preview

Term Paper

Better Essays

| 2013 | Term Paper: Redesigning Security Operations 1 Identify what you perceive to be the five (5) most concerning threats to the network, computing environment, and the database operations of the company Data security Threats: Data face many threats in various forms which can accessed by unauthorized people who can misuse it and can damage the company. Here is the series of potential risks and attacks which the data could face: Data tempering: for the data to be more mores secure t is essential that it should not be modifies or viewed by anyone .in the environment some external parties can perpetrate the data by intercepting in the transit and could changes some parts of that data before it is retransmitting. .Data theft: for the …show more content…

Collecting data is called accounting or auditing. For networks with strict security policies, audit data should include all attempts to achieve authentication and authorization by any person. It is especially important to log "anonymous" or "guest" access to public servers. The data should also log all attempts by users to change their access rights. Data Encryption Encryption is a process that scrambles data to protect it from being read by anyone but the intended receiver. An encryption device encrypts data before placing it on a network. A decryption device decrypts the data before passing it to an application. A router, server, end system, or dedicated device can act as an encryption or decryption device. Data that is encrypted is called ciphered data (or simply encrypted data). Data that is not encrypted is called plain text or clear text. Encryption has two parts: • An encryption algorithm is a set of instructions to scramble and unscramble data. • An encryption key is a code used by an algorithm to scramble and unscramble data. Public/Private Key Encryption Public/private key encryption is the best known example of an asymmetric key system. With public/private key systems, each secure station on a network has a public key that is openly published or easily determined. All devices Firewalls As A firewall has a set of rules that specifies which traffic

Get Access