Analysis of Network Security, File Systems, and Services

Verified

Added on  2019/09/24

|4
|471
|322
Report
AI Summary
This report discusses network security, focusing on two key areas: Security as a Service (SECaaS) and Network File Systems (NFS). SECaaS, a cloud-based model, offers cost-effective security solutions, including anti-virus and intrusion detection. The report highlights the relationship between NFS and information security, emphasizing the importance of access controls and the use of the etc.exports file for security. It also covers the evolution of NFS, including improvements in performance and security. The report concludes by emphasizing the importance of SECaaS in providing scalable and robust protection for information assets, and the role of security services in enhancing overall information security through features like authentication and anti-virus measures, as well as references from academic sources.
Document Page
Networking
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
In this present paper, we will discuss the two topics, namely, security as a service and network
file system. The paper also describes the relationship with the information security. The security
as a service is defined as the business model in which the service providers are integrated with
the service of security into the infrastructure of corporate on a subscription basis. It is more cost
effective than the individual or companies can take for its own. The cloud is used for delivering
the service without the use of premises hardware. The security service comprises of anti-virus,
anti-malware, security event management, intrusion detection and others. The network file
system is defined as the distributed file system which allows accessing the computer of a client
in which the files are accessed which are on the computer networks.
There is a direct relationship between the Network File System and information security. The
service security administration provides approval to the validated clients. The two steps are
required in the Network File System, namely, mount access and file access. The security for
mount access is provided by etc. exports file. The file is accessed by the permission received by
the drive (Kaneko et al., 2012).
The network file system is basically an open standard which is defined in request for comments
and it allows implementing the protocol. The principal motivation is an attempt which is done to
eliminate the performance issue of the synchronous operation in the version two of network file
system. The network file system updates with the security and it has the good performance in the
copying of large file workloads.
Document Page
The service as security is interrelated with the information security in which the services are
provided towards the information security such as anti-virus, authentication and others which
help to provide great information security with fast user provisioning (Sharma et al., 2013).
The protection of information assets is the priority of the company which is protected through
implementing the security practices in an organization. The security services are accessed by the
companies through SECaaS which is scalable, robust and cost effective. It provides the uniform
and consistent protection to the companies.
Document Page
References
Kaneko, A., Katsuki, M., Misono, K., & Yonezawa, T. (2012). U.S. Patent No. 8,099,514.
Washington, DC: U.S. Patent and Trademark Office.
Sharma, D. H., Dhote, C. A., & Potey, M. M. (2013). Security-as-a-Service from Clouds: A
Comprehensive Analysis. International Journal of Computer Applications, 67(3).
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]