Question

My employer has me creating a system and tasked me to select network and access security controls. I need suggestions and real life examples on which network security controls that I should use and so...

My employer has me creating a system and tasked me to select network and access security controls. I need suggestions and real life examples on which network security controls that I should use and some access control technology for my company which is a local electric company outside of Jackson, MS.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

First of all, it is very important to implement network security in order to secure your infrastructure from cyber security threats and risks prevailing over your infrastructure. You need to implement power cyber security so to keep away attackers from attacking your infrastructure. So, here are basic network level security:

  • Firewalls: Firewalls are the basic and most important level of security in your infrastructure. This will block all the unwanted traffics entering into your network and only allow those traffics which are trusted or are written in the allow rules. You can implement firewall both on the network device level as well as on the individual devices.
  • Encryption: Use of encryption in your network will provide huge security to all the data present in your infrastructure. Using encryption tool to encrypt your data will make it difficult for attackers to decode the actual data and thus it will surely make your infrastructure more strong.
  • Multi-Factor Authentication: This is another real-life security that helps in the security process of the network. This multi-factor authentication will authenticate the user to login into the system. This authentication procedure requires authorization based on password or mobile OTP.

These 3 real-life examples will certainly help in providing security to your infrastructure.

Add a comment
Know the answer?
Add Answer to:
My employer has me creating a system and tasked me to select network and access security controls. I need suggestions and real life examples on which network security controls that I should use and so...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Hello, Need my paper proof read, I have problems with my paper structure. I need help...

    Hello, Need my paper proof read, I have problems with my paper structure. I need help with my flow as I feel as if my analysis is not iter mixing with the my paper. For example currently I have citation, citation, example, then my analysis. I need help restructure my paper for better flow. I have copied and pasted my paper for review below: Smart home devices have been a growing trend in the Canadian market with approximately 18% of...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • AUTOMAKERS BECOME SOFTWARE COMPANIES which does not exist as of yet. Ford has doubled its ways for vehicles to commu...

    AUTOMAKERS BECOME SOFTWARE COMPANIES which does not exist as of yet. Ford has doubled its ways for vehicles to communicate with one another industry is working on technology that will allow Automakers are finding that software is a way of adding more "value" and freshness to their products now devote resources to updating and testing their production. It takes Ford Motor Company, for exam updated saftware to their customers. Car companies ple, about two and a half years to plan,...

  • please I need this, step by step with formulas, avoid using excel. CASE 33 Security Software,...

    please I need this, step by step with formulas, avoid using excel. CASE 33 Security Software, Inc. communication in a highly secure and efficient process. The Market Security Software, Inc. (SSI) was a major provