Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ITCC231 final paper American Public University ITCC 231

Beoordeling
-
Verkocht
-
Pagina's
13
Cijfer
A+
Geüpload op
09-03-2023
Geschreven in
2022/2023

Securing the Network American Military University ITCC231 25 Aug 2018 Securing the Network SECURING THE NETWORK Topic 1: Introduction a. What is Network Security and its responsibilities in organizations/businesses b. Why is Network Security Important? Topic 2: Network Security Fundamentals a. What are the functions of Network Security? b. What is it consist of (hardware, software, policies)? c. Network Security principles (confidentiality/Integrity/Availability) Topic 3: Risk/Threats/Protection? a. Where do security threats come from? b. What threats or risks networks encounter? c. What are the different types of threats? d. What kind of protection can network security provide? e. How do network security devices/tools secure the network? Topic 4: How Network is secured? a. Encryption b. Types of keys associated with encryption c. Network scanning for viruses d. Limiting network access e. Passwords f. Firewalls g. Methods of firewalls h. Insider threats i. Authenticating messages Topic 5: Conclusion a. Overview of security policies (companies/users) b. Tip to ensure network is secured c. Importance of securing network SECURING THE NETWORK Abstract Technical writing can be easily considered a very overwhelming task especially when trying to figure out the target audience in any category of writing. Establishing the end users requires in-depth research to be carried out before starting the writing process. For this paper, this document will serve the purpose of helping the targeted audience of network users of the personal network and big corporation network, comprehend necessary security measures to for securing their network. Since network security is a very complicated matter that can leave an organization devastated if neglected, this document will cover some of the most crucial information to follow. Even though we have seen drastic improvements of quality of both work and personal lives for a more modern society with the creation of computer networks, it has left a small crack in the door for other threats such as cyber-crimes. Hackers are finding new ways every day to penetrate closed networks with hopes to access sensitive information. Whether private or large corporation, all networks should abide by strict security protocols, devices, and network tools to avoid any possible network threats. Introduction The operation of modern society drastically changed when the computer network came on the scene. Computer networks became well known and are used by people, businesses, and institutions around the world, which shows just how far we have come. Mainly when there wasn't any internet connection and the only way to transmit documents and spreadsheets was through physical transfers. This widely known computer network is a series of connected computer components (computers, routers, printers, and modems) through a wired or wireless connection, serving the purpose to send and receive data/information among each component (Mitchell, 2018). Well, since our lives have become depended on computers, the networks are SECURING THE NETWORK now a close friend that enables communication path setups among computers and other electronic devices to send and receives media files, video, and audio data. In a professional environment, these networks provide companies with remote offices the means to share and access information instantly. For example, if a manager works from a New York office and the headquarters located in Florida, the network allows all the offices to access and share files. The network has so many attributes in that it allows people to enjoy recreational activities like surfing the net when the computer is connected to the internet as well as send files to the printer using wireless. These networks are created in several sizes to support organizations needs and increase the efficiency of adm

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

SECURING THE NETWORK




Securing the Network
American Military University
ITCC231
25 Aug 2018




Securing the Network

, SECURING THE NETWORK




Topic 1: Introduction

a. What is Network Security and its responsibilities in organizations/businesses
b. Why is Network Security Important?

Topic 2: Network Security Fundamentals

a. What are the functions of Network Security?
b. What is it consist of (hardware, software, policies)?
c. Network Security principles (confidentiality/Integrity/Availability)

Topic 3: Risk/Threats/Protection?

a. Where do security threats come from?
b. What threats or risks networks encounter?
c. What are the different types of threats?
d. What kind of protection can network security provide?
e. How do network security devices/tools secure the network?

Topic 4: How Network is secured?

a. Encryption
b. Types of keys associated with encryption
c. Network scanning for viruses
d. Limiting network access
e. Passwords
f. Firewalls
g. Methods of firewalls
h. Insider threats
i. Authenticating messages

Topic 5: Conclusion

a. Overview of security policies (companies/users)
b. Tip to ensure network is secured
c. Importance of securing network

Geschreven voor

Vak

Documentinformatie

Geüpload op
9 maart 2023
Aantal pagina's
13
Geschreven in
2022/2023
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$10.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
ExamsConnoisseur Self
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
587
Lid sinds
3 jaar
Aantal volgers
344
Documenten
1492
Laatst verkocht
2 weken geleden

4.2

68 beoordelingen

5
40
4
11
3
13
2
1
1
3

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen