Select Page
  

Prepare a script for about a 3-5 minute informative presentation for your Formal Report powerpoint. As a rule of thumb, a PowerPoint presentation is usually no more than one slide per minute; otherwise, your audience is “watching” and not “listening.” For longer presentations, the rule slides up to approximately three minutes per slide.Atattched is the powerpoint slide and the Formal report that the powerpoint was made after.
formal_report_presentation_ppx.pptx

formal_report.doc

Don't use plagiarized sources. Get Your Custom Essay on
Saint Leo University Network Security discussion
Just from $10/Page
Order Essay

Unformatted Attachment Preview

Network Security
Azlan Allen
Saint Leo University
Introduction

The growth of technology has led to increase in usage of the
technological applications.

It leads to the focus on the role of network security and protection
of the information.

The quantification of the risks is important as this focuses on the
elements of the networks such as confidentiality, availability and
integrity.

Network security focuses on the authorization of the usage of the
systems.

There is analysis of malicious attacks that affect the system.
Network Issues and the Internet

The definition of the concepts of security helps in focusing on
system vulnerabilities.

The attacks that arise are analyzed from the different possibilities.

There is analysis of the weakness of the system.

The detailing of the attacks in the systems enables the focus on the
strategies that reduce the exposure of the business.
Cont’d

The network security schemes need to observe the changes that
arise in network security.

The classification of the threats is important as this guides the
improvement of the strategies in the management of growth.

The network security threats lead to the need to classify the threats.

It helps in focusing on strategies that prevent the attacks.
Types of Attacks
Cont’d

The attacks that the systems face leads to the slowing down of
performance.

It creates the need to observe the nodes that are malicious and the
categorization of the attacks.

The common active attacks includes spoofing and this involves the
hiding of the sender’s identity creating the changes in topology of
the system.

The denial of service attack prevents the sending of the messages as
the bandwidth is affected by the attack.
Cont’d
Insecure.Org

The site offers important information in the maintenance of security
in the organization.

The solutions offered focus on the improvement of the scripting of
information.

The site addresses the risks that the community presents to the
networks.

The site is important in enhancing the value of information and this
helps in reduction of risks.
Applicability of the Information

The information is important in protecting the networks of the
organization.

It helps in increasing risk detection.

The use of firewalls helps in the creation of a barrier protecting
networks.

Use of gateways and filtering is important in sieving of
information.
References
Aloul, F., Al-Ali, A. R., Al-Dalky, R., Al-Mardini, M., & El-Hajj, W. (2012). Smart
grid security: Threats, vulnerabilities and solutions. International Journal of
Smart Grid and Clean Energy, 1(1), 1-6.
Stallings, W. (2003). Network Security Essentials: Applications and Standards, 4/e.
Pearson Education India.
Stallings, W., Brown, L., Bauer, M. D., & Bhattacharjee, A. K. (2012). Computer
security: principles and practice (pp. 978-0). Upper Saddle River (NJ: Pearson
Education.
Wiegel, S. L. (2002). U.S. Patent No. 6,484,261. Washington, DC: U.S. Patent and
Trademark Office.
NETWORK SECURITY
1
Network Security
Azlan Allen
Saint Leo University
NETWORK SECURITY
2
Transmittal Letter
th
March 6 , 2019
Technological Development Company
New York, United States.
Dear technological Development Board
Attached is a report on network security and the risk that it poses to organizations. The
improvement in the development of technology increases the threats that companies face in using
different types of machines. The identification of the risks helps in the development of
preventive strategies. The primary goal of the report is reporting on the various trends in network
security and the effect that it has on the growth of the organizations. Kindly consider the
recommendations in helping to protect the system’s performance. The recommendation ensure
there is timely detection of the potential risks and aims to reduce the effect of the threats on
system operation.
Sincerely,
(Name)
NETWORK SECURITY
3
Contents
Introduction ……………………………………………………………………………………………………………………. 5
Network Issues and the Internet ………………………………………………………………………………………… 5
Types of Attacks …………………………………………………………………………………………………………….. 6
Insecure.Org …………………………………………………………………………………………………………………… 7
Applicability of the Information ……………………………………………………………………………………….. 8
Conclusion …………………………………………………………………………………………………………………….. 8
NETWORK SECURITY
4
List of Figures
Figure1: Classification of Threats 1 …………………………………………………………………………………… 6
Figure 2: Types of Threats and Attacks 1 …………………………………………………………………………… 7
Figure 3: Trends in Network Security 1 ……………………………………………………………………………. 8
NETWORK SECURITY
5
Network Security
Introduction
The growth of technology has led to an increase in the usage of technological
applications. It leads to the focus on the role of network security and protection of the
information. The emphasis on awareness of the security of the networks is crucial as it helps in
the improvement of the performance of the systems and the risks that are faced in the usage of
technology. There is a need to focus on the methods that are used in the protection of the
networks. The resources that are applied helps in the protection of the nodes and the analysis of
the different types of malicious attacks that the systems face. The quantification of the risks is
vital as this focuses on the elements of the networks such as confidentiality, availability, and
integrity.
Network security focuses on the authorization of the usage of the systems, and this
involves the assessment of the malicious attacks that are likely to affect the systems. It is
essential to monitor the operation of the systems as this ensures there is a connection between the
different databases and the potential detection of the changes in the policy of operation. The
strategies used in the discovery of the malware in the networks is essential as this helps in the
improvement of communication between the different nodes. There is a need to observe the role
of the infrastructure and the importance of the internet in helping to guide the changes that arise
in the property. The protection of the information involves the engineering of the systems and the
networking that aids in guiding the various procedures that are important in increasing the
security of the systems.
Network Issues and the Internet
The definition of the concepts of security is essential as this helps in focusing on the
different vulnerabilities that face the system. The attacks that arise are analyzed from the
different possibilities and the exploitation of the weakness of the system. The representation of
the changes in networking arises from the conception of the threats, and this leads to the need to
focus on the packaging of the information and the countermeasures that are important in the
protection of the systems. The detailing of the attacks in the systems enables the focus on the
strategies that reduce the exposure of the business. There is a focus on the different methods of
the conception of the attacks and the packaging of the software that is important in enhancing the
security of the systems. The trend in the enhancement of network security is crucial as it helps in
the analysis of the various types of attacks and the damages that are caused to the systems
(Stallings, 2003). It is crucial that there is an analysis of the virus and the malware that affects
the system as this helps in the conception of the operations of the systems and the reasonable
operations in network security.
Network security schemes need to observe the changes that arise in network security.
There is an assessment of the variation that exists in the operation of the systems and the
perception of the operation of the systems. The classification of the threats is essential as this
guides the improvement of the strategies in the management of growth and the implications that
arise where the threats attack the information. There is a need to analyze the changes in the
passage of the information as this enables the implementation of the strategies that allow
NETWORK SECURITY
6
interactions in the markets. The classification of the attacks enables the enhancing of the
perception of the security measures, and this helps in the development of the strategies that focus
on the reduction of the risks that the systems face.
The network security threats lead to the need to classify the threats as this enables the
development of the best strategies in the reduction of the risks to the organizations. As seen in
figure 1, there is an analysis of the threats to the information, and this enables the development
of the perceptions of the security and the changes that arise in the process.
Figure1: Classification of Threats 1 (Wiegel, 2002).
Types of Attacks
The attacks that the systems face leads to the slowing down of the performance of the
systems. It creates the need to observe the nodes that are malicious and the categorization of the
attacks. The commands that are helpful in the management of the attacks enables the early
detection of the changes in the systems. There is the modification of the information as this
allows the reduction of the inefficiencies that arise in the system. The interception of the
strategies is essential as this helps in increasing the activities in the systems and the observation
of the initiation of the different commands. There is a focus on the classes of the attacks as this
enables the reduction of the intrusion in the networks. The typical active attacks include
spoofing, and this involves the hiding of the sender’s identity creating the changes in the
topology of the operation of the system (Stallings et al., 2012). There is a need to focus on the
delays that arise where there is the modification of data as this affects the performance of the
system and the channeling of the various attacks. Worms are potential attacks, and this affects
the reception of the information. The path that is used in the network is assumed to be the
shortest, and this creates the need to observe the role of the senders and the receivers of the
information.
The denial of service attack prevents the sending of the messages as the bandwidth is
affected by the attack. It leads to the assessment of the authentication of the nodes and the
response from the receivers. The analysis of the fabrication of the messages creates the
NETWORK SECURITY
7
observation of the messages sent and the correction of the changes in the different types of
behaviors. The evaluation of data enables modification as a measure of security, and this enables
the reduction of the different types of dropping and the institution of the methods that are
effective in sending the correct messages. The assessment of the traffic in the information is vital
as this means there is a delay in the relay of the information that is caused by the various attacks
(Aloul et al., 2012). It creates the need to analyze the measures that are used in the protection of
data and the value that enables the modification of the information. There is guidance on the
changes that arise in the selection of the path of information and this enables the initiation of the
information and the ability to inform the participants of the security team in the reduction of
risks.
Figure 2: Types of Threats and Attacks 1
Insecure.Org
The site offers relevant information in the maintenance of security in the organization.
The solutions offered a focus on the improvement of the scripting of information, and this helps
in the recommendation of the information and the attempt to create an integrative system. There
is an observation of the icons that are used in the disclosure of the information and the
exploration of the number of people in the online systems and the roles that they play in
increasing the insecurity of the information. The site focuses on the role of the disclosure of the
information in ensuring there is guidance on the security steps to undertake such as rebooting of
systems where there is the detection of risks. The site addresses the risks that the community
presents to the networks, and this enables the exploitation if the information that helps in
improving the security of the networks. The reduction of the threats is enhanced where there is
an analysis of the trends of the threats in the environment as seen in figure 3. There is a focus on
NETWORK SECURITY
8
the capabilities of the systems, and this helps in the exploration of the features that are important
in the management of the user’s information. The site is vital in enhancing the value of
information, and this means the constant analysis of the efforts of the people ion reduction of the
risk.
Figure 3: Trends in Network Security 1 (Aloul et al., 2012).
Applicability of the Information
The information is vital in protecting the networks of the organization. It helps in focusing on
the areas that enable the adjustment of the information and the detection of the risks that the
market faces. In the case, there is an assessment of the factors that are important in enhancing
security measures. The use of firewalls helps in the creation of the barrier that helps in the
protection of the network. There is an evaluation of the understanding of the information, and
this guides the research process while ensuring there is the employment of the security needs.
Use of gateways and filtering is essential in the organization as it helps in sieving the information
that enters the different networks (Aloul et al., 2012). The screening is done on the routers, and
this helps in addressing the security challenges that the organization faces. With the use of
security strategies, there is early detection of the risks that face the organization.
Conclusion
Network security is a challenge that organizations face due to the development of
technology. It creates the need to focus on the strategies that help in the reduction of the threats
and focus on the filtering of the networks through the use of nodes. As the risks continue to arise,
the mitigation factors are also developed. It is vital as it helps in increasing the speed of
NETWORK SECURITY
9
operation and the analysis of the changes that arise in the different types of markets. The
minimization of the risks enables increased performance of the organization.
References
Aloul, F., Al-Ali, A. R., Al-Dalky, R., Al-Mardini, M., & El-Hajj, W. (2012). Smart grid
security: Threats, vulnerabilities and solutions. International Journal of Smart Grid and
Clean Energy, 1(1), 1-6.
Stallings, W. (2003). Network Security Essentials: Applications and Standards, 4/e. Pearson
Education India.
Stallings, W., Brown, L., Bauer, M. D., & Bhattacharjee, A. K. (2012). Computer security:
principles and practice (pp. 978-0). Upper Saddle River (NJ: Pearson Education.
Wiegel, S. L. (2002). U.S. Patent No. 6,484,261. Washington, DC: U.S. Patent and Trademark
Office.

Purchase answer to see full
attachment

Order your essay today and save 10% with the discount code ESSAYHSELP