logo

Electronic Security

   

Added on  2022-12-15

2 Pages1473 Words73 Views
\
INTRODUCTION
Electronic Security
The National Communications Security Committee again issued NCSC-8 in May 1982,
as the national plan of action on safeguarding U.S. Government voice communications. The plan of
action sets forward those U.S. voice communications which are to be safeguarded and mentions the
way in which the plan of action is to be enforced. NCSC-8 was primitively categorized as
confidential. As it is being reviewed that Chairman of the National Security Telecommunications
and Information Systems Security Committee, plan of action and observed that it must be
downgraded to uncategorised and again issued as NSTISSP No. 101. NCSC-8 dated May 1982 is
then cancelled and replace by NSTISSP 101.
Identity authentication for information systems
It is an another technique of data access management that is the
identity authentication for information systems which means that there are
information systems which are developed for the purpose of private or
confidential data management is highly required to authenticate and authorise
so that any other person who is not accessible cannot access the system in any
case. There are methods which helps to authenticate the systems such as
password based authentication, multi factor authentication, certificate based
authentication, biometric authentication and token based authentication. All
such authentication techniques can be used as per the type of system or data is
in use by the organization so that it can be safe for an appropriate use of it.
Electronic security can be defined as the security of data, information and any
other thing which is stored and captured by the internet from ant cybercrimes
or unusual attacks (Rappert, 2019). There are many threats which are
associated with the internet security and solutions are also introduced for the
same. This requires technology which is based on the cyber security and its
guidelines to be achieved in a legal manner in order to safeguard the data.
The following discussion is made on the secure data in transit which includes
the guidelines for securing wireless local area networks, national policy on
securing voice communication, protected distribution systems and safety
requirements for cryptographic modules and manage access which includes
persona; identity verification, general access control guidelines for cloud
systems, securing web transactions and server certificate management and
identity authentication for information systems with proper findings and
conclusion.
National policy on securing voice communication
Guidelines for securing wireless local area networks
There are many guidelines for securing wireless local area networks such using stronger
encryption, using a secure WPA password, checking for rogue Wi-Fi access points, providing a
separate network for guests, hiding the network name, using a firewall, enabling MAC
authentication for the users, using a VPN, getting a support router with an activated firewall, using
WPA2 encryption, creating a guest network, physically securing the network hardware, acquiring
higher-quality routers, deactivating the use ports on the router and adding MAC address filtering
(Khan and Sarfaraz, 2018). All such guidelines will not only prevent from any thefts against any
upcoming cybercrime but it will protect the data and information from being leaked and breached
mainly the private or confidential data of an organization.
Secure Data in Transit

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Home Network Vulnerabilities
|5
|858
|297

Assignment IT Network Designing
|10
|2046
|84

Planning Details for Network Security, Backup, Disaster Recovery and Maintenance Schedule
|3
|793
|79

Network Security: Threats, Countermeasures and Methodologies
|10
|2146
|405

Identification of Security Threats - Desklib
|8
|1416
|316

Wireless Network Routing and Switching - Assignment
|9
|1050
|121