Network Security and Asset Management

User Generated

wqfgvyy1987

Computer Science

Description

With regard to network security and asset management of a given network, concerns of availability, security, and integrity that are relevant to data security apply as well to network security.

Attached are the active and passive threats.

Based on your understanding of the above topic, answer the following:

  • Discuss in detail examples of each of these types of threats, both passive and active, with examples of such activity.
  • Describe in detail the actions to be taken in order to proactively protect against such threats and methods to secure your network.
  • Discuss a minimum of six functions related to maintenance of security information and how this information helps security management keep account of activity or attempted activity.

In a Microsoft Word document, create 2- to 3-page report..

Support your responses with examples.

Cite any sources in APA format.

Unformatted Attachment Preview

Passive Threats and Active Threats Page 1 of 1 ITS4106 Network Administration II © 2013 South University
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: NETWORK SECURITY AND ASSET MANAGEMENT

Network Security and Asset Management
Name
Date
Institution

1

NETWORK SECURITY AND ASSET MANAGEMENT

2

Threats to Network Security
There are several elements which can compromise the safety of a network system. When
such threats are allowed to threat, they make the system vulnerable to exposure, and
consequently a fatal attack. A network threat could be defined as an object or individual who has
the potential to cause harm to a system ("What is network security management? - Juniper
Networks", 2018). It is therefore important that the management of an organization be
adequately informed of the possible threats that can ruin its information security system
Error attributed to mankind: Sometimes, the employees may make technical mistakes in
the system and consequently expose the system to attacks. Examples of human errors include
accidents and mistakes committed by the workers. Denting of the intellectual property re...


Anonymous
Just the thing I needed, saved me a lot of time.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags