Homework - Network Security.docx - Homework \u2013 Network Security \u2013 CIS 377 1 \u2018Network security\u2019 often used interchangeably with

Homework - Network Security.docx - Homework – Network...

This preview shows page 1 - 3 out of 7 pages.

Homework – Network Security – CIS 377 1. ‘Network security’ often used interchangeably with ‘cybersecurity’? Why? Do you agree? Why or why not – write 500 words. No I disagree because Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. it complements endpoint security, which focuses on individual devices. network security instead focuses on how those devices interact, and on the connective tissue between them, network security consists of: Protection: You should configure your systems and networks as correctly as possible Detection: You must be able to identify when the configuration has changed or when some network traffic indicates a problem Reaction: After identifying problems quickly, you must respond to them and return to a safe state as rapidly as possible Network security methods includes: Access control: You should be able to block unauthorized users and devices from accessing your network. Users that are permitted network access should only be able to work with the limited set of resources for which they've been authorized. Anti-malware: Viruses, worms, and Trojans by definition attempt to spread across a network, and can lurk dormant on infected machines for days or weeks. Application security: Insecure applications are often the vectors by which attackers get access to your network. You need to employ hardware, software, and security processes to lock those apps down. Email security: Phishing is one of the most common ways attackers gain access to a network. Email security tools can block both incoming attacks and outbound messages with sensitive data. Firewalls: Perhaps the granddaddy of the network security world, they follow the rules you define to permit or deny traffic at the border between your network and the internet, establishing a barrier between your trusted zone and the wild west outside. They don't preclude the need for a defense-in-depth strategy, but they're still a must-have. Intrusion detection and prevention: These systems scan network traffic to identify and block attacks, often by correlating network activity signatures with databases of known attack techniques. Mobile device and wireless security: Wireless devices have all the potential security flaws of any other networked gadget — but also can connect to just about any wireless network anywhere, requiring extra scrutiny. Network segmentation: Software-defined segmentation puts network traffic into different classifications and makes enforcing security policies easier. Security information and event management (SIEM): These products aim to automatically pull together information from a variety of network tools to provide data you need to identify and respond to threats.
Image of page 1
VPN: A tool (typically based on IPsec or SSL) that authenticates the communication between a device and a secure network, creating a secure, encrypted "tunnel" across the open internet.
Image of page 2
Image of page 3

You've reached the end of your free preview.

Want to read all 7 pages?

  • Fall '15
  • JiniePak

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes
A+ icon
Ask Expert Tutors