Access over 20 million homework & study documents

Discussion Replies

Content type
User Generated
Subject
Writing
Type
Homework
Rating
Showing Page:
1/9
1) Module 3 Network Security Access Control
Restricted Access to the network devices is achieved through user authentication and
authorization control which is responsible for identifying and authenticating different
users to the network system. Authorization is the process of granting or denying specific
access permissions to a protected resource for securing a network. Since network devices
comprise of communication as well as computing equipment, compromising these can
potentially bring down an entire network and its resources. An important aspect of
network device security is access control and authorization. Many protocols have been
developed to address these two requirements and enhance network security to higher
levels.
Reply:
It is true that the processes of authentication aimed for resources protection. In addition
to this discussion, authorization and access control are ways of enforcing access
policies. The stereotype of the authorization is the image of the security guard at the door
of a bowling alley, which only allows young people who fit their criteria to pass. Access
control would be the opposite: excluding those who do not fit their criteria. They are
two very common processes that occur everywhere. For example, in the bank, in a sports
stadium, in a concert hall, as you prepare to board an airplane ... in each of these cases,
you must demonstrate that you are authorized to take action; such as entering the
airport security zone or extracting money from your bank account. If you do not have
permission to access that area or activity, you will be excluded. or authorization and
access control to be successful, you will need two things: good authentication and good
policies. Strong authentication is essential because, if you let a person access the things
they need, you have to make sure that it's really about her and not someone who pretends
to be her.
2) Module 3 Network Security Protocols
Network security protocols are primarily designed to prevent any unauthorized user,
application, service or device from accessing network data. This applies to virtually all

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/9
data types regardless of the network medium used. Network security protocols generally
implement cryptography and encryption techniques to secure the data so that it can only be
decrypted with a special algorithm, logical key, mathematical formula and/or a
combination of all of them. The most common method of transferring files is using File
Transfer Protocol (FTP). A problem with FTP is that the files are sent in cleartext,
meaning that they are sent unencrypted and therefore able to be compromised. Because of
the FTP shortcoming, Secure File Transfer Protocol (SFTP), Secure Hypertext Transfer
Protocol (HTTPS) and Secure Socket Layer (SSL) have become more popular security
protocols.
Reply:
Acronyms of File Transfer Protocol. A very common method as it was discussed above
to transfer one or more files from one computer to another. FTP is a specific means of
connecting a website to upload and download files. FTP was developed during the early
days of the Internet to copy files from one computer to another. With the arrival of the
World Wide Web, and the browsers, you no longer need to know their complex
commands; you can use FTP by typing the URL in the location bar at the top of the
browser screen. The FTP service is offered by the application layer of the TCP / IP
network layer model to the user, normally using the network port 20 and 21. A basic FTP
problem is that it is designed to offer maximum connection speeds , but not the maximum
security, since all the information exchange, from the login and password of the user on
the server to the transfer of any file, is done in plain text without any type of encryption,
so that a possible attacker can capture this traffic, access the server and/or appropriate the
transferred files. To solve this problem are very useful applications such as SCP and
SFTP, included in the SSH package, which allow you to transfer files but encrypting all
traffic.
3) Module 3 Authentication vs Authorization
In previous courses I covered this topic before reinforce of these is essential to have a
better understanding of security. The role authentication is when a system attempts to
verify the credentials given basicly its user name and password but the process goes into

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/9

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 9 pages?
Access Now
Unformatted Attachment Preview
1) Module 3 Network Security Access Control Restricted Access to the network devices is achieved through user authentication and authorization control which is responsible for identifying and authenticating different users to the network system. Authorization is the process of granting or denying specific access permissions to a protected resource for securing a network. Since network devices comprise of communication as well as computing equipment, compromising these can potentially bring down an entire network and its resources. An important aspect of network device security is access control and authorization. Many protocols have been developed to address these two requirements and enhance network security to higher levels. Reply: It is true that the processes of authentication aimed for resources protection. In addition to this discussion, authorization and access control are ways of enforcing access policies. The stereotype of the authorization is the image of the security guard at the door of a bowling alley, which only allows young people who fit their criteria to pass. Access control would be the opposite: excluding those who do not fit their criteria. They are two very common processes that occur everywhere. For example, in the bank, in a sports stadium, in a concert hall, as you prepare to board an airplane ... in each of these cases, you must demonstrate that you are authorized to take action; such as entering the airport security zone or extracting money from your ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Great! 10/10 would recommend using Studypool to help you study.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4