Description
With regard to network security and asset management of a given network, concerns of availability, security, and integrity that are relevant to data security apply as well to network security.
Attached are the active and passive threats.
Based on your understanding of the above topic, answer the following:
- Discuss in detail examples of each of these types of threats, both passive and active, with examples of such activity.
- Describe in detail the actions to be taken in order to proactively protect against such threats and methods to secure your network.
- Discuss a minimum of six functions related to maintenance of security information and how this information helps security management keep account of activity or attempted activity.
In a Microsoft Word document, create 2- to 3-page report..
Support your responses with examples.
Cite any sources in APA format.
Unformatted Attachment Preview
Purchase answer to see full attachment

Explanation & Answer

Attached.
Running head: NETWORK SECURITY AND ASSET MANAGEMENT
Network Security and Asset Management
Name
Date
Institution
1
NETWORK SECURITY AND ASSET MANAGEMENT
2
Threats to Network Security
There are several elements which can compromise the safety of a network system. When
such threats are allowed to threat, they make the system vulnerable to exposure, and
consequently a fatal attack. A network threat could be defined as an object or individual who has
the potential to cause harm to a system ("What is network security management? - Juniper
Networks", 2018). It is therefore important that the management of an organization be
adequately informed of the possible threats that can ruin its information security system
Error attributed to mankind: Sometimes, the employees may make technical mistakes in
the system and consequently expose the system to attacks. Examples of human errors include
accidents and mistakes committed by the workers. Denting of the intellectual property re...
