Security Analysis Report: Firewall, Encryption & Traffic Flow

Verified

Added on  2022/09/30

|3
|411
|30
Report
AI Summary
This report delves into security analysis, focusing on critical measures such as firewalls, encryption, and anticipation techniques. It highlights the importance of firewalls in protecting data within both the government and private sectors, emphasizing the need for proper data assessment and accessibility. The report also discusses the use of encryption to safeguard data transmitted over networks, ensuring that even if intercepted, the information remains inaccessible without a decryption key. Furthermore, it explores the anticipation of potential security threats through the monitoring of traffic flow, enabling proactive measures to be taken in the event of any abnormalities. The report concludes by summarizing the key findings and offering insights into effective security strategies.
Document Page
Running head: SECURITY ANALYSIS
SECURITY ANALYSIS
Name of the Student
Name of the University
Author note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
SECURITY ANALYSIS
Security method
The steps that would have been taken in order to increase the robustness of the entire
process are as follows: -
Usage of firewall in all the databases that are being used will be included in the
process as well. In this case the main aspect that is to be considered is that the data
that are present inn the of the government sector or the private sector will stay
protected (Satasiya, Raviya & Kumar 2016). Again, it can be stated that proper
assessment of the data and its accessibility can be made with the help of the firewall
implementation.
Again, usage of encryption can be performed. This process of encryption ensures that
the data that will be passed via the networks will be having a layer of mismatched
data over the real data (Rani & Sagar 2017). This ensures that even if an imposter gets
hold of the data, he or she cannot understand the information that is present in the
network line. A separate decryption key is required for this purpose. In case the
decryption key is absent, the data will be of no use for the imposters.
These are the 2 security measures that can be implemented.
Anticipation technique
The method by which anticipation of the future attacks can be made is by checking
the flow of traffic. The most efficient way of anticipating threat is by checking the flow of
traffic. In case of observing any kind of abnormality in traffic flow, it can be stated that
security threat might be present and hence wise steps can be taken.
Document Page
2
SECURITY ANALYSIS
References
Rani, K., & Sagar, R. K. (2017, August). Enhanced data storage security in cloud
environment using encryption, compression and splitting technique. In 2017 2nd
International Conference on Telecommunication and Networks (TEL-NET) (pp. 1-5).
IEEE.
Satasiya, D., Raviya, R., & Kumar, H. (2016, May). Enhanced SDN security using firewall in
a distributed scenario. In 2016 international conference on advanced communication
control and computing technologies (ICACCCT) (pp. 588-592). IEEE.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]