Cyber Security Technologies and Trends
VerifiedAdded on  2020/04/07
|14
|3555
|412
AI Summary
This assignment delves into various cybersecurity technologies, including Intrusion Detection Systems (IDS), firewalls, and Data-Centric Security. It explains how these systems function, their limitations, and the importance of upgrading them to combat evolving cyber threats. Additionally, the document discusses the implications of automation on workforces and its impact on various industries.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: PROFESSIONAL SKILLS
PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION
TECHNOLOGY
Name of the Student:
Name of the University:
Author note:
Unit Code:
Unit Name:
Email address:
Campus Lecturer:
Unit Coordinator:
PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION
TECHNOLOGY
Name of the Student:
Name of the University:
Author note:
Unit Code:
Unit Name:
Email address:
Campus Lecturer:
Unit Coordinator:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Executive Summary
This report is all about network security which is a security system designed for a network to
block unauthorized access and various kinds of threats. Various system round the globe that does
all the vital transaction and communication of regularly need security for protecting the data
which contain vital information. The different types of network application available in present
industry are intrusion detection system, firewalls and data-centric security. The advantage and
disadvantage of intrusion detection system will be discussed below in the coming pages of the
report. Various legal, ethical and social consideration of various organization has been discussed
below.
The various organization around the globe has started using technologies like firewall, intrusion
detection system, data centric can be proved beneficial to various organization. The limitation of
these three technologies has been discussed below.
This report is all about network security which is a security system designed for a network to
block unauthorized access and various kinds of threats. Various system round the globe that does
all the vital transaction and communication of regularly need security for protecting the data
which contain vital information. The different types of network application available in present
industry are intrusion detection system, firewalls and data-centric security. The advantage and
disadvantage of intrusion detection system will be discussed below in the coming pages of the
report. Various legal, ethical and social consideration of various organization has been discussed
below.
The various organization around the globe has started using technologies like firewall, intrusion
detection system, data centric can be proved beneficial to various organization. The limitation of
these three technologies has been discussed below.
Table of Contents
Executive Summary.............................................................................................................2
Introduction..........................................................................................................................4
Discussion............................................................................................................................5
Different types of Network Security Application............................................................6
Expansion of Organization..............................................................................................8
Advantage of using intrusion detection system...............................................................9
Disadvantage of using intrusion detection system...........................................................9
Advantage of Using Firewall.........................................................................................10
Disadvantage of using Firewall.....................................................................................10
Advantage of Using Data Centric Security...................................................................10
Disadvantage of using Data Centric Security................................................................10
Ethical, Social and Legal considerations.......................................................................11
Conclusion.........................................................................................................................11
Recommendation...............................................................................................................12
References..........................................................................................................................14
Executive Summary.............................................................................................................2
Introduction..........................................................................................................................4
Discussion............................................................................................................................5
Different types of Network Security Application............................................................6
Expansion of Organization..............................................................................................8
Advantage of using intrusion detection system...............................................................9
Disadvantage of using intrusion detection system...........................................................9
Advantage of Using Firewall.........................................................................................10
Disadvantage of using Firewall.....................................................................................10
Advantage of Using Data Centric Security...................................................................10
Disadvantage of using Data Centric Security................................................................10
Ethical, Social and Legal considerations.......................................................................11
Conclusion.........................................................................................................................11
Recommendation...............................................................................................................12
References..........................................................................................................................14
Introduction
This report is all about network security which is a security system designed for a
network to block unauthorized access and various kinds of threats. It also focuses to improvise
the job of network admin to create some preventive measures to protect their network system
from any kind of threat. Various system round the globe that does all the vital transaction and
communication of regularly need security for protecting the data which contain vital information.
It mainly keeps a track on different threats that may arise in a network. Network security
mainly works by adding different layers of various security defenses.
The different types of network application available in present industry are intrusion
detection system, firewalls and data-centric security. Firewall is type of network security system
that is mainly used for maintenance and regulation of traffic over the internet using basic
protocol and methods (Rasthofer et al.,2014). Firewall exists in mainly two forms that DHCP
server which is hardware component and there are some software firewalls are mainly used for
protection of system from various threats. Software firewall is mainly used by organization for
protection against the breach of data which contains vital information. Data centric security
mainly provide security against the breach of important data which contain vital information. No
organization round the globe can claim that it is purely immune to various cyber-attacks.
