Benchmark - Applying Advanced Protocols
docx
keyboard_arrow_up
School
Grand Canyon University *
*We aren’t endorsed by this school
Course
430
Subject
Information Systems
Date
Jan 9, 2024
Type
docx
Pages
5
Uploaded by michaeljr1119
BENCHMARK - APPLYING ADVANCED PROTOCOLS
Michael Harris ITT-430-0500
December 8, 2023
Dr. Chuck Brust
Benchmark - Applying Advanced Protocols
1
BENCHMARK - APPLYING ADVANCED PROTOCOLS
Part 1: When I attempted to open the server manager and advanced settings for the firewall I kept
getting errors and the login for the admin. 2
BENCHMARK - APPLYING ADVANCED PROTOCOLS
Part 2:
Ensuring a network is fully secure is the most important part of an organization. The network holds all of the data that needs to be secure. There are various tools that can be implemented to ensure that the network is secure. Tools are put in place to protect against common attacks including viruses, malware, spyware, and more. For my organization I would implement the Nessus professional tool. Nessus can detect vulnerabilities like software bugs and general security problems in software applications, IT devices, and operating systems and manage them appropriately (Rao, 2022). IPsec is a group of protocols securing connections between devices. IPsec helps keep data
sent over public networks secure. Users connect to IPsec through a VPN connection and simply just logging in. Of course, the application would have to be first downloaded onto the user’s computer. Domain Name System Security Extension DNSSEC on the other hand is used to authenticate responses to domain name lookups. There are some challenges security 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
BENCHMARK - APPLYING ADVANCED PROTOCOLS
professionals may face when implementing various security controls. Keeping everything up to date is a very important part of managing everything. Most tools will automatically run themselves and find vulnerabilities. It is up to the security team to monitor the tools. 4
BENCHMARK - APPLYING ADVANCED PROTOCOLS
References Rao, R. (2022). Network Security tools aim to prevent devices, technologies, and processes from
unauthorized data access, identity thefts, and cyber threats. https://www.zluri.com/blog/network-
security-tools/
What is IPsec? | How IPsec VPNs work. (2023). https://www.cloudflare.com/learning/network-
layer/what-is-ipsec/#:~:text=IPsec%20is%20a%20group%20of%20protocols%20for
%20securing%20connections%20between,where%20the%20packets%20come%20from
.
5