Network Security
Network Security
Network Security
CIS 319
11/18/04
Table of Contents
1. Intro to network security
page 3
Why do we need network security?
Page 3
Who are we protecting ourselves from?
Page 4
2. How to protect yourself?
Page 4
3. Security Technology
Page 5
Firewall
Page 6
Page 6
Anti-virus
Page 7
Intrusion detection
Page 7
Network device security
Page 7
Routers
Page 7
Switches
Page 8
Encryption
Page 8
4. Conclusion
Page 8
5. Glossary
Page 9
6. References
Page 10
1. What is network security?
Network security has changed significantly over the past years. There is more and more data to monitor and analyze in order to detect the activity of your data and systems. Securing a network has many variables. Password authentication, network access, patches, anti-virus protection, intrusion detection, firewall and network monitoring tools are just a few of the things you can do to protect yourself.

Threats to your network is becoming more complex and it is requiring lots of money, time and sacrifices to keep up with the growing amount of potential attacks. Companies cannot protect themselves with just a firewall anymore. Now it’s requiring a full security department that monitors the network activity 24/7. It also limits the activity that companies can do because of the added security to the network, prevent invasions or viruses or hackers.

Why do we need network security?
Network security can be used under many different scenarios. For example, it can be used to keep company servers protected from the different departments. When putting access level restrictions on each department like HR and Engineering, you can control what they can and can’t have access to. You wouldn’t want someone from Engineering to see everyone’s personal information. In another example, network security is used to protect the money you have at your bank. More and more things are being tracked on computers, it’s essential to understand how to protect it from getting into the wrong hands.

Who are we protecting ourselves from?
It’s an unfortunate thing to think about but we are protecting ourselves from ourselves. Although it seems like this is all new, we have always protected ourselves in one way or another. Castles would build themselves motes, farmers would build fences to protect their cattle, and people put locks on their doors. It’s the same type of the thing, protecting your computer data from getting in the wrong hands.

Who are these wrong hands? The familiar term is hacker which Webster’s dictionary describes as “3: an expert at programming and solving problems with a computer 4: a person who illegally gains access to and sometimes tampers with information in a computer system”. One of the main reasons for the high level of network security is because of the bad part of the computer hacking world.

2. How to protect yourself?
Protecting yourself is only effective if you know what you are protecting your against and how to protect. There are a couple ways to start getting you more protected. The first is installing the default operating system. This would have a default password, no security patches and no virus protection. The second thing you don’t want to do is use simple and common passwords like for example, password. In the 10 immutable laws below, one of the laws is someone is always

Get Your Essay

Cite this page

Network Security And Network Device Security. (April 22, 2021). Retrieved from https://www.freeessays.education/network-security-and-network-device-security-essay/