The report mainly focuses on promoting the use of various technological services like
firewall, intrusion detection system, data centric which can be proved beneficial for various
organization round the globe. Various limitation of intrusion detection system will be discussed
in the coming pages of this report. Intrusion detection system does not block or prevent attack of
various malware software’s (Suh et al., 2014). The attacks of various malware can be stopped by
This report is all about network security which is a security system designed for a
network to block unauthorized access and various kinds of threats. It also focuses to improvise
the job of network admin to create some preventive measures to protect their network system
from any kind of threat. Various system round the globe that does all the vital transaction and
communication of regularly need security for protecting the data which contain vital information.
It mainly keeps a track on different threats that may arise in a network. Network security
mainly works by adding different layers of various security defenses.
The different types of network application available in present industry are intrusion
detection system, firewalls and data-centric security. Firewall is type of network security system
that is mainly used for maintenance and regulation of traffic over the internet using basic
protocol and methods (Rasthofer et al.,2014). Firewall exists in mainly two forms that DHCP
server which is hardware component and there are some software firewalls are mainly used for
protection of system from various threats. Software firewall is mainly used by organization for
protection against the breach of data which contains vital information. Data centric security
mainly provide security against the breach of important data which contain vital information. No
organization round the globe can claim that it is purely immune to various cyber-attacks.
The report mainly focuses on promoting the use of various technological services like
firewall, intrusion detection system, data centric which can be proved beneficial for various
organization round the globe. Various limitation of intrusion detection system will be discussed
in the coming pages of this report. Intrusion detection system does not block or prevent attack of
various malware software’s (Suh et al., 2014). The attacks of various malware can be stopped by
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
the help of an experienced and well-trained engineer. Among all the methods this particular
method uses protocol based attacks (PBA).
Discussion
Network Security can be defined as the security which is designed for a network from
unauthorized access and risks. It is the job of network admin to design some preventive measures
to save their network from any kinds of threats or danger. Computer system that makes
transaction and communication on a regular basis needs security for protecting its data with
contain vital information. It can also be referred to as an activity which is mainly created for
protecting the various network and data containing important information (Rasthofer et al.,2014).
It is mainly to check different threats that may arise in a network. The best way to protect a
network is to assign it a unique name and a password corresponding to it (Chen et al., 2015).
Network security works by combining different layers of security defenses. Different
security layer uses policies and control for its working (Demchenko, De Laat & Membrey,
2014). It allows only authorized user to access the network and blocks any unknown user to save
the network from exploitation and threats. Digitization has changed the living style of various
people across the globe (Suh et al., 2014). It is the duty of every organization to check the
network security as any fault in it may compromise with service given to a customer. Network
security aims to protect important information from any attack (Chen et al., 2015).
There are various types of security devices involved in a network like active device,
passive device, preventative device, unified threat management. Active devices mainly refer to
certain devices that cuts down unwanted traffic. Firewall, Antivirus scanning devices is
considered as active device. Passive device helps in identifying unwanted traffic and intrusion
method uses protocol based attacks (PBA).
Discussion
Network Security can be defined as the security which is designed for a network from
unauthorized access and risks. It is the job of network admin to design some preventive measures
to save their network from any kinds of threats or danger. Computer system that makes
transaction and communication on a regular basis needs security for protecting its data with
contain vital information. It can also be referred to as an activity which is mainly created for
protecting the various network and data containing important information (Rasthofer et al.,2014).
It is mainly to check different threats that may arise in a network. The best way to protect a
network is to assign it a unique name and a password corresponding to it (Chen et al., 2015).
Network security works by combining different layers of security defenses. Different
security layer uses policies and control for its working (Demchenko, De Laat & Membrey,
2014). It allows only authorized user to access the network and blocks any unknown user to save
the network from exploitation and threats. Digitization has changed the living style of various
people across the globe (Suh et al., 2014). It is the duty of every organization to check the
network security as any fault in it may compromise with service given to a customer. Network
security aims to protect important information from any attack (Chen et al., 2015).
There are various types of security devices involved in a network like active device,
passive device, preventative device, unified threat management. Active devices mainly refer to
certain devices that cuts down unwanted traffic. Firewall, Antivirus scanning devices is
considered as active device. Passive device helps in identifying unwanted traffic and intrusion
detection appliance can be referred as a passive device (Suh et al., 2014). Preventive devices help
in scanning the network and checks any security problems related to it. Unified threat
management devices is considered as the best device as it does all the work of different devices
like firewall, content filtering, web catching and many other things (Chen et al., 2015).
