Network Security Paper

User Generated

cvaxl0101

Science

Wilmington University

Description

Network Security Paper: In this paper, you will define the security strategies of Defense in Depth and Layered Security https://www.sans.org/reading-room/whitepapers/anal... along with comparing and contrasting the strategies by explaining, at least, two advantages and disadvantages of implementing each security strategy. Support your information and make sure all information sources are appropriately cited.

The paper must use APA 6th ed., 7th printing formatting and contain a title page, 3 to 5 pages of content, and a minimum of three peer-reviewed references

Also a resource https://youtu.be/zBFB34YGK1U

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: NETWORK SECURITY

1

Network Security
Institution Affiliation:
Date:

NETWORK SECURITY

2

Computer security is important due to the increase in cybersecurity issues in the world.
Hackers and computer are increasing every day. Computer users should invest heavily in
computer security to protect their systems from attacks. This paper focuses on various strategies
used to protect computer and network system from attacks.
Firewall is one of the main security strategies used in enhancing computer security. This
strategy monitors and controls the network traffic. It filters trusted and untrusted network. It
screens hackers, worms, and viruses. Firewall is in hardware or software form. Hardware
connects to the user’s network to protect the user’s network. The software firewall is a built-in
firewall in both Windows and Macintosh Operating systems. The advantages of firewall include
that it blocks traffics preventing them from harming the network or the system. It is capable of
protecting more multiple systems for the user (Joshi, 2016). The disadvantages include packet
filtering that may degrade the system performance. It also poses a disaster when one does not
configure the system accordingly.
Use of antivirus programs protects ...


Anonymous
I was stuck on this subject and a friend recommended Studypool. I'm so glad I checked it out!

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Related Tags