Network Security

958 WordsMay 25, 20144 Pages
Network Security When it comes to networking and the security of networks, there are several different methods of protecting networks. Of these differing methods, some of them sound similar, but provide differing levels of security. In the following paragraphs, I will try to explain the differences between some of the methods used. • Explain the difference between historical and statistical logging. Logging is a simple way of keeping a record of activity on a network. There are several types of logs that can be kept, each providing different data that can be analyzed to provide information on potential ways of improving security over time. With historical logging, records are kept of all data passing through a particular network…show more content…
The recipient of a message using a digital certificate can obtain the public key associated with that particular certificate and then decode the message and verify that it did indeed originate from the proper source. With this information, the recipient is then able to send an encrypted reply. A digital postmark is another entity entirely. A digital postmark, or border router packet marking as it is sometimes called, is a network security measure that can allow organizations to trace the origins of unwanted spam or other forms of malicious attacks. This process works by placing identifying data onto messages much like a conventional postmark, hence the name. Because the information is added at the router level, there is no way for hackers or other intruders to falsify IP addresses or other information that might be used to bypass security on a network. As you can see, there are different aspects of network security. Each type protects the network and files on it in a different way. It is up to the network manager to decide which methods work best for his individual business needs, and he may apply some or all of the methods mentioned here. In the future of network security, there will be fingerprint readers. There will also be stronger encryption levels. Lastly, there will also be facial recognition software to protect the security of networks in the future and then again

More about Network Security

Open Document