Different types of Network Security Application
Three different types of network application used in present market are intrusion
detection system, firewalls and Data-Centric-Security. Firewall is nothing but a network security
system that aims in maintenance and regulation of traffic over the network using some basic
protocols. (Chen, 2013). Firewalls exists in two forms like as hardware and hardware appliance.
Some firewalls that are hardware based acts like DHCP server over the network. Now days many
computers use different types of software based firewalls to prevent its data from any network
threats. Modern router that transfer data over network contains firewall components which is
mainly used for performing basic routing function. The basic function of firewall that is used in
private network is to prevent unauthorized access of device to the internet. Every important
information that passes through internet will have to go through firewall for examination of
different security checks. A perfect firewall system consists of both type of devices like
hardware and software. It also aims in providing easy access to personal networks through
various certificates and logins. Hardware firewalls are solo products. These types of firewalls are
mainly found in routers used by various broadband services. Hardware firewalls prvide the
freedom to use four port networks in any system. For larger network, it provides business
firewall solutions also. Software firewalls are mainly used to protect system from various threats
from internet. It is mainly used by various firms to protect them against the breach of any
important data (Chen, 2013).
in scanning the network and checks any security problems related to it. Unified threat
management devices is considered as the best device as it does all the work of different devices
like firewall, content filtering, web catching and many other things (Chen et al., 2015).
Different types of Network Security Application
Three different types of network application used in present market are intrusion
detection system, firewalls and Data-Centric-Security. Firewall is nothing but a network security
system that aims in maintenance and regulation of traffic over the network using some basic
protocols. (Chen, 2013). Firewalls exists in two forms like as hardware and hardware appliance.
Some firewalls that are hardware based acts like DHCP server over the network. Now days many
computers use different types of software based firewalls to prevent its data from any network
threats. Modern router that transfer data over network contains firewall components which is
mainly used for performing basic routing function. The basic function of firewall that is used in
private network is to prevent unauthorized access of device to the internet. Every important
information that passes through internet will have to go through firewall for examination of
different security checks. A perfect firewall system consists of both type of devices like
hardware and software. It also aims in providing easy access to personal networks through
various certificates and logins. Hardware firewalls are solo products. These types of firewalls are
mainly found in routers used by various broadband services. Hardware firewalls prvide the
freedom to use four port networks in any system. For larger network, it provides business
firewall solutions also. Software firewalls are mainly used to protect system from various threats
from internet. It is mainly used by various firms to protect them against the breach of any
important data (Chen, 2013).
Intrusion detection system is also known as intrusion detection and prevention system
are considered as various appliances that helps in monitoring of unknown activates over the
internet and keeps a track of all the necessary information and various methods or steps that can
be taken to stop the activity. Intrusion detection system aims to build an alarm system for any
unknown activity in the network, drops the various packets and many times it resets the whole
connection and protects the system from any damage or blockage (Chen, 2013). Intrusion
detection system can perform many activities like to detect correction cyclic redundancy check
and any errors related to it, prevention of transmission control protocol relating issues
(Demchenko, De Laat & Membrey, 2014). It also aims to create unwanted transport and layers of
various network. Intrusion prevention system is another technology which extends the solution
of IDS by including the ability to block various threats which are detected by it. It has become
the important option for checking various technology like IDS and IPS technology. IDA only
detects threats which are placed out of band of the network infrastructure which means that is
does not have any kind of passage for communication between the receiver and sender of the
information. IDS solution mainly uses TAP port for checking inline traffic which mainly checks
that it does not affect the performance of inline network. The main function of IDA is to check
the traffic (Demchenko, De Laat & Membrey, 2014).
