Learner Name Asadbek Abdusattorov Learner Registration No
Download 172.66 Kb.
|
Asadbek Abdusattorov Cyber Security EI1-01
- Bu sahifa navigatsiya:
- Table of Contents
- Description of network security protection methods
Table of ContentsDescription of network security protection methods i Evaluation of the impact of penetration and vulnerability testing has to an organisation ii Description of end user device protection methods ii Description of the importance of implementing and reviewing access controls in an organisation iii Explanation of how end users can be educated and aware of cyber security iii Part 2 iv Evaluation of the impact a cyber-attack has to the organisation. iv Description of the content of an organisational incident management plan v Explanation of the importance of internal and external communication when managing a cyber-attack v Description of the roles and responsibilities for incident management vi Analysation of the actions to take when responding to an incident vii Explanation of the importance of post cyber-attack reviews vii Reference list viii Description of network security protection methodsThe term "network security protection measures" encompasses all the procedures and tools used to prevent data and infrastructure loss, theft, or corruption caused by malicious actors with access to the network. Firewalls, encryption, VPNs, antivirus software, intrusion detection and prevention systems, access control, and network segmentation are just some of the main technologies used to safeguard a network. A firewall is a kind of network security device that monitors and filters data traveling into and out of a network in accordance with established safety policies. Firewalls are a barrier between a trusted internal network and an untrusted external network like the Internet, and may be either hardware-based or software-based. To prevent prying eyes from reading private information, material may be encrypted and transformed into an unreadable form known as ciphertext. Data may be encrypted both while in motion (during network transmission) and while at rest (when saved on a disk). A virtual private network (VPN) is a private network that leverages a public network (such as the Internet) to securely link separate computers or users. Virtual private networks encrypt data in transit to guarantee that only authorized users may access the network. Viruses, worms, and Trojan horses are just some of the malicious programs that may be found and eliminated with the use of antivirus software. All devices linked to a network may be protected by running antivirus software either locally or centrally. The purpose of intrusion detection and prevention systems, or IDPS, is to keep networks safe by constantly scanning for and responding to any indications of an attack. IDPS may be deployed locally on a single device (host-based) or remotely on a network (network-based), using devices like routers. The term "access control" refers to the procedure of approving or rejecting requests for use of network resources. This may be achieved by authentication (checking the user's identity) and authorization (checking the user's permission to use the requested resources). To prevent the transmission of viruses and improve network security, network segmentation divides a larger network into many smaller networks. Download 172.66 Kb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling