logo

Network Security and Data Communications

   

Added on  2023-06-10

11 Pages3560 Words61 Views
Network Security and Data
Communications
Network Security and Data Communications_1
Contents
INTRODUCTION...........................................................................................................................3
MAIN BODY...................................................................................................................................3
TASK 1............................................................................................................................................3
1.1: Analyse the core vulnerabilities within a network environment and an online environment.
......................................................................................................................................................3
1.2: Explain how the emergence of security thinking and tools can benefit a network
environment.................................................................................................................................4
TASK 2............................................................................................................................................5
2.1: Evaluate the link between network architecture and security engineering concepts............5
TASK 3............................................................................................................................................5
3.1: Evaluate internal risks and exposure. ..................................................................................5
3.2: Evaluate available process and physical defences against malicious network intrusions....6
TASK 4............................................................................................................................................7
4.1: Explain how key security concepts can be applied in a large and distributed organisation. 7
4.2: Assess how key factors are applied to enhance and embed an holistic approach to network
and systems resilience..................................................................................................................8
CONCLUSION................................................................................................................................9
REFERENCES..............................................................................................................................10
Network Security and Data Communications_2
INTRODUCTION
Network security is considered as the technologies set which safeguard the integrity and
usability of organisational structures through preventing the entry or proliferation into a network
of board variety of possible threats. Additionally, this is essential for home networks and within
business world both. Most homes along with higher speed internet connections that have one or
above wireless routers that might be exploited if not appropriately secured. Data communication
is described as the procedures of utilising computing and communication technologies for
transferring the information from one area to other or among participating parties. In addition to
this it is vital as it permits business for minimising expenditures and develops effectiveness
through sharing information & common equipments between several different computers.
MAIN BODY
TASK 1
1.1: Analyse the core vulnerabilities within a network environment and an online environment.
Network environment and online environment is a communication system which ties
various users together. There are mainly two core vulnerabilities in network and online
environment such as network and non physical vulnerabilities. Network vulnerability is
undertaken as the weakness or flaw into hardware, software or business procedures that when
included through threat which outcomes within security may breach. Moreover, the non-
physical network vulnerabilities mainly includes information or software. By aspects of
vulnerability, cyber adversaries are become competent for gaining access to their system as well
as gather information. In addition to this, network vulnerabilities continuously evolve, outcomes
into loss of crucial data as well as revenue from businesses. This may be either non-physical or
physical. In addition to this, utilizable weaknesses as well as bugs are always present into
networks but acknowledging how hackers influence them provides business a clarified image of
what management should perform for preventing authorised users from accessing any valuable
assets of digital. Also, network vulnerabilities are comes into various kinds but the much
common forms are:
Malware Attacks: Malware attacks are regarded as the common cyber attacks in which
malware implements unauthorised actions upon system of victims. Additionally, the
3
Network Security and Data Communications_3
malicious software encompasses various particular forms of attacks like spyware, key
loggers and ransom ware.
Outdated software issues: One of the key network security vulnerabilities is regarded as
outdated or unpatched software which exposes system that runs the application as well as
possibilities of whole network. As an outcome, much vulnerable to ransom ware attacks,
data breaches and malware.
Social engineering attacks: It have become a famous method utilised through threats
actors for simply bypass authentication as well as authorization security protocols and
obtain access towards a network. In addition this, these attacks have enhanced critically
into previous 5 years that become a lucrative business for hackers. Additionally, internal
users focus the huge security risk towards firm mainly as they are uneducated or unaware
of threats.
Outdated or unpatched software: With the changing market scenario there are various
companies which is been doing dome new bug fixes and there are various errors which is
been occurred in order to reduce the vulnerabilities. There are multiple patches which is
been analysed and other feature upgrades. The companies use various aspects to ensure
that they are providing maximum security to the customers.
Misconfigured Firewalls and operating systems: This is the threat which is been
affecting the computers and the network environment in a significant manner. The
servers are exposed to the malware software and other types of virus. The individual
needs to ensure that they are using the firewall system which helps them to protect from
various malware software and virus.
1.2: Explain how the emergence of security thinking and tools can benefit a network
environment.
The emergence of security thinking is undertaken as the new manner to understand,
observe and responds towards threats that provides firms the ideal responds to continuously
moving challenges of security. Additionally, the network security tools may be either software or
hardware based that aids in protecting firm’s networks, crucial information from attacks and
critical infrastructures. Currently, business having access to much valuable data than even before
ass well as safeguarding those information is essential to organisational growth. effectual tools of
security act as gatekeeper towards those data, preventing unauthorised access, mis-utilise, change
4
Network Security and Data Communications_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security and Data Communications
|10
|2937
|125

Cyber Security Management
|14
|2652
|374

Network Security and Types of Security Threats and Attacks in Information Technology
|8
|2577
|274

IS Security and Risk Management Assignment PDF
|10
|3410
|84

Network Security: Protecting the Integrity and Usability of Networking Services and Data
|25
|1420
|50

Computer Security of Zoom Printing Company Assignment
|16
|3609
|44