Data-centric security mainly aims to provide security against the breach of important
data. No organization in the world is immune to various cyber-attacks. Data-centric security aims
to provide following key points like data discovery, data classification, data tagging and
watermarking, data loss prevention, visibility of data, identity management, access of data
through cloud system. Tools used by data discovery mainly helps organization to get a detail
information about the location, volume, context and all the types of risk associated with it. Data
are considered as various appliances that helps in monitoring of unknown activates over the
internet and keeps a track of all the necessary information and various methods or steps that can
be taken to stop the activity. Intrusion detection system aims to build an alarm system for any
unknown activity in the network, drops the various packets and many times it resets the whole
connection and protects the system from any damage or blockage (Chen, 2013). Intrusion
detection system can perform many activities like to detect correction cyclic redundancy check
and any errors related to it, prevention of transmission control protocol relating issues
(Demchenko, De Laat & Membrey, 2014). It also aims to create unwanted transport and layers of
various network. Intrusion prevention system is another technology which extends the solution
of IDS by including the ability to block various threats which are detected by it. It has become
the important option for checking various technology like IDS and IPS technology. IDA only
detects threats which are placed out of band of the network infrastructure which means that is
does not have any kind of passage for communication between the receiver and sender of the
information. IDS solution mainly uses TAP port for checking inline traffic which mainly checks
that it does not affect the performance of inline network. The main function of IDA is to check
the traffic (Demchenko, De Laat & Membrey, 2014).
Data-centric security mainly aims to provide security against the breach of important
data. No organization in the world is immune to various cyber-attacks. Data-centric security aims
to provide following key points like data discovery, data classification, data tagging and
watermarking, data loss prevention, visibility of data, identity management, access of data
through cloud system. Tools used by data discovery mainly helps organization to get a detail
information about the location, volume, context and all the types of risk associated with it. Data
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
classification aims to provide various policies and tools which can be used to separate valuable
information which can be targeted from a less important information. Data tagging aims to
ensure that all the containing important information can be found easily. Data is mainly tag to
produce its security classification and other important information related to it. Data loss
prevention mainly used for identification and protection of data which can be in motion on
networks and data at rest in various storage devices like desktop, laptop, mobile phone and
tablets. Data visibility allows various organization to check how structured and unstructured can
be processed (Liang & Xiao, 2013). Identity and access management aims to protect data by
checking that only authorized people has the access to right information at correct time and for
ethical reasons (Liang & Xiao, 2013). Corporate networks provide a global platform where user
from various domains can access the required information at right time. Organization are
increase the need of various application and are more focusing in moving their application to
cloud (Liang & Xiao, 2013). Cloud access security brokers mainly aims to protect important data
by improving its access control, access and analysis of important data (Knapp & Langill, 2014)
.
Brenna nit is considered to be an effective information and/or network security solution in
Australia. It mainly aims to provide better network visibility and network monitoring from various
application level attacks.
Expansion of Organization
In the next five-year firewall method can protect the internal network of a business from
any kind of damage from unknown source. A firewall contains a list of control list which can be
used to block authorized access and only allow approved routes. Firewall helps in making
internal IP addresses private and also checks that the information and system are not exposed to
information which can be targeted from a less important information. Data tagging aims to
ensure that all the containing important information can be found easily. Data is mainly tag to
produce its security classification and other important information related to it. Data loss
prevention mainly used for identification and protection of data which can be in motion on
networks and data at rest in various storage devices like desktop, laptop, mobile phone and
tablets. Data visibility allows various organization to check how structured and unstructured can
be processed (Liang & Xiao, 2013). Identity and access management aims to protect data by
checking that only authorized people has the access to right information at correct time and for
ethical reasons (Liang & Xiao, 2013). Corporate networks provide a global platform where user
from various domains can access the required information at right time. Organization are
increase the need of various application and are more focusing in moving their application to
cloud (Liang & Xiao, 2013). Cloud access security brokers mainly aims to protect important data
by improving its access control, access and analysis of important data (Knapp & Langill, 2014)
.
Brenna nit is considered to be an effective information and/or network security solution in
Australia. It mainly aims to provide better network visibility and network monitoring from various
application level attacks.
Expansion of Organization
In the next five-year firewall method can protect the internal network of a business from
any kind of damage from unknown source. A firewall contains a list of control list which can be
used to block authorized access and only allow approved routes. Firewall helps in making
internal IP addresses private and also checks that the information and system are not exposed to
hackers. The ultimate goal is to create a public IP address so that the private IP may work as a
public IP. By following the above three methods the network architecture can work properly it
also helps in easy monitoring of network against various security threats. The above network can
be used for tracking threats throughout the organization.
Advantage of using intrusion detection system
Intrusion detection system can be used to tune specific contents in various packets of
network. It can be used to check for data in respect to other protocol. It helps in easy regulation
of data across various networks. It can be used for increasing the efficiency of the system.
