Page 155 - DCAP516_COMPUTER_SECURITY
P. 155
Unit 12: Network Security Controls
Notes
Notes With this scheme, any intermediate recipients—those other than the original sender
and ultimate receiver—know neither where the package originated nor where it will end
up. This scheme provides confidentiality of content, source, destination, and routing.
Self Assessment
Give One word for the following:
5. A device that is placed inside a protected network to monitor what occurs within the
network.
6. Codes to guard against modification in a transmission.
7. An e-mail that is capable to protect the confidentiality of the message and perhaps its
integrity.
8. A protocol that interfaces between applications (such as browsers) and the TCP/IP protocols
to provide server authentication, optional client authentication, and an encrypted
communications channel between client and server.
9. An access control device that sits between two networks or two network segments. It
filters all traffic between the protected or “inside” network and a less trustworthy or
“outside” network or segment.
10. A powerful for providing privacy, authenticity, integrity, and limited access to data.
12.5 Summary
Network security consists of the provisions made in an underlying computer network
infrastructure, policies adopted by the network administrator to protect the network and
the network-accessible resources from unauthorized access and consistent and continuous
monitoring and measurement of its effectiveness (lack) combined together.
The preventive measures attempt to secure the access to individual computers – the network
itself – thereby protecting the computers and other shared resources such as printers,
network-attached storage connected by the network.
A computer host’s security is vulnerable to users with higher access privileges to those
hosts.
12.6 Keywords
Computer Security: It is more like providing means to protect a single PC against outside
intrusion.
Preventive Measures: It attempt to secure the access to individual computers – the network itself
– thereby protecting the computers and other shared resources such as printers, network-attached
storage connected by the network.
Securing Network Infrastructure: It is like securing possible entry points of attacks on a country
by deploying appropriate defense.
LOVELY PROFESSIONAL UNIVERSITY 149