Description
With regard to network security and asset management of a given network, concerns of availability, security, and integrity that are relevant to data security apply as well to network security.
Attached are the active and passive threats.
Based on your understanding of the above topic, answer the following:
- Discuss in detail examples of each of these types of threats, both passive and active, with examples of such activity.
- Describe in detail the actions to be taken in order to proactively protect against such threats and methods to secure your network.
- Discuss a minimum of six functions related to maintenance of security information and how this information helps security management keep account of activity or attempted activity.
In a Microsoft Word document, create 2- to 3-page report..
Support your responses with examples.
Cite any sources in APA format.
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Attached.
Running head: NETWORK SECURITY AND ASSET MANAGEMENT
Network Security and Asset Management
Name
Date
Institution
1
NETWORK SECURITY AND ASSET MANAGEMENT
2
Threats to Network Security
There are several elements which can compromise the safety of a network system. When
such threats are allowed to threat, they make the system vulnerable to exposure, and
consequently a fatal attack. A network threat could be defined as an object or individual who has
the potential to cause harm to a system ("What is network security management? - Juniper
Networks", 2018). It is therefore important that the management of an organization be
adequately informed of the possible threats that can ruin its information security system
Error attributed to mankind: Sometimes, the employees may make technical mistakes in
the system and consequently expose the system to attacks. Examples of human errors include
accidents and mistakes committed by the workers. Denting of the intellectual property re...
Review
Review
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Similar Content
Related Tags
1984
by George Orwell
Faust
by Johann Wolfgang von Goethe
Othello
by Wiliam Shakespeare
East of Eden
by John Steinback
Breakfast at Tiffanys
by Truman Capote
Ezperanza Rising
by Pam Muñoz Ryan
Tess of the DUrbervilles
by Thomas Hardy
Slaughterhouse Five
by Kurt Vonnegut
The Old Man and the Sea
by Ernest Hemmingway