logo

ENGR8762 Computer Networks and Cybersecurity

8 Pages1020 Words164 Views
   

Computer Networks and Cybersecurity (ENGR8762)

   

Added on  2021-09-19

ENGR8762 Computer Networks and Cybersecurity

   

Computer Networks and Cybersecurity (ENGR8762)

   Added on 2021-09-19

ShareRelated Documents
Running Head: NETWORK SECURITY
NETWORK SECURITY
Name of the student:
Name of the university:
Author Note:
ENGR8762 Computer Networks and Cybersecurity_1
NETWORK SECURITY1
Threat
Category
ControlDescriptionClassificationType
Accidental
corruption of
information
Network
monitoring
Network traffic
is monitored to
identify and
investigate fraud
data transfers
Administrative Prevent and
detect
Export control Unauthorized
access of
sensitive data is
restricted by
controlling
ability to paste,
copy and print
parts of
documents.
Physical and
Administrative
Prevent
Control of
physical media
Copy of
sensitive data to
unauthorized
devices is
prevented.
Physical Prevent
Perimeter
security
Sensitive data is
prevented from
leaving the
perimeter
Physical Prevent
Loss of
intellectual
property
Security of
proprietary
information
Access to
proprietary
information is
controlled
Administrative Prevent
Data security
and encryption
Data is
encrypted by
process of
cryptography
such that
unapproved
access is
prevented
Physical Prevent and
detect
Secure servers The servers
should be
secured by using
antivirus and
firewalls.
Product Prevent and
detect
Remind people
of access to
sensitive IP
People is
reminded
continuously to
protect sensitive
Administrative Prevent
ENGR8762 Computer Networks and Cybersecurity_2
NETWORK SECURITY2
IP.
Software piracy Firewall Source IP
address is
filtered for
access to
software that
prevents
software privacy
Product Prevent
Antivirus Ensures that
system does not
contain any
malware that
will facilitate
software piracy
Product Prevent
Policy to update
antivirus
Software should
be updated to
prevent software
piracy
Administrative Prevent
Web application
firewall
Identifies any
piracy in
software
Product Prevent and
detect
Plan to respond
to incidents
Plan that will
prepare to
respond to
software piracy
quickly
Administrative Compensate
Theft of
information
(hacker)
Firewall Controls traffic
passing through
all network ports
Product Prevent
Anti-malware
software
Detects
malwares in the
network used by
hackers to steal
data
Product Prevent and
detect
Sensitive data
encryption
Sensitive data
stored in storage
device should be
encrypted so that
it becomes hard
to access even if
hacker gains
access to
network.
Administrative Prevent and
detect
Policy to keep
software updated
Processes and
procedures are
ensured that they
Administrative Prevent and
detect
ENGR8762 Computer Networks and Cybersecurity_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network and Security - Threats and Controls
|14
|1843
|104

Computer Networks and Cybersecurity: Threats and Controls
|13
|1739
|446

Threat Categories for Information Security: Prevention and Detection Techniques
|13
|1796
|257

Network and Security: Threats and Controls
|10
|1781
|75

Network and Security: Threat Control
|14
|1775
|486

Creating a Company Culture for Security - Security steps and methods for an organization
|4
|534
|193