[ REPORT ] COMPUTER NETWORK

INTRODUCTION

Basic approach 

Identifying the assets,

Identifying theThreads

 NETWORK SECURITY THREATS AND ATTACKS

SECURITY MEASURES

 

TOOLS FOR INFORMATION SECURITY 

Firewalls

Encryption

Public-Key Algorithms

 Private-Key Algorithms


Security Protocols

System Audits

Physical Security


DEVELOPING AN EFFECTIVE NETWORK SECURITY POLICY

3. Determine the Cost of Security Measures
4. Limit the Scope of Access 
5. Identify Assumptions
6. Consider Human Factors
7. Control the Number of Secrets
8. Limit Your Trust
9. Understand Typical Network Functions
10. Realize Physical Security
11. Implement Pervasive and Scalable Security

SUMMARY


Developing a network security policy comprises of identifying the organizational assets, threats, and risks as well as evaluating and implementing the tools and technologies available to meet these risks. When all these factors are accounted for, a usage policy is then developed. In addition, an auditing procedure that reviews network and server usage must be established on a timely basis. A proper response should also be in place before any breach or breakdown occurs.

CONCLUSION


After taking a look at many tools and options available for security, there are a lot of similarities between a security policy and Linus’ security blanket. The fiber that makes up the blanket consists of the many tools and services used in a security policy; the firewalls, biometrics, passwords, access

Controls and documentation all are combined to cover the assets of the company. Along with the fiber that makes up a blanket, there also is a border that holds it all together, making it easy to unfold and use. For a security program, the border consists of common sense, a return on the security investment and diligence in implementing and operating the security program. Pro-grams that are bound too tight or are created in a convoluted manner actually might end up being a detriment to the company. Security plans should be reviewed regularly, easy to use and enforceable throughout the organization.

if u like the post just say thank u in comment box.

No comments:

Post a Comment

its cool