Page 106 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 106

Information  Security and Privacy




                    Notes          7.7 Keywords

                                   Computer  Security:  It is more  like providing  means to protect  a single  PC against  outside
                                   intrusion.

                                   LAN: Networks that connect computers lying within a small distance (such as a room, or within
                                   a building) from each other are called Local Area Networks (LANs).
                                   Preventive Measures: It attempt to secure the access to individual computers – the network itself
                                   – thereby protecting the computers and other shared resources such as printers, network-attached
                                   storage connected by the network.
                                   Securing Network Infrastructure: It is like securing possible entry points of attacks on a country
                                   by deploying appropriate defense.

                                   Trusted Networks: Trusted networks are defined as “the networks within your security boundary,
                                   and are typically the networks you are trying to defend.”
                                   Untrusted network: It is considered as the networks external your security perimeter.

                                   7.8 Review Questions


                                   1.  What are the different types of networks? Discuss their comparison.
                                   2.  What is computer  security? Explain  the preventive measures attempted to secure the
                                       access to individual computers.

                                   3.  Explain the concept of network security.
                                   4.  Compare and contrast between computer security and network security.
                                   5.  Make distinction between trusted and untrusted network.
                                   6.  What are unknown attacks?
                                   7.  Explain the technologies that provide imperative levels of protection against unknown
                                       attacks.
                                   8.  Illustrate the different attributes of a secure network.
                                   9.  Explain the technique of Intrusion Detection by Program Analysis.

                                   10.  Make distinction between LAN and WAN.

                                   Answers: Self  Assessment

                                   1.  network                           2.   Networking
                                   3.  digital                           4.   Long Haul Networks (LHNs).
                                   5.  Internet                          6.   Value-added Network (VAN)

                                   7.  Computer security                 8.   unsecured
                                   9.  privacy                           10.  Trusted
                                   11.  Untrusted                        12.  unknown
                                   13.  unknown                          14.  Software Fault Isolation (SFI)

                                   15.  Intrusion detection by program analysis (IDS)





          100                               LOVELY PROFESSIONAL UNIVERSITY
   101   102   103   104   105   106   107   108   109   110   111