Intrusion detection system helps in providing a clear overview of the going things over the
network and there are few number of alternative that help the IDS to track the depth of network
traffic. It also helps in tracking of virus as soon as it hits a network. An IDS can effectively tell
about the compromised machines and how a virus it propagating through a network top effect
over systems. In many cases it is found to be an important tool to prevent a network from various
damage. A well configured IDS can be useful to provide data that used to file a civil or criminal
case against any person who misuses a network.
Disadvantage of using intrusion detection system
They do not prevent attacks or block them, they are mainly used for uncovering them. An
Experienced and well-trained engineer is needed for administration. This particular method is
more prone to protocol based attacks (PBA). The signature library of this method needs to be
continuously updated to check the upcoming and latest threats related to it. An IDS cannot
replace a firewall, virus scan or any security measures. As soon as an IDS is installed in the
system it will require more additional efforts. Another thing that must be taken care is that
managing of IDS mainly requires experience staff members. The less experienced staff of the
public IP. By following the above three methods the network architecture can work properly it
also helps in easy monitoring of network against various security threats. The above network can
be used for tracking threats throughout the organization.
Advantage of using intrusion detection system
Intrusion detection system can be used to tune specific contents in various packets of
network. It can be used to check for data in respect to other protocol. It helps in easy regulation
of data across various networks. It can be used for increasing the efficiency of the system.
Intrusion detection system helps in providing a clear overview of the going things over the
network and there are few number of alternative that help the IDS to track the depth of network
traffic. It also helps in tracking of virus as soon as it hits a network. An IDS can effectively tell
about the compromised machines and how a virus it propagating through a network top effect
over systems. In many cases it is found to be an important tool to prevent a network from various
damage. A well configured IDS can be useful to provide data that used to file a civil or criminal
case against any person who misuses a network.
Disadvantage of using intrusion detection system
They do not prevent attacks or block them, they are mainly used for uncovering them. An
Experienced and well-trained engineer is needed for administration. This particular method is
more prone to protocol based attacks (PBA). The signature library of this method needs to be
continuously updated to check the upcoming and latest threats related to it. An IDS cannot
replace a firewall, virus scan or any security measures. As soon as an IDS is installed in the
system it will require more additional efforts. Another thing that must be taken care is that
managing of IDS mainly requires experience staff members. The less experienced staff of the
organization, the more effort is needed for them. It will ultimately create more work for the IT
department and in many cases it will make work of the IT department more difficult (Rasthofer
et al.,2014).
Advantage of Using Firewall
Firewall improves the security of host computers and subnet and it has many advantage
like it ensure the safety of host and application, ensures safety of several client and server. It also
protects various pivotal departments of an organization form inner or outer attacking (Divya,
Priya & Kowselya, 2015). It also provides safety channel for various employees of an
organization. Various client provides safety channel that passes through internet and visit long
distance system.
Disadvantage of using Firewall
Firewalls slows down many application and may be considered as heavy on some system
resources (Divya, Priya & Kowselya, 2015). Firewalls can be considered difficult to remove and
every host of the computer system needs to updated on regular basis using patches.
Advantage of Using Data Centric Security
Data Centric Security provides data protection techniques for protecting toolset to tackle
masking of data, cloud protection, compliance and data residency. It also provides fast
integration through various web services and high performance of Library of clients and masking
of dynamic data.
department and in many cases it will make work of the IT department more difficult (Rasthofer
et al.,2014).
Advantage of Using Firewall
Firewall improves the security of host computers and subnet and it has many advantage
like it ensure the safety of host and application, ensures safety of several client and server. It also
protects various pivotal departments of an organization form inner or outer attacking (Divya,
Priya & Kowselya, 2015). It also provides safety channel for various employees of an
organization. Various client provides safety channel that passes through internet and visit long
distance system.
Disadvantage of using Firewall
Firewalls slows down many application and may be considered as heavy on some system
resources (Divya, Priya & Kowselya, 2015). Firewalls can be considered difficult to remove and
every host of the computer system needs to updated on regular basis using patches.
