Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more ➡
Standard view
Full view
of .
Add note
Save to My Library
Sync to mobile
Look up keyword
Like this
3Activity
×
0 of .
Results for:
No results containing your search query
P. 1
www.assignmentwritingindia.com

www.assignmentwritingindia.com

Ratings: (0)|Views: 1,517|Likes:
Published by professionalwriters
Assignment Writing Content Services India US, UK, Australia, UAE, Dubai, Canada, Germany, Ireland, Scotland, London, Bangalore, Chennai, Pune, Delhi, Mumbai, Hyderabad, Gujarat, Punjab, Noida, Calcutta, Kerela, Mysore, Trivandrum, Ahmedabad, Andhra Pradesh, Secunderabad

Contact: +91 9502564793, +91 9291394133
contact.professionalwriters@gmail.com
www.assignmentwritingindia.com
Assignment Writing Content Services India US, UK, Australia, UAE, Dubai, Canada, Germany, Ireland, Scotland, London, Bangalore, Chennai, Pune, Delhi, Mumbai, Hyderabad, Gujarat, Punjab, Noida, Calcutta, Kerela, Mysore, Trivandrum, Ahmedabad, Andhra Pradesh, Secunderabad

Contact: +91 9502564793, +91 9291394133
contact.professionalwriters@gmail.com
www.assignmentwritingindia.com

More info:

Published by: professionalwriters on Dec 06, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
See More
See less

07/10/2013

 
 
2010
Network security
www.assignmentwritingindia.com
 
 
 Page | 1
www.assignmentwritingindia.com
 
Content 
 
ABSTRACT ............................................................................................................................... 3
 
IN
TRODUCT
I
O
 N
...................................................................................................................... 3
 
I
mportance of computer and network security ......................................................................... 4
 
To uphold company assets ................................................................................................... 5
 
To develop and maintain effectual security .......................................................................... 5
 
To meet dogmatic necessities and fiduciary responsibilities ................................................. 5
 
To secure one¶s position ...................................................................................................... 6
 
I
SSUES OF
 N
ETWORK SECUR 
I
TY ......................................................................................... 6
 
Authentication ......................................................................................................................... 6
 
I
ntegrity .................................................................................................................................. 6
 
Confidentiality ........................................................................................................................ 6
 
 N
on-repudiation ...................................................................................................................... 6
 
Availability ............................................................................................................................. 6
 
Authorization .......................................................................................................................... 7
 
Vulnerability ........................................................................................................................... 7
 
Different types of Vulnerabilities ......................................................................................... 7
 
THREATS A
 N
D ATTACKS ...................................................................................................... 8
 
Types and Sources of 
 N
etwork Threats.................................................................................... 8
 
DoS (Denial-of-Service) ...................................................................................................... 9
 
Unauthorized Access ......................................................................................................... 10
 
Executing illegal Commands.............................................................................................. 10
 
Confidentiality Violation ................................................................................................... 11
 
Destructive criticism .......................................................................................................... 11
 
 
 Page | 2
www.assignmentwritingindia.com
 
I
P spoofing ........................................................................................................................ 12
 
THE WHY¶S A
 N
D WHEREFORE¶S ....................................................................................... 12
 
S
IX
LESSO
 N
S LEAR 
 N
ED FROM- J.P. Holbrook & J.K. Reynolds......................................... 12
 
Use backups .......................................................................................................................... 12
 
Don't put data unnecessarily .................................................................................................. 13
 
Avoid single points of failure systems ................................................................................ 13
 
Update the germane operating system .................................................................................... 13
 
Look for appropriate security advisories ................................................................................ 13
 
Keep staff person proverbial with security practices .............................................................. 13
 
BAS
I
C T
I
PS FOR 
 N
ETWORK SECUR 
I
TY ............................................................................. 14
 
SECURE
 N
ETWORK ARCH
I
TECTURE ................................................................................ 15
 
Logging ................................................................................................................................. 16
 
Firewalls ............................................................................................................................... 16
 
Separating User Populations and Servers ........................................................................... 16
 
Limiting Access ................................................................................................................. 17
 
 N
etwork connectivity devices ................................................................................................ 18
 
 N
on-secured places for 
 N
etwork Connectivity Devices ...................................................... 18
 
Gateway Security .................................................................................................................. 19
 
I
DS (intrusion detection system) ............................................................................................ 19
 
Content filtering .................................................................................................................... 20
 
Developing Security Policies ................................................................................................. 20
 
Conclusions/ Recommendations................................................................................................ 21
 
Bibliography ............................................................................................................................. 22
 

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->