Page 155 - DCAP516_COMPUTER_SECURITY
P. 155

Unit 12: Network Security Controls




                                                                                                Notes


             Notes  With this scheme, any intermediate recipients—those other than the original sender
            and ultimate receiver—know neither where the package originated nor where it will end
            up. This scheme provides confidentiality of content, source, destination, and routing.

          Self Assessment


          Give One word for the following:
          5.   A device that is placed inside a protected network to monitor what occurs within the
               network.

          6.   Codes to guard against modification in a transmission.
          7.   An e-mail that is capable to protect the confidentiality of the message and perhaps its
               integrity.

          8.   A protocol that interfaces between applications (such as browsers) and the TCP/IP protocols
               to provide server authentication, optional client authentication, and an encrypted
               communications channel between client and server.
          9.   An access control device that sits between two networks or two network segments. It
               filters all traffic between the protected or “inside” network and a less trustworthy or
               “outside” network or segment.
          10.  A powerful for providing privacy, authenticity, integrity, and limited access to data.

          12.5 Summary


               Network security consists of the provisions made in an underlying computer network
               infrastructure, policies adopted by the network administrator to protect the network and
               the network-accessible resources from unauthorized access and consistent and continuous
               monitoring and measurement of its effectiveness (lack) combined together.
               The preventive measures attempt to secure the access to individual computers – the network
               itself – thereby protecting the computers and other shared resources such as printers,
               network-attached storage connected by the network.

               A computer host’s security is vulnerable to users with higher access privileges to those
               hosts.

          12.6 Keywords

          Computer Security: It is more like providing means to protect a single PC against outside
          intrusion.
          Preventive Measures: It attempt to secure the access to individual computers – the network itself
          – thereby protecting the computers and other shared resources such as printers, network-attached
          storage connected by the network.
          Securing Network Infrastructure: It is like securing possible entry points of attacks on a country
          by deploying appropriate defense.








                                           LOVELY PROFESSIONAL UNIVERSITY                                   149
   150   151   152   153   154   155   156   157   158   159   160