• Home
  • Blog
  • Trident University International Information System Security Report

Trident University International Information System Security Report

0 comments

Mainly focuses on security issue. The increasing reliance on Internet-based applications and network use for distributed systems has resulted in strong information-security mechanisms to guard product data and transmission facilities. The inherent risk in data networks is multidimensional, and it is growing as organizations become more dependent on data transmissions.

The main goal of computer security is to protect the information assets inside computers, servers, and data storage devices. Data security also deals with exchanging data messages from external sources. The requirements for information security are best assessed by examining the various security threats, e.g. eavesdropping or attempts to obtain information or disclosure of files during communication, modification or falsification of files during transmission.

There are several security mechanisms to protect data, and the most reliable is encryption. Information security products include an array of cryptography and digital signatures. Intrusion detection systems (IDS) are installed at the edge of the network to deter external intrusion, but vulnerability assessment must be conducted to detect weak spots or install new security products and protect against internal intruder alike.

Assignment

Use the background materials and conduct your own research before writing a 10 to 12 page report (excluding cover page and references) to address the following questions:

1.What is the difference between network security configuration and network security compliance?

2.List and define categories of network access and configuration and network security compliance from either your own research or from the workplace.

3.Explain the difference between symmetric encryption and public-key encryption.

4.What is a digital signature?

5.What are the distinctions among the terms public key, private key, and secret key?

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}