Advantage of Using Data Centric Security
Data Centric Security provides data protection techniques for protecting toolset to tackle
masking of data, cloud protection, compliance and data residency. It also provides fast
integration through various web services and high performance of Library of clients and masking
of dynamic data.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Disadvantage of using Data Centric Security
Data Centric security provides low security with limited performance and capability. It
cannot represent various complex data relationships. In Data centric security data redundancy is
very common especially when the quantity or amount of data increases.
Ethical, Social and Legal considerations
All companies have some legal responsibilities and they are required to accept the laws
which can affect the organization. For proper working of an organization company must aware
of various external factors. Social responsibility aims to provide certain requirements related to
social responsibility. Ethical responsibility aims to create certain guidelines which helps in the
establishment of various codes of conduct. Ca ethics can be considered as a system which is
mainly designed for various practice related to ethics.
Conclusion
From the above discussion, it can be concluded that the organization has started using
technologies like firewall, intrusion detection system, data centric can be proved beneficial to
various organization. Firewall is a network security which helps in maintaining and regulating its
traffic over the internet using some protocol. Firewalls mainly exists mainly two forms that is
DHCP which is hardware form and there are some software firewalls which is mainly for
protection of a system from various malware software that may attack the system. This method is
mainly used mainly used by various organization for protection against the breech of important
data which contains vital information. Intrusion detection system is also known as intrusion
detection and prevention system are referred to those systems which helps in keeping a track of
different applications which perform some activities over the internet. It also helps in keeping a
track of all the required information and various steps that must be taken to stop such activities.
Data Centric security provides low security with limited performance and capability. It
cannot represent various complex data relationships. In Data centric security data redundancy is
very common especially when the quantity or amount of data increases.
Ethical, Social and Legal considerations
All companies have some legal responsibilities and they are required to accept the laws
which can affect the organization. For proper working of an organization company must aware
of various external factors. Social responsibility aims to provide certain requirements related to
social responsibility. Ethical responsibility aims to create certain guidelines which helps in the
establishment of various codes of conduct. Ca ethics can be considered as a system which is
mainly designed for various practice related to ethics.
Conclusion
From the above discussion, it can be concluded that the organization has started using
technologies like firewall, intrusion detection system, data centric can be proved beneficial to
various organization. Firewall is a network security which helps in maintaining and regulating its
traffic over the internet using some protocol. Firewalls mainly exists mainly two forms that is
DHCP which is hardware form and there are some software firewalls which is mainly for
protection of a system from various malware software that may attack the system. This method is
mainly used mainly used by various organization for protection against the breech of important
data which contains vital information. Intrusion detection system is also known as intrusion
detection and prevention system are referred to those systems which helps in keeping a track of
different applications which perform some activities over the internet. It also helps in keeping a
track of all the required information and various steps that must be taken to stop such activities.
It mainly aims to build an alarm system for keeping a track of various unknown activity. IPS
stands for intrusion prevention system which is another technology by IDS which has the
capability to block various malware software the internet. Data- centric security is another
technology which mainly aims to provide security against breach of data which contains
important information. Various organization round the globe are very much prone to cyber-
attacks. Data centric security mainly aims to provide various key points like discovery of data,
classification of data, tagging of data, prevention of data loss, data visibility, management of
identity and accessing of data through various cloud system. As discussed above intrusion
detection system have some limitation like it does not prevent attacks or blocks them. It mainly
helps in uncovering them by the help of an experienced and well-trained engineer. This
particular method is more used to protocol based attacks (PBA).
Recommendation
From the above discussion it can be recommended that the various organization should
upgrade their intrusion detection system, firewalls and data centric security. As firewall can be
considered as an important security system that helps in regulation and maintenance of traffic
over the network using some protocol. Hardware and software firewall are mainly two types of
firewalls available over the network. DHCP is an example of a well-known hardware firewall
that is used over internet. Software firewalls are mainly used to protect various system from
different malware software that is available over the internet. Intrusion detection system helps in
keeping a track of all the important information and various steps that must be taken to stop the
activity of various malware software’s. It also performs various activities like detection of cyclic
redundancy and checking of any errors related to it. Data centric security mainly aims to provide
stands for intrusion prevention system which is another technology by IDS which has the
capability to block various malware software the internet. Data- centric security is another
technology which mainly aims to provide security against breach of data which contains
important information. Various organization round the globe are very much prone to cyber-
attacks. Data centric security mainly aims to provide various key points like discovery of data,
classification of data, tagging of data, prevention of data loss, data visibility, management of
identity and accessing of data through various cloud system. As discussed above intrusion
detection system have some limitation like it does not prevent attacks or blocks them. It mainly
helps in uncovering them by the help of an experienced and well-trained engineer. This
particular method is more used to protocol based attacks (PBA).
