Preview

Petshop Advertisement

Powerful Essays
Open Document
Open Document
1198 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Petshop Advertisement
Network Security Principles
[pic]
What is Network Security?
Network security is the protection of information and systems and hardware that use, store, and transmit that information.
Goals of an Information Security Program
• Confidentiality
-Prevent the disclosure of sensitive information from unauthorized people, resources and processes .
• Integrity
-The protection of system information or processes from intentional or accidental modification .
• Availability
-The assurance that systems and data are accessible by authorized users when needed .
Risk Management
• The process of assessing and quantifying risk and establishing an acceptable level of risk for the organization .
• Risk can be mitigated, but cannot be eliminated .

Network Security “Threat“
• A potential danger to information or a system
• An example: the ability to gain unauthorized access to systems or information in order to commit fraud, network intrusion, industrial espionage, identity theft, or simply to disrupt the system or network
• There may be weaknesses that greatly increase the likelihood of a threat manifesting
• Threats may include equipment failure, structured attacks, natural disasters, physical attacks, theft, viruses and many other potential events causing danger or damage .[pic]

Network Threats
• Impersonation
• Eavesdropping
• Denial-of-service
• Packet replay
• Man-in-the-middle
• Packet modification
[pic]
Vulnerability
• A network vulnerability is a weakness in a system, technology, product or policy
• In today’s environment, several organizations track, organize and test these vulnerabilities
• Each vulnerability is given an ID and can be reviewed by network security professionals over the Internet.
Vulnerability Appraisal
• It is very important that network security specialists comprehend the importance of vulnerability appraisal
• A vulnerability appraisal is a snapshot of the current security of the organization as it now stands
• What

You May Also Find These Documents Helpful

  • Good Essays

    Sr-Rm-022 Part 2

    • 839 Words
    • 3 Pages

    Security should be a high level of concern in any project. “Security is primarily the responsibility of the operations group, which consist of the staff responsible for installing and operating security controls such as firewalls, intrusion detection systems, and routine backup and recovery operations” (Denis, Wixom, & Roth, 2009). However, system developers also have a responsibility when it comes to security, especially within the information systems.…

    • 839 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    An essential part of network security is knowing what the characteristics of an attack are, so they can be countered or prevented. When the university suffered an overwhelming internal DDoS attack, it required administrators to reevaluate its security guidelines based on what was known about the attack.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    * The hackers can gain access to a company’s payment processing network. The attackers then installed malicious code designed to gather sensitive information from the network, which allowed them to easily access the network at their convenience.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    The level of security and its effectiveness in an application is a concern for all software development projects. Operations and Information Technology will hold key responsibility in implementation and maintenance of the software security measures. These measures will include but not be limited to firewalls, intrusion detection systems, credential verification, and standard backup operations (Valacich, 2012). This responsibility isn’t limited to just these measures or to this scope of responsibility. All hands that take part in development will have some responsibility in assuring appropriate security measures are developed, implemented, and maintained.…

    • 793 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Acct 504 Case Study 2

    • 1426 Words
    • 5 Pages

    Risk assessment – The organization must identify and analyze the different factors that generate risk for the business and must decide how to manage these risks. Because economic industry, regulatory and operating conditions will continue to change. (coso)…

    • 1426 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Identify risks that could lead to an information security breach, Identify vulnerabilities in system security, software operation, network design or employee procedures that could lead to a network failure.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS305

    • 300 Words
    • 2 Pages

    8. It’s a tool for practitioners because they can see what vulnerability they need to correct and patch,and it’s a hacker’s tool because it lists the vulnerability they can exploit.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Discuss how the values for threat and vulnerability combine to indicate the overall risk the organization faces.…

    • 627 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    The review results were positive with a suggestion for an improvement. The team found that RedSeal product provides the intelligence necessary to improve defenses, maintain continuous compliance and mitigate real-world risks by identifying the available paths of access and exposed vulnerabilities present across a network (Stephenson, 2012). The RedSeal solution is either a hardware appliance or software product and is architected for a fast and efficient means of implementing the system (Stephenson, 2012). The design will provide the most secure, scalable, and dependable deployment possible (Stephenson, 2012). Continuous monitoring focuses on correlating IT, network, and vulnerability feeds (Stephenson, 2012). The system identifies risk associated with the business’s security effectiveness as opposed to policy and compliance driven tools (Stephenson, 2012). RedSeal provides a large library of supported vendor products, allowing security and vulnerability data to be quickly and easily imported into the system. The system automatically builds network maps and correlates the map data with configuration and vulnerability data, which creates a threat reference library. RedSeal finds and eliminates gaps in businesses security controls and prioritizes the impact of those gaps. RedSeal is not an assessment or audit tool, but it does correlate risk to various controls for compliance regulations, creating reports that show gaps in deployed configurations/controls (Stephenson, 2012). The team would have liked to have seen more integration with governance, risk, and compliance solutions (Stephenson, 2012). The product only provided a piece of the risk picture. The piece is important, and one that a number of assessment and audit driven tools do not deliver and could leverage (Stephenson,…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 5 Types of Threats  Malicious software  Device failure  Application failure  Natural disaster  Intrusive cracker NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Manage Risk

    • 7591 Words
    • 24 Pages

    A probability or threat of damage, injury, liability, loss, or any other negative occurrence that is caused by external or internal vulnerabilities, and that may be avoided through preemptive action.…

    • 7591 Words
    • 24 Pages
    Powerful Essays
  • Satisfactory Essays

    appropriate to manage these risks. IT managers then present this information to the senior management.…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Question 3. What approach to risk management will identify threats, vulnerabilities, and the critical assets that we must protect?…

    • 734 Words
    • 3 Pages
    Good Essays