logo

Cyber Security Technologies and Trends

   

Added on  2020-04-07

14 Pages3555 Words412 Views
 | 
 | 
 | 
Running head: PROFESSIONAL SKILLS PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION TECHNOLOGY Name of the Student:Name of the University:Author note:Unit Code:Unit Name: Email address:Campus Lecturer:Unit Coordinator:
Cyber Security Technologies and Trends_1

Executive SummaryThis report is all about network security which is a security system designed for a network toblock unauthorized access and various kinds of threats. Various system round the globe that doesall the vital transaction and communication of regularly need security for protecting the datawhich contain vital information. The different types of network application available in presentindustry are intrusion detection system, firewalls and data-centric security. The advantage anddisadvantage of intrusion detection system will be discussed below in the coming pages of thereport. Various legal, ethical and social consideration of various organization has been discussedbelow. The various organization around the globe has started using technologies like firewall, intrusiondetection system, data centric can be proved beneficial to various organization. The limitation ofthese three technologies has been discussed below.
Cyber Security Technologies and Trends_2

Table of ContentsExecutive Summary.............................................................................................................2Introduction..........................................................................................................................4Discussion............................................................................................................................5Different types of Network Security Application............................................................6Expansion of Organization..............................................................................................8Advantage of using intrusion detection system...............................................................9Disadvantage of using intrusion detection system...........................................................9Advantage of Using Firewall.........................................................................................10Disadvantage of using Firewall.....................................................................................10Advantage of Using Data Centric Security...................................................................10Disadvantage of using Data Centric Security................................................................10Ethical, Social and Legal considerations.......................................................................11Conclusion.........................................................................................................................11Recommendation...............................................................................................................12References..........................................................................................................................14
Cyber Security Technologies and Trends_3

IntroductionThis report is all about network security which is a security system designed for anetwork to block unauthorized access and various kinds of threats. It also focuses to improvisethe job of network admin to create some preventive measures to protect their network systemfrom any kind of threat. Various system round the globe that does all the vital transaction andcommunication of regularly need security for protecting the data which contain vital information.It mainly keeps a track on different threats that may arise in a network. Network securitymainly works by adding different layers of various security defenses. The different types of network application available in present industry are intrusiondetection system, firewalls and data-centric security. Firewall is type of network security systemthat is mainly used for maintenance and regulation of traffic over the internet using basicprotocol and methods (Rasthofer et al.,2014). Firewall exists in mainly two forms that DHCPserver which is hardware component and there are some software firewalls are mainly used forprotection of system from various threats. Software firewall is mainly used by organization forprotection against the breach of data which contains vital information. Data centric securitymainly provide security against the breach of important data which contain vital information. Noorganization round the globe can claim that it is purely immune to various cyber-attacks. The report mainly focuses on promoting the use of various technological services likefirewall, intrusion detection system, data centric which can be proved beneficial for variousorganization round the globe. Various limitation of intrusion detection system will be discussedin the coming pages of this report. Intrusion detection system does not block or prevent attack ofvarious malware software’s (Suh et al., 2014). The attacks of various malware can be stopped by
Cyber Security Technologies and Trends_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents