Benchmark - Applying Advanced Protocols

docx

School

Grand Canyon University *

*We aren’t endorsed by this school

Course

430

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

5

Uploaded by michaeljr1119

Report
BENCHMARK - APPLYING ADVANCED PROTOCOLS Michael Harris ITT-430-0500 December 8, 2023 Dr. Chuck Brust Benchmark - Applying Advanced Protocols 1
BENCHMARK - APPLYING ADVANCED PROTOCOLS Part 1: When I attempted to open the server manager and advanced settings for the firewall I kept getting errors and the login for the admin. 2
BENCHMARK - APPLYING ADVANCED PROTOCOLS Part 2: Ensuring a network is fully secure is the most important part of an organization. The network holds all of the data that needs to be secure. There are various tools that can be implemented to ensure that the network is secure. Tools are put in place to protect against common attacks including viruses, malware, spyware, and more. For my organization I would implement the Nessus professional tool. Nessus can detect vulnerabilities like software bugs and general security problems in software applications, IT devices, and operating systems and manage them appropriately (Rao, 2022). IPsec is a group of protocols securing connections between devices. IPsec helps keep data sent over public networks secure. Users connect to IPsec through a VPN connection and simply just logging in. Of course, the application would have to be first downloaded onto the user’s computer. Domain Name System Security Extension DNSSEC on the other hand is used to authenticate responses to domain name lookups. There are some challenges security 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
BENCHMARK - APPLYING ADVANCED PROTOCOLS professionals may face when implementing various security controls. Keeping everything up to date is a very important part of managing everything. Most tools will automatically run themselves and find vulnerabilities. It is up to the security team to monitor the tools. 4
BENCHMARK - APPLYING ADVANCED PROTOCOLS References Rao, R. (2022). Network Security tools aim to prevent devices, technologies, and processes from unauthorized data access, identity thefts, and cyber threats. https://www.zluri.com/blog/network- security-tools/ What is IPsec? | How IPsec VPNs work. (2023). https://www.cloudflare.com/learning/network- layer/what-is-ipsec/#:~:text=IPsec%20is%20a%20group%20of%20protocols%20for %20securing%20connections%20between,where%20the%20packets%20come%20from . 5