420td | Computer Science homework help


Don't use plagiarized sources. Get Your Custom Essay on
420td | Computer Science homework help
Just from $13/Page
Order Essay


Question 1: Layered Network Defense

Network security has become a complicated topic due to the many types of threats to network information and systems. To defend against these threats, a layered network defense strategy must be utilized. What are the major components of a layered network defense model and what role does each of the layers play in the overall defense of the network against security threats?

Question 2: Risk Analysis

Properly securing a network is like building security around your home. You can invest a lot of money is security systems that defend against threats that do not exist in your neighborhood. The first step in developing good security is to understand what threats exist. What are the major security threats that exist for a typical company and how might they determine which threats present the most risk for them and their situation?

Question 3: Security Policy

Securing a network consists of much more than just installing the appropriate hardware and software. A company must have a good set of policies in place to help make the decisions necessary to properly implement their network security. Discuss the major components of a good security policy.

Question 4: Goals of Network Security

One size does not fit all with regards to network security. A company or organization must understand what they are trying to accomplish with their network security. These goals will help drive the decisions necessary to implement a good security system. List some examples of goals a company or organization might set for their security system and discuss what types of security they might use to achieve these goals.

Question 5: Intrusion Detection

Networks often contain valuable information and are the target of threats to acquire the information or damage the information. Intruders pose a significant threat to networks and the first step in thwarting intrusion is to understand when and how it is occurring. What are some of the ways intruders can be detected in a network and what can be done to reduce this network threat?

Question 6: Digital Signatures

One of the most difficult aspects of network security is identification. If all people and devices connected to the network could be identified during every network transmission, security would be greatly improved. Unfortunately, this is not an easy task. Digital signatures help in identification of network transmissions. Discuss how digital signatures work and what aspects of network security they enhance.

Question 7: Access Control Lists

A common method of gaining improved network security is to create a list of authorized users for all network resources. These lists are called Access Control Lists or ACLs. ACLs are like airline reservations. You arrive at the gate and if you have a boarding pass, you can get on the plane. Without a boarding pass, you are left at the gate and the plane is off limits. Discuss how Access Control Lists work and the role they play in network security.

Question 8: Authentication and Authorization

The terms authentication and authorization are often confused. Authentication relates to determining who the user is and authorization relates to what resources a user can access. Discuss the definition of each of these terms with respect to network security. Also discuss the role each of these concepts plays in network security.

Question 9: Internet Security

The expansion of the Internet has created a significant number of new network threats. While businesses combat Internet security threats, employees continue to expand their use of the Internet. What limitations should be placed on the use of the Internet at work to reduce security threats while still allowing employees to reap the benefits provided by Internet access?

Question 10: Web Security

The Web has become a major part of company and organization network traffic. Virtually all businesses and organizations have a Web presence, and most businesses have some type of Web applications running to allow customers and employees to interact with the company network in some fashion. Discuss the security issues related to Web exposure for a company.

Question 11: Security Models

Protection of a company network can be a complicated endeavor. A good model helps in the design of these network security systems just like a good model helps in the design of any system. What are the major components of a good security model and how do these components fit into the overall security of the network?

Question 12: Firewalls

If you can build a big and strong enough wall around your house, you should be safe from outside attacks. In order to communicate with the outside world, you have to allow mail to be delivered and you probably want to talk to people outside of your house by telephone. Each bit of communication you allow puts you at increased risk. Firewalls are for the perimeter protection of a company network in much the same way as a wall around your house is for your personal protection. Discuss the basics of how firewalls work and the role they play in network security.

Question 13: Wireless Networking

Wireless computing has become a significant part of business networking due to the rapid expansion of the use of mobile devices in business environments. Security risks have increased as a result. What steps should a business take to ensure productive support of wireless communications while maintaining strong security?

Question 14: Remote Access Security

An increasing number of people work from home or while travelling, and often need access to their company network. This type of remote access can create significant security issues. Discuss how these security risks can be minimized while still allowing the type of remote access needed.

Question 15: Cryptology

Regardless of how well data transmissions are protected, there are still ways intruders can intercept the data and try to make use of it for their own purposes. Cryptology adds another level of defense against those by transforming the communications into a format only decipherable by the people or systems with the right information. Discuss the basics of how cryptology works and how it can most effectively be used in network security.

Question 16: Secure Data Transmission

If we had no need to transmit data from one user or device to another, we would greatly reduce security problems. Data transmission, and lots of it, is required to operate a business, so the best approach is to make those transmissions secure. Discuss the meaning of secure data transmission and the major issues that must be addressed to achieve secure data transmissions in a network.

Get 20% Discount on This Paper
Pages (550 words)
Approximate price: -

Try it now!

Get 20% Discount on This Paper

We'll send you the first draft for approval by at
Total price:

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

Australia Assessments has gained an international reputation of being the leading website in custom assignment writing services. Once you give us the instructions of your paper through the order form, we will complete the rest.


Essay Writing Services

As we work towards providing the best custom assignment services, our company provides assignment services for any type of academic essay. We will help you develop professionally written essays that are rich in content and free from plagiarism.


Admission and Business Papers

Our skilled team of professional writers will ensure that we help you craft a remarkable admission essay for your desired Master's program in your institution of choice. We won't stop there. Once you enter the job market, we will be available to secure you a position at your desired worksite by creating an outstanding portfolio or resume.


Editing and Proofreading

Our editorial team is always available for all editing and proofreading services. They check completed papers by our writers and also provide professional opinions to papers completed by our clients.


Technical papers

We harbor professional academic writers with different qualifications in diverse academic fields. As such, we are capable of handling both simple and technical papers. Ensure that you provide us with correct and complete instructions in the order form.