of how firewalls work and the role they play in
network security.
Question 13: Wireless Networking
Wireless computing has become a significant part of business
networking due to the rapid expansion of the use of mobile
devices in business environments. Security risks have increased
as a result. What steps should a business take to ensure
productive support of wireless communications while
maintaining strong security?
Question 14: Remote Access Security
An increasing number of people work from home or while
travelling, and often need access to their company network.
This type of remote access can create significant security
issues. Discuss how these security risks can be minimized
while still allowing the type of remote access needed.
Question 15: Cryptology
Regardless of how well data transmissions are protected, there
are still ways intruders can intercept the data and try to make
use of it for their own purposes. Cryptology adds another level
of defense against those by transforming the communications
into a format only decipherable by the people or systems with
the right information. Discuss the basics of how cryptology
works and how it can most effectively be used in network
security.
Question 16: Secure Data Transmission
If we had no need to transmit data from one user or device to
another, we would greatly reduce security problems. Data
transmission, and lots of it, is required to operate a business, so
the best approach is to make those transmissions secure.
Discuss the meaning of secure data transmission and the major
issues that must be addressed to achieve secure data
transmissions in a network.
Answer each topic in at least two paragraphs.
Topic 1: List and briefly discuss categories of security services.
Topic 2: Brief discuss the Playfair cipher.
Topic 3: Discuss how the Data Encryption Standard (DES)
works.
Topic 4: Discuss the strength of the Data Encryption Standard
(DES).
Topic 5: Briefly discuss the main difference between public key
cryptography and DES
Topic 6: Briefly discuss the RSA encryption algorithm.
Topic 7: Briefly discuss, using your own experience, various
virtual private networks and various access control approaches.
Topic 8: Briefly discuss secure e-mail communications using
cryptographic protocols and secure wireless communications
using cryptographic protocols.

More Related Content

Similar to Answer each question in one to two paragraphs.Question 1 .docx

Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxasharshaikh8
 
Policy DB2 WEEK 3Discussion #2 Week 3 Minimun 250 words an
 Policy DB2 WEEK  3Discussion #2 Week 3   Minimun 250 words an Policy DB2 WEEK  3Discussion #2 Week 3   Minimun 250 words an
Policy DB2 WEEK 3Discussion #2 Week 3 Minimun 250 words ansachazerbelq9l
 
Chapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t hChapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t hWilheminaRossi174
 
Security Transformation
Security TransformationSecurity Transformation
Security TransformationFaisal Yahya
 
Network_Security1.pdf.pdf
Network_Security1.pdf.pdfNetwork_Security1.pdf.pdf
Network_Security1.pdf.pdfahmed53254
 
Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.uNIX Jim
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxinfosec train
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapDominic Vogel
 

Similar to Answer each question in one to two paragraphs.Question 1 .docx (12)

network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
Policy DB2 WEEK 3Discussion #2 Week 3 Minimun 250 words an
 Policy DB2 WEEK  3Discussion #2 Week 3   Minimun 250 words an Policy DB2 WEEK  3Discussion #2 Week 3   Minimun 250 words an
Policy DB2 WEEK 3Discussion #2 Week 3 Minimun 250 words an
 
Chapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t hChapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t h
 
Security Transformation
Security TransformationSecurity Transformation
Security Transformation
 
Network_Security1.pdf.pdf
Network_Security1.pdf.pdfNetwork_Security1.pdf.pdf
Network_Security1.pdf.pdf
 
Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
 

More from justine1simpson78276

You will submit a 1-2 page double spaced paper, plus references, des.docx
You will submit a 1-2 page double spaced paper, plus references, des.docxYou will submit a 1-2 page double spaced paper, plus references, des.docx
You will submit a 1-2 page double spaced paper, plus references, des.docxjustine1simpson78276
 
you will submit a 150-200 word reading summary -Reasons for the .docx
you will submit a 150-200 word reading summary -Reasons for the .docxyou will submit a 150-200 word reading summary -Reasons for the .docx
you will submit a 150-200 word reading summary -Reasons for the .docxjustine1simpson78276
 
You will submit a 1500 word fully-referenced critical essay .docx
You will submit a 1500 word fully-referenced critical essay .docxYou will submit a 1500 word fully-referenced critical essay .docx
You will submit a 1500 word fully-referenced critical essay .docxjustine1simpson78276
 
you will submit a 150-200 word reading summary The story of real.docx
you will submit a 150-200 word reading summary The story of real.docxyou will submit a 150-200 word reading summary The story of real.docx
you will submit a 150-200 word reading summary The story of real.docxjustine1simpson78276
 
You will select an enterprise-level risks that impact an organizatio.docx
You will select an enterprise-level risks that impact an organizatio.docxYou will select an enterprise-level risks that impact an organizatio.docx
You will select an enterprise-level risks that impact an organizatio.docxjustine1simpson78276
 
