logo

Network Security Policy: Importance and Strategies

5 Pages1239 Words194 Views
   

Added on  2023-06-03

About This Document

This report discusses the importance of network security policy and strategies to mitigate risks associated with the system. Four articles related to network security policy are discussed, covering topics such as intrusion prevention, cryptography, and VPN. The report emphasizes the need for access control and minimal security configuration standards for servers to enhance network capacity.

Network Security Policy: Importance and Strategies

   Added on 2023-06-03

ShareRelated Documents
Network security
Network Security Policy: Importance and Strategies_1
1 | P a g e
Introduction
Network security policy is used to protect the integrity of a network by making sure
that risk associated with the system is mitigated. This policy ensures that computer and
network are secured from the misuse. In this report, four articles related to network security
policy is discussed. The security policy component makes use of acceptable use policy as it
defined the list of things that are allowed to be performed by the user. These policies make
sure that information and people are protected. The policy set the rules so that security could
be enhanced.
1. Perlman, R., Kaufman, C. and Speciner, M., 2016. Network security: private
communication in a public world. Pearson Education India.
The title of the article disused is “Network security in the public world” written by Perlman,
Speciner and kaunman. In the views of author it is found that network security is one of the
important components in the field of communication and networking. The importance of
network security for an organisation as well as customers is discussed. It states that all the
confidential information should be secured and should be accessed only by the authorised and
valid user. It is true that cyber-attacks and criminal activities are increasing day by day. Thus
cyber-attacks are analysed in this article and effective solutions are offered. In the article the
analytic method that is used is qualitative and the data is collected through both primary as
well as secondary source. Some of the advanced technology that are discussed in the article to
improve security is firewalls, antiviruses, building cloud atmosphere ad risk protection
through big data. The paper covered the threats that are faced on computer networks and the
methods to prevent it. The author suggested that security plans should be designed so that in
case of failure system could be recovered easily.
2. Shahbazi, M and McAfee LLC, 2014. Network security: System and method for
enforcing a security policy on mobile devices using dynamically generated security
profiles. U.S. Patent 8,635,661.
The title of this paper is Network Security: System and method for enforcing a security
policy on mobile devices using dynamically generated security profiles that was written
by Shahbazi and McAfee in year 2014. The purpose of this article is to know about the
challenges and finding the ways through which risk and threats could be reduced. Security is
Network Security Policy: Importance and Strategies_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Malicious Software Protection Policy: Articles Review
|6
|1223
|414

CST 610 9043 Cyberspace and Cyber security Foundation
|11
|792
|22

Computer and Network Security Content
|21
|1055
|20

Mission-Critical Components of a LAN | Study
|19
|3346
|30

Cyber Security and Resilience: A Report for the Board of the Company
|10
|3070
|72

Cyber Security Assignment 2022
|12
|2845
|22