logo

Reflection on Physical Security, Telecommunications & Network Security

   

Added on  2023-01-19

4 Pages731 Words84 Views
 | 
 | 
 | 
Reflection on physical security, telecommunications & network security
Name
Institution
Professor
Course
Date
Reflection on Physical Security, Telecommunications & Network Security_1

Network security in the field of information technology has been facing several
challenges such as hacking, injections, and viruses. Network Security can be broken down into
physical and logical aspects. Physical security involves the protection of both data and
underlying organizational infrastructure through physical means such as security guards, locks
and walls. There is no doubt that physical security remains to be the first security measure to
protect organizational infrastructure. I concur with network security experts that physical
security should be given the highest priority before enforcing technological rules.
Implementation of physical security measures are meant to make sure data, and infrastructure
access is given only to authorized personnel. Physical security can be enforced through cabinet
locks, heavy doors, and data center access to just a few accredited experts and relocking of
devices. Good examples can be deduced from locking of data storage devices such as portable
disks and laptops.
Technology measures to data and information security involve the implementation of
firewalls and Virtual Private Networks (VPNs). Firewalls should be made to be intelligence to
offers extra security measure to make sure every access has audit trails. To make sure
organizational data and its infrastructure remain secure, information security experts should
assess vulnerabilities. Network and data vulnerabilities are aspects that occur as a result of
human negligence or technical experts compromising already existing security measures. To
implement a secure network, vulnerabilties within the system can be assessed through network
scanning as well as penetration testing. Scanning and penetration testing are used as internal
measures to evaluate the security of the network. Further security measures should be
implemented through the use of Intrusion Detection System (IDS) and Intrusion Prevention
Systems (IPS). IDS detects any form of malicious activities while IPS are used to neutralize the
Reflection on Physical Security, Telecommunications & Network Security_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security: Concepts and Techniques
|11
|718
|27

Assignment | Cyber Security
|23
|2174
|14

Computer and Network Security Content
|21
|1055
|20

Literature Review on Firewalls
|12
|3072
|26

(PDF) An Analysis of the Cloud Computing Security Problem
|3
|809
|75

Cyber Security Measures and Future Exploration
|4
|525
|332