Recommendation
From the above discussion it can be recommended that the various organization should
upgrade their intrusion detection system, firewalls and data centric security. As firewall can be
considered as an important security system that helps in regulation and maintenance of traffic
over the network using some protocol. Hardware and software firewall are mainly two types of
firewalls available over the network. DHCP is an example of a well-known hardware firewall
that is used over internet. Software firewalls are mainly used to protect various system from
different malware software that is available over the internet. Intrusion detection system helps in
keeping a track of all the important information and various steps that must be taken to stop the
activity of various malware software’s. It also performs various activities like detection of cyclic
redundancy and checking of any errors related to it. Data centric security mainly aims to provide
security against the breach of data which contains important information as no organization in
the globe is immune to various cyber-attacks.
Robotics can be used as an emerging technology which can improvise the speed, quality,
expenditure of available products and services, on the contrary it can effect a large number of
workers. The automation technology will ultimately affect the hardware, software and various
self-care customer services which will improve the economy of various organization round the
globe. Automation technology mainly aims to improve workface of many organization including
this one.
the globe is immune to various cyber-attacks.
Robotics can be used as an emerging technology which can improvise the speed, quality,
expenditure of available products and services, on the contrary it can effect a large number of
workers. The automation technology will ultimately affect the hardware, software and various
self-care customer services which will improve the economy of various organization round the
globe. Automation technology mainly aims to improve workface of many organization including
this one.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
References
Chen, G., Gong, Y., Xiao, P., & Chambers, J. A. (2015). Physical layer network security in the
full-duplex relay system. IEEE transactions on information forensics and security, 10(3),
575.
Demchenko, Y., De Laat, C., & Membrey, P. (2014, May). Defining architecture components of
the Big Data Ecosystem. In Collaboration Technologies and Systems (CTS), 2014
International Conference on (pp. 109). IEEE.
Divya, G., Priya, C. K., & Kowselya, G. (2015). EFFECTIVE FIREWALL
IMPLEMENTATION IN CLOUD OVER VIRTUAL ENVIRONMENT USING SPACK
FREWALL RESTRICTION.
Liang, X., & Xiao, Y. (2013). Game theory for network security. IEEE Communications Surveys
& Tutorials, 15(1), 476.
Rasthofer, S., Arzt, S., Lovat, E., & Bodden, E. (2014, September). Droidforce: Enforcing
complex, data-centric, system-wide policies in android. In Availability, Reliability and
Security (ARES), 2014 Ninth International Conference on (pp. 45). IEEE.
Suh, M., Park, S. H., Lee, B., & Yang, S. (2014, February). Building firewall over the software-
defined network controller. In Advanced Communication Technology (ICACT), 2014
16th International Conference on (pp. 746). IEEE.
Chen, G., Gong, Y., Xiao, P., & Chambers, J. A. (2015). Physical layer network security in the
full-duplex relay system. IEEE transactions on information forensics and security, 10(3),
575.
Demchenko, Y., De Laat, C., & Membrey, P. (2014, May). Defining architecture components of
the Big Data Ecosystem. In Collaboration Technologies and Systems (CTS), 2014
International Conference on (pp. 109). IEEE.
Divya, G., Priya, C. K., & Kowselya, G. (2015). EFFECTIVE FIREWALL
IMPLEMENTATION IN CLOUD OVER VIRTUAL ENVIRONMENT USING SPACK
FREWALL RESTRICTION.
Liang, X., & Xiao, Y. (2013). Game theory for network security. IEEE Communications Surveys
& Tutorials, 15(1), 476.
Rasthofer, S., Arzt, S., Lovat, E., & Bodden, E. (2014, September). Droidforce: Enforcing
complex, data-centric, system-wide policies in android. In Availability, Reliability and
Security (ARES), 2014 Ninth International Conference on (pp. 45). IEEE.
Suh, M., Park, S. H., Lee, B., & Yang, S. (2014, February). Building firewall over the software-
defined network controller. In Advanced Communication Technology (ICACT), 2014
16th International Conference on (pp. 746). IEEE.
1 out of 14
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.