TABLE of Contents
Table of contents
This paper reviews 3 case studies related to network security. The first two exercises deal with security planning, including classifying data and allocating controls. The third exercise requires more extensive TCP knowledge, since the exercise includes evaluating a computer power-up sequence… but with interesting results!
The Internet has changed so much for better and worse. For example 20 years ago if someone wanted to steal from someone or rob a bank they would need either a gun or a weapon now a day’s all they need is a computer and they will have access to just about anything they need. Its hard to protect or safeguard your computer or prosecute hackers/criminals when you had no idea of the attack until a later date or no idea where it came from. The problems are clear its much harder to protect your computer/network then it used to be with all the information websites ask for including your (social for job applications, credit card information for online purchases etc.). I think as long as you trust the right company your information may be protected as well as it possibly could be it comes down to the individuals working for the enterprise/company.
There were three case study exercises are that have been very useful in providing students a foundation in network Security. All three each include a PowerPoint lecture and active-learning exercise, which serves as the case study. Three case studies related to networking include: Designing Information Security: Classifies information by confidentiality and criticality. Planning for Network Security: Determines services, connection establishment directions, security classifications, and access control and...
Please join StudyMode to read the full document