You will select a psychologist (Skinner or Freud ) and conduct a bri.docx
You will select a psychologist (Skinner or Freud ) and conduct a bri.docxYou will select a psychologist (Skinner or Freud ) and conduct a bri.docx
You will select a psychologist (Skinner or Freud ) and conduct a bri.docxjustine1simpson78276
 
You will select a hot button issue from current or relatively re.docx
You will select a hot button issue from current or relatively re.docxYou will select a hot button issue from current or relatively re.docx
You will select a hot button issue from current or relatively re.docxjustine1simpson78276
 
you will research resources available on the Internet for monitoring.docx
you will research resources available on the Internet for monitoring.docxyou will research resources available on the Internet for monitoring.docx
you will research resources available on the Internet for monitoring.docxjustine1simpson78276
 
You will review qualitative research.  The topic is up to you as lon.docx
You will review qualitative research.  The topic is up to you as lon.docxYou will review qualitative research.  The topic is up to you as lon.docx
You will review qualitative research.  The topic is up to you as lon.docxjustine1simpson78276
 
You will review quantitative research.  The topic is up to you as lo.docx
You will review quantitative research.  The topic is up to you as lo.docxYou will review quantitative research.  The topic is up to you as lo.docx
You will review quantitative research.  The topic is up to you as lo.docxjustine1simpson78276
 
You will research one womens movement that we have not discussed in.docx
You will research one womens movement that we have not discussed in.docxYou will research one womens movement that we have not discussed in.docx
You will research one womens movement that we have not discussed in.docxjustine1simpson78276
 
You will research a Native American or African communitys culture, .docx
You will research a Native American or African communitys culture, .docxYou will research a Native American or African communitys culture, .docx
You will research a Native American or African communitys culture, .docxjustine1simpson78276
 
You will receive 15 points extra credit (added to the homework p.docx
You will receive 15 points extra credit (added to the homework p.docxYou will receive 15 points extra credit (added to the homework p.docx
You will receive 15 points extra credit (added to the homework p.docxjustine1simpson78276
 
You will provide a short analysis of the interaction of group member.docx
You will provide a short analysis of the interaction of group member.docxYou will provide a short analysis of the interaction of group member.docx
You will provide a short analysis of the interaction of group member.docxjustine1simpson78276
 
You will produce and submit a Powerpoint  of screenshots related to .docx
You will produce and submit a Powerpoint  of screenshots related to .docxYou will produce and submit a Powerpoint  of screenshots related to .docx
You will produce and submit a Powerpoint  of screenshots related to .docxjustine1simpson78276
 
You will produce a clear and coherent writing that is well organized.docx
You will produce a clear and coherent writing that is well organized.docxYou will produce a clear and coherent writing that is well organized.docx
You will produce a clear and coherent writing that is well organized.docxjustine1simpson78276
 
You will present ADP and Paychex as the recommendations to the VP .docx
You will present ADP and Paychex as the recommendations to the VP .docxYou will present ADP and Paychex as the recommendations to the VP .docx
You will present ADP and Paychex as the recommendations to the VP .docxjustine1simpson78276
 
You will prepare and present a personality analysis of your choo.docx
You will prepare and present a personality analysis of your choo.docxYou will prepare and present a personality analysis of your choo.docx
You will prepare and present a personality analysis of your choo.docxjustine1simpson78276
 
you will prepare a PowerPoint presentation on the consumer infor.docx
you will prepare a PowerPoint presentation on the consumer infor.docxyou will prepare a PowerPoint presentation on the consumer infor.docx
you will prepare a PowerPoint presentation on the consumer infor.docxjustine1simpson78276
 
You will post a 250-word reply to 2 classmate’s threads. The reply r.docx
You will post a 250-word reply to 2 classmate’s threads. The reply r.docxYou will post a 250-word reply to 2 classmate’s threads. The reply r.docx
You will post a 250-word reply to 2 classmate’s threads. The reply r.docxjustine1simpson78276
 

More from justine1simpson78276 (20)

You will submit a 1-2 page double spaced paper, plus references, des.docx
You will submit a 1-2 page double spaced paper, plus references, des.docxYou will submit a 1-2 page double spaced paper, plus references, des.docx
You will submit a 1-2 page double spaced paper, plus references, des.docx
 
you will submit a 150-200 word reading summary -Reasons for the .docx
you will submit a 150-200 word reading summary -Reasons for the .docxyou will submit a 150-200 word reading summary -Reasons for the .docx
you will submit a 150-200 word reading summary -Reasons for the .docx
 
You will submit a 1500 word fully-referenced critical essay .docx
You will submit a 1500 word fully-referenced critical essay .docxYou will submit a 1500 word fully-referenced critical essay .docx
You will submit a 1500 word fully-referenced critical essay .docx
 
you will submit a 150-200 word reading summary The story of real.docx
you will submit a 150-200 word reading summary The story of real.docxyou will submit a 150-200 word reading summary The story of real.docx
you will submit a 150-200 word reading summary The story of real.docx
 
You will select an enterprise-level risks that impact an organizatio.docx
You will select an enterprise-level risks that impact an organizatio.docxYou will select an enterprise-level risks that impact an organizatio.docx
You will select an enterprise-level risks that impact an organizatio.docx
 
You will select a psychologist (Skinner or Freud ) and conduct a bri.docx
You will select a psychologist (Skinner or Freud ) and conduct a bri.docxYou will select a psychologist (Skinner or Freud ) and conduct a bri.docx
You will select a psychologist (Skinner or Freud ) and conduct a bri.docx
 
You will select a hot button issue from current or relatively re.docx
You will select a hot button issue from current or relatively re.docxYou will select a hot button issue from current or relatively re.docx
You will select a hot button issue from current or relatively re.docx
 
you will research resources available on the Internet for monitoring.docx
you will research resources available on the Internet for monitoring.docxyou will research resources available on the Internet for monitoring.docx
you will research resources available on the Internet for monitoring.docx
 
You will review qualitative research.  The topic is up to you as lon.docx
You will review qualitative research.  The topic is up to you as lon.docxYou will review qualitative research.  The topic is up to you as lon.docx
You will review qualitative research.  The topic is up to you as lon.docx
 
You will review quantitative research.  The topic is up to you as lo.docx
You will review quantitative research.  The topic is up to you as lo.docxYou will review quantitative research.  The topic is up to you as lo.docx
You will review quantitative research.  The topic is up to you as lo.docx
 
You will research one womens movement that we have not discussed in.docx
You will research one womens movement that we have not discussed in.docxYou will research one womens movement that we have not discussed in.docx
You will research one womens movement that we have not discussed in.docx
 
You will research a Native American or African communitys culture, .docx
You will research a Native American or African communitys culture, .docxYou will research a Native American or African communitys culture, .docx
You will research a Native American or African communitys culture, .docx
 
You will receive 15 points extra credit (added to the homework p.docx
You will receive 15 points extra credit (added to the homework p.docxYou will receive 15 points extra credit (added to the homework p.docx
You will receive 15 points extra credit (added to the homework p.docx
 
You will provide a short analysis of the interaction of group member.docx
You will provide a short analysis of the interaction of group member.docxYou will provide a short analysis of the interaction of group member.docx
You will provide a short analysis of the interaction of group member.docx
 
You will produce and submit a Powerpoint  of screenshots related to .docx
You will produce and submit a Powerpoint  of screenshots related to .docxYou will produce and submit a Powerpoint  of screenshots related to .docx
You will produce and submit a Powerpoint  of screenshots related to .docx
 
You will produce a clear and coherent writing that is well organized.docx
You will produce a clear and coherent writing that is well organized.docxYou will produce a clear and coherent writing that is well organized.docx
You will produce a clear and coherent writing that is well organized.docx
 
You will present ADP and Paychex as the recommendations to the VP .docx
You will present ADP and Paychex as the recommendations to the VP .docxYou will present ADP and Paychex as the recommendations to the VP .docx
You will present ADP and Paychex as the recommendations to the VP .docx
 
You will prepare and present a personality analysis of your choo.docx
You will prepare and present a personality analysis of your choo.docxYou will prepare and present a personality analysis of your choo.docx
You will prepare and present a personality analysis of your choo.docx
 
you will prepare a PowerPoint presentation on the consumer infor.docx
you will prepare a PowerPoint presentation on the consumer infor.docxyou will prepare a PowerPoint presentation on the consumer infor.docx
you will prepare a PowerPoint presentation on the consumer infor.docx
 
You will post a 250-word reply to 2 classmate’s threads. The reply r.docx
You will post a 250-word reply to 2 classmate’s threads. The reply r.docxYou will post a 250-word reply to 2 classmate’s threads. The reply r.docx
You will post a 250-word reply to 2 classmate’s threads. The reply r.docx
 

Recently uploaded

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 

Recently uploaded (20)

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 

Answer each question in one to two paragraphs.Question 1 .docx

  • 1. Answer each question in one to two paragraphs. Question 1: Layered Network Defense Network security has become a complicated topic due to the many types of threats to network information and systems. To defend against these threats, a layered network defense strategy must be utilized. What are the major components of a layered network defense model and what role does each of the layers play in the overall defense of the network against security threats? Question 2: Risk Analysis Properly securing a network is like building security around your home. You can invest a lot of money is security systems that defend against threats that do not exist in your neighborhood. The first step in developing good security is to understand what threats exist. What are the major security threats that exist for a typical company and how might they determine which threats present the most risk for them and their situation? Question 3: Security Policy Securing a network consists of much more than just installing the appropriate hardware and software. A company must have a good set of policies in place to help make the decisions necessary to properly implement their network security. Discuss the major components of a good security policy. Question 4: Goals of Network Security
  • 2. One size does not fit all with regards to network security. A company or organization must understand what they are trying to accomplish with their network security. These goals will help drive the decisions necessary to implement a good security system. List some examples of goals a company or organization might set for their security system and discuss what types of security they might use to achieve these goals. Question 5: Intrusion Detection Networks often contain valuable information and are the target of threats to acquire the information or damage the information. Intruders pose a significant threat to networks and the first step in thwarting intrusion is to understand when and how it is occurring. What are some of the ways intruders can be detected in a network and what can be done to reduce this network threat? Question 6: Digital Signatures One of the most difficult aspects of network security is identification. If all people and devices connected to the network could be identified during every network transmission, security would be greatly improved. Unfortunately, this is not an easy task. Digital signatures help in identification of network transmissions. Discuss how digital signatures work and what aspects of network security they enhance. Question 7: Access Control Lists A common method of gaining improved network security is to create a list of authorized users for all network resources. These lists are called Access Control Lists or ACLs. ACLs are like airline reservations. You arrive at the gate and if you have a boarding pass, you can get on the plane. Without a boarding
  • 3. pass, you are left at the gate and the plane is off limits. Discuss how Access Control Lists work and the role they play in network security. Question 8: Authentication and Authorization The terms authentication and authorization are often confused. Authentication relates to determining who the user is and authorization relates to what resources a user can access. Discuss the definition of each of these terms with respect to network security. Also discuss the role each of these concepts plays in network security. Question 9: Internet Security The expansion of the Internet has created a significant number of new network threats. While businesses combat Internet security threats, employees continue to expand their use of the Internet. What limitations should be placed on the use of the Internet at work to reduce security threats while still allowing employees to reap the benefits provided by Internet access? Question 10: Web Security The Web has become a major part of company and organization network traffic. Virtually all businesses and organizations have a Web presence, and most businesses have some type of Web applications running to allow customers and employees to interact with the company network in some fashion. Discuss the security issues related to Web exposure for a company. Question 11: Security Models
  • 4. Protection of a company network can be a complicated endeavor. A good model helps in the design of these network security systems just like a good model helps in the design of any system. What are the major components of a good security model and how do these components fit into the overall security of the network? Question 12: Firewalls If you can build a big and strong enough wall around your house, you should be safe from outside attacks. In order to communicate with the outside world, you have to allow mail to be delivered and you probably want to talk to people outside of your house by telephone. Each bit of communication you allow puts you at increased risk. Firewalls are for the perimeter protection of a company network in much the same way as a wall around your house is for your personal protection. Discuss the basics of how firewalls work and the role they play in network security. Question 13: Wireless Networking Wireless computing has become a significant part of business networking due to the rapid expansion of the use of mobile devices in business environments. Security risks have increased as a result. What steps should a business take to ensure productive support of wireless communications while maintaining strong security? Question 14: Remote Access Security
  • 5. An increasing number of people work from home or while travelling, and often need access to their company network. This type of remote access can create significant security issues. Discuss how these security risks can be minimized while still allowing the type of remote access needed. Question 15: Cryptology Regardless of how well data transmissions are protected, there are still ways intruders can intercept the data and try to make use of it for their own purposes. Cryptology adds another level of defense against those by transforming the communications into a format only decipherable by the people or systems with the right information. Discuss the basics of how cryptology works and how it can most effectively be used in network security. Question 16: Secure Data Transmission If we had no need to transmit data from one user or device to another, we would greatly reduce security problems. Data transmission, and lots of it, is required to operate a business, so the best approach is to make those transmissions secure. Discuss the meaning of secure data transmission and the major issues that must be addressed to achieve secure data transmissions in a network. Answer each topic in at least two paragraphs. Topic 1: List and briefly discuss categories of security services. Topic 2: Brief discuss the Playfair cipher.
  • 6. Topic 3: Discuss how the Data Encryption Standard (DES) works. Topic 4: Discuss the strength of the Data Encryption Standard (DES). Topic 5: Briefly discuss the main difference between public key cryptography and DES Topic 6: Briefly discuss the RSA encryption algorithm. Topic 7: Briefly discuss, using your own experience, various virtual private networks and various access control approaches. Topic 8: Briefly discuss secure e-mail communications using cryptographic protocols and secure wireless communications using cryptographic protocols.