In-Depth Analysis of Computer and Network Security: Security Levels

Verified

Added on  2023/05/29

|5
|1009
|474
Report
AI Summary
This report provides a comprehensive analysis of various security levels in computer and network systems. It begins by discussing physical security, emphasizing the protection of IT resources and operation centers. It then moves to network security, highlighting the importance of encryption, intrusion detection systems, and firewalls. Application security is addressed by analyzing application functions and potential security concerns. The report also covers file security, focusing on encryption and access permissions, followed by procedural security, which involves managerial policies and employee responsibilities. Finally, user security is discussed, emphasizing user identification, password protection, and defenses against social engineering. The report concludes that a multi-faceted approach is necessary to ensure robust computer and network security.
Document Page
Running head: COMPUTER AND NETWORK SECURITY
Computer and Network Security
[Name of the Student]
[Name of the University]
[Author note]
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
COMPUTER AND NETWORK SECURITY
Summary of the Different Security Levels
Physical:
This is considered to be the first level of security in a system. Physical security is
considered to be the primary concern and this mainly includes the IT resources along with the
people existing throughout an organization. So, it is essential to pay special attention to the
critical equipment’s that are located in the operation centers in which the servers along with
the other network hardware and al other related equipment’s operate. So, in most of the large
organizations there exists a special dedicated room for conducting the various IT operations.
For small organizations they might use an office or a storage area. Special protection is
required by each and every operating center regardless of their shape and size so as to stop
any kind of unwanted intrusions. Besides this all the computers present in a network should
be made secure as all server and the workstations might act as a potential access point for
intruders. For all this reason the physical access to any computer acts as an entry point of the
system which is to be controlled and protected.
Network
According to the definition of a network is link which helps in connecting two or
more devices so as to send receive and share the data, and all these operations conducted in
the network is known as network traffic. There must exist a network interface in a computer
so as to get connected to a network. Network interface is nothing but a combination of
hardware and software which is associated with allowing the computers interact amongst
themselves. Network security is very essential and this can be provided by making use of the
encryption which is a process associated with the encoding of the data in order to make it
inaccessible without receiving authorization. Network intrusion detection can be used so as to
Document Page
2
COMPUTER AND NETWORK SECURITY
detected any kind of intrusion in the network. NIDS acts as a burglar alarm system which
rings up the alarm whenever a violation in the configuration is detected. Some other methods
of securing the network includes the usage of firewalls, securing the different network ports,
use of private networks, and securing the various wireless networks by using passwords and
many other processes.
Application
Securing the computer rooms and the usage of the shielded network traffic are
important but it is also very essential to provide protection to all the service-based
applications as well. For doing this it is essential to analyze the functions of the various
applications along with identifying all the possible security concerns and studying all the
documents that are available and are related to the network. A special understanding is
required regarding the services, hardening of the appliances, permissions to the appliances,
validation of the input techniques, the updates and patches of the software and logs of the
software, for providing security to the appliances.
File
The computer configuration setting is associated with the storing of the personal
information of the user along with some other data which are sensitive in nature. For any of
the computer system which consist of files that are vital needs to be provided safety and
protection and for this reason the system analyst must be associated with considering the
importance that the encryption technique is having. Besides this the system analyst might also
use the file encoding technique to as to make the files unreadable to any unauthorized
personals. Special permissions are required from personnel assigned to an individual user or
to a user group.
Document Page
3
COMPUTER AND NETWORK SECURITY
Procedural
Procedural security which is also known as the operational security is associated with
the managerial policies and the controls that are responsible for providing a secure operation.
Besides this it is also believed by many IT professionals that the security is greatly dependent
upon the managerial issues rather than the technologies that are used. For this reason, it is
essential that the management is associated with working in such a way that corporate culture
is established that puta stress upon the importance that the security is having. This type of
security is also associated with defining the ways by which the tasks can be performed. It is
very essential that all he employees must understand that they are having their personal
responsibilities for the security. This type of security also includes the safeguarding of the
particular procedures which would be valuable for any intruder. Besides this it is essential to
make sure that all the procedural security is approved by the management and is explained
fully to all the employees.
User
User security is associated with the involvement of the process of identifying the
users of the system along with identifying the security issues related to the user. Despite of
the existence of various precautions ad features the system is ultimately dependent upon the
users of the system and the habits that they are having along with the practices and
willingness to provide support to the various security goals. It has been seen that there are
many cases where break-ins have occurred due to user account being compromised. This type
of security generally requires management identification, comprehensive password protection
along with defenses against social engineering, effective means by which eth resistance of the
user can be overwhelmed and lastly considering the new emerging technologies.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
COMPUTER AND NETWORK SECURITY
Bibliography:
Shelly, G. B., & Rosenblatt, H. J. (2012). „System Analysis and Design 9th Edition “. Shelly
Cashman Series.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]