Network Security: Physical, Telecommunications, and Security

Verified

Added on  2023/01/19

|4
|731
|84
Report
AI Summary
This report reflects on the critical aspects of network security, emphasizing the significance of both physical and logical security measures in protecting organizational data and infrastructure. It begins by highlighting the importance of physical security, such as security guards, locks, and restricted access, as the initial line of defense. The report then delves into technological security measures, including firewalls, Virtual Private Networks (VPNs), Intrusion Detection Systems (IDS), and Intrusion Prevention Systems (IPS). It underscores the need for regular vulnerability assessments, network scanning, and penetration testing to identify and address potential weaknesses. The report also discusses the importance of data encryption, authentication, and authorization to ensure data privacy, confidentiality, consistency, and availability. It concludes by stressing that a combination of physical and logical security measures is essential for safeguarding data and ensuring organizational success, while also mentioning the importance of addressing viruses and other security threats.
Document Page
Reflection on physical security, telecommunications & network security
Name
Institution
Professor
Course
Date
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Network security in the field of information technology has been facing several
challenges such as hacking, injections, and viruses. Network Security can be broken down into
physical and logical aspects. Physical security involves the protection of both data and
underlying organizational infrastructure through physical means such as security guards, locks
and walls. There is no doubt that physical security remains to be the first security measure to
protect organizational infrastructure. I concur with network security experts that physical
security should be given the highest priority before enforcing technological rules.
Implementation of physical security measures are meant to make sure data, and infrastructure
access is given only to authorized personnel. Physical security can be enforced through cabinet
locks, heavy doors, and data center access to just a few accredited experts and relocking of
devices. Good examples can be deduced from locking of data storage devices such as portable
disks and laptops.
Technology measures to data and information security involve the implementation of
firewalls and Virtual Private Networks (VPNs). Firewalls should be made to be intelligence to
offers extra security measure to make sure every access has audit trails. To make sure
organizational data and its infrastructure remain secure, information security experts should
assess vulnerabilities. Network and data vulnerabilities are aspects that occur as a result of
human negligence or technical experts compromising already existing security measures. To
implement a secure network, vulnerabilties within the system can be assessed through network
scanning as well as penetration testing. Scanning and penetration testing are used as internal
measures to evaluate the security of the network. Further security measures should be
implemented through the use of Intrusion Detection System (IDS) and Intrusion Prevention
Systems (IPS). IDS detects any form of malicious activities while IPS are used to neutralize the
Document Page
attacks. Successful implementation of network and data security require experts in an attempt to
secure organizational data.
Security measures are meant to protect the organizational network and data from being
accessed by cybercriminals. It is also important to note that viruses are part of security threats
that security experts should be cautious off. Network security measures can be enforced to
achieve data privacy, confidentiality, consistency and availability. Data security measures that
security experts should factor are; data encryption which focuses on protecting data by
converting them into an unreadable form. Encryption of data can either be while on storage or
during transmission. Similarly, authentication and authorization are implemented to make sure
network access are only to trusted personnel. Once system authentication is done, permission to a
specific piece of data should be granted in regards to responsibilities assigned to the employees.
Failure to implement strong security measures would result in data breaches such as hacking,
virus, and lack of confidentiality. I advocate that security of data remains a critical factor in
organizational success and should be protected from unauthorized parties. Combination of both
physical and logical security measures are quite remarkable as they ensure the privacy of data is
given required attention.
Document Page
References
Dong, P., Han, Y., Guo, X., & Xie, F. (2015). A systematic review of studies on cyber-physical
system security. International Journal of Security and Its Applications, 9(1), 155-164.
Gaigole, M. S., & Kalyankar, M. A. (2015). The Study of Network Security with Its Penetrating
Attacks and Possible Security Mechanisms. International Journal of Computer Science
and Mobile Computing, 4(5), 729.
Prabhakar, S. (2017). Network Security in Digitalization: Attacks and Defence. Int. J. Res.
Comput. Appl. Robot, 5(5), 46-52.
Sinha, A., Nguyen, T. H., Kar, D., Brown, M., Tambe, M., & Jiang, A. X. (2015). From physical
security to cybersecurity. Journal of Cybersecurity, 1(1), 19-35.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]