Information Technology > Report > ITCC231 final paper - American Public University ITCC 231 (All)
Securing the Network American Military University ITCC231 Securing the Network SECURING THE NETWORK Topic 1: Introduction a. What is Network Security and its responsibilities in organizations/... businesses b. Why is Network Security Important? Topic 2: Network Security Fundamentals a. What are the functions of Network Security? b. What is it consist of (hardware, software, policies)? c. Network Security principles (confidentiality/Integrity/Availability) Topic 3: Risk/Threats/Protection? a. Where do security threats come from? b. What threats or risks networks encounter? c. What are the different types of threats? d. What kind of protection can network security provide? e. How do network security devices/tools secure the network? Topic 4: How Network is secured? a. Encryption b. Types of keys associated with encryption c. Network scanning for viruses d. Limiting network access e. Passwords f. Firewalls g. Methods of firewalls h. Insider threats i. Authenticating messages Topic 5: Conclusion a. Overview of security policies (companies/users) b. Tip to ensure network is secured c. Importance of securing network SECURING THE NETWORK Abstract Technical writing can be easily considered a very overwhelming task especially when trying to figure out the target audience in any category of writing. Establishing the end users requires in-depth research to be carried out before starting the writing process. For this paper, this document will serve the purpose of helping the targeted audience of network users of the personal network and big corporation network, comprehend necessary security measures to for securing their network. Since network security is a very complicated matter that can leave an organization devastated if neglected, this document will cover some of the most crucial information to follow. Even though we have seen drastic improvements of quality of both work and personal lives for a more modern society with the creation of computer networks, it has left a small crack in the door for other threats such as cyber-crimes. Hackers are finding new ways every day to penetrate closed networks with hopes to access sensitive information. Whether private or large corporation, all networks should abide by strict security protocols, devices, and network tools to avoid any possible network threats. Introduction The operation of modern society drastically changed when the computer network came on the scene. Computer networks became well known and are used by people, businesses, and institutions around the world, which shows just how far we have come. Mainly when there wasn't any internet connection and the only way to transmit documents and spreadsheets was through physical transfers. This widely known computer network is a series of connected computer components (computers, routers, printers, and modems) through a wired or wireless connection, serving the purpose to send and receive data/information among each component (Mitchell, 2018). Well, since our lives have become depended on computers, the networks are SECURING THE NETWORK now a close friend that enables communication path setups among computers and other electronic devices to send and receives [Show More]
Last updated: 2 years ago
Preview 1 out of 13 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Feb 04, 2023
Number of pages
13
Written in
This document has been written for:
Uploaded
Feb 04, 2023
Downloads
0
Views
141
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·