Learner Name Asadbek Abdusattorov Learner Registration No


Download 172.66 Kb.
bet1/7
Sana15.06.2023
Hajmi172.66 Kb.
#1486626
  1   2   3   4   5   6   7
Bog'liq
Asadbek Abdusattorov Cyber Security EI1-01


Cyber Security Tashkent International University of Education





Learner Name

Asadbek Abdusattorov

Learner Registration No.

211123109

Study Centre Name

Tashkent International University of Education (TIUE)

Qualification Title

LEVEL 4 DIPLOMA IN INFORMATION TECHNOLOGY

Unit Reference No.

D/650/3383

Unit Title

Cyber Security

Word Count




Submission Date

19 February 2023


Declaration of authenticity:

  1. I declare that the attached submission is my own original work. No significant part of it has been submitted for any other assignment and I have acknowledged in my notes and bibliography all written and electronic sources used.

  2. I acknowledge that my assignment will be subject to electronic scrutiny for academic honesty.

  3. I understand that failure to meet these guidelines may instigate the centre’s malpractice procedures and risk failure of the unit and / or qualification.






Asadbek Abdusattorov
_________________
Learner signature
Date:

Mr Sarvar Usmonov


_________________
Tutor signature
Date:  

Tutor’s comments




Table of Contents


Description of network security protection methods i
Evaluation of the impact of penetration and vulnerability testing has to an organisation ii
Description of end user device protection methods ii
Description of the importance of implementing and reviewing access controls in an organisation iii
Explanation of how end users can be educated and aware of cyber security iii
Part 2 iv
Evaluation of the impact a cyber-attack has to the organisation. iv
Description of the content of an organisational incident management plan v
Explanation of the importance of internal and external communication when managing a cyber-attack v
Description of the roles and responsibilities for incident management vi
Analysation of the actions to take when responding to an incident vii
Explanation of the importance of post cyber-attack reviews vii
Reference list viii

Description of network security protection methods


The term "network security protection measures" encompasses all the procedures and tools used to prevent data and infrastructure loss, theft, or corruption caused by malicious actors with access to the network. Firewalls, encryption, VPNs, antivirus software, intrusion detection and prevention systems, access control, and network segmentation are just some of the main technologies used to safeguard a network.
A firewall is a kind of network security device that monitors and filters data traveling into and out of a network in accordance with established safety policies. Firewalls are a barrier between a trusted internal network and an untrusted external network like the Internet, and may be either hardware-based or software-based. To prevent prying eyes from reading private information, material may be encrypted and transformed into an unreadable form known as ciphertext. Data may be encrypted both while in motion (during network transmission) and while at rest (when saved on a disk).
A virtual private network (VPN) is a private network that leverages a public network (such as the Internet) to securely link separate computers or users. Virtual private networks encrypt data in transit to guarantee that only authorized users may access the network. Viruses, worms, and Trojan horses are just some of the malicious programs that may be found and eliminated with the use of antivirus software. All devices linked to a network may be protected by running antivirus software either locally or centrally. The purpose of intrusion detection and prevention systems, or IDPS, is to keep networks safe by constantly scanning for and responding to any indications of an attack. IDPS may be deployed locally on a single device (host-based) or remotely on a network (network-based), using devices like routers. The term "access control" refers to the procedure of approving or rejecting requests for use of network resources. This may be achieved by authentication (checking the user's identity) and authorization (checking the user's permission to use the requested resources). To prevent the transmission of viruses and improve network security, network segmentation divides a larger network into many smaller networks.


Download 172.66 Kb.

Do'stlaringiz bilan baham:
  1   2   3   4   5   6   7




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling