ipl-logo

Network Security P3

2329 Words10 Pages

P3 - describe how software and network security can keep systems and data secure

Introduction
In this assignment I will be describing how software and network security can keep and maintain computer systems and data or information secure. I will be talking about things like: encryption techniques eg public and private key; diskless networks; use of backups; audit logs; firewall configuration; virus checking software; use of virtual private networks (VPN) and etc. And for M2 part, I will be explaining how the operation and use of an encryption technique ensure security of transmitting data.

Encryption techniques eg public and private key
Encryption is the translation of electronic data into another form which is known as cipher text, that …show more content…

It allows an efficient process of sending and receiving data via networks, with its point to point connection through protocols. This provides greater efficiency in regards to transmission of information via network as the Internet operates on a worldwide basis in which there is an interlink between computers and devices through the standard internet protocol suite. VPN is very essential and trusted in creating a enough network of connection that serves to transmit services, data and information at an high rate.

The advantages of the VPN are that its stop snooping and fraudulent authentication.VPNs saves costs when it come to maintaining servers as well as VPNs provides an outsource professional support from third party service providers and that can be very cheaper for organisation to have. In addition to this, it also provides an encryption which means people who has not have a secret key cannot read the data. The main disadvantage of VPNs is that it requires full understanding of network security issues and it must be carefully installed and configured in order to make sure the sufficient protection on a public …show more content…

For example if hurricane happen then it can destroys all or some part a business's resources including; IT equipment, data records and so on. Other disaster may include events like power failure, human error, computer viruses and legal issues. Therefore, disaster recovery policy is used to let the users know what procedures to be followed and taken into the consideration in order to minimise the impact of disasters.

The advantages of disaster recovery are that it can restore your lost data, records, or other files in minutes. Also, it minimise the risk of loss of service and revenue. The disadvantages of this are that sometime backups might not be updated which can result in loss of sensitive data if there any disaster occurs. Also, it is time consuming to create a plan and requires understanding in order to know what to do when a disaster

Open Document