Research Activity: IT Security Solution
Find two tools (2) used for implementing network security.
Find two techniques (2) used for implementing network security.
Find two method (2) used for implementing network security.
References:
Admin, N. (2018). 14 Best Network Security Tools For Safer Environments in 2019. [online] AddictiveTips. Available at: https://www.addictivetips.com/net-admin/best-network-security-tools/ [Accessed 2 May 2019].
- Wireshark: use to capture and view the data traveling back and forth on your network. It provides the ability to drill down and read the contents of each packet and is filtered to meet your specific needs. It is commonly used to troubleshoot network problems and to develop and test software.
- Nessus Professional: makes no assumptions regarding what services are running on what ports and it actively attempts to exploit vulnerabilities rather than just comparing version numbers of the active services.
Find two techniques (2) used for implementing network security.
- Encryption: A password manager that controls access. People within companies cause the most problems. Provide training on how to avoid malware and phishing attacks. The Yahoo breach was due to an employee clicking on a malicious link.
- Real-time ingestion and visualization: to track the intruder as they move in and around the network.
Find two method (2) used for implementing network security.
- Access control: Be able to block unauthorized users and devices from accessing your network. Users that are permitted network access should only be able to work with the limited set of resources for which they have been authorized. Eg. Accountant to accountant only.
- Anti-malware: It attempt to spread across the network and lurk dormant on infected machine for days or weeks such as Viruses, worms and Trojan horse
References:
Admin, N. (2018). 14 Best Network Security Tools For Safer Environments in 2019. [online] AddictiveTips. Available at: https://www.addictivetips.com/net-admin/best-network-security-tools/ [Accessed 2 May 2019].
Comments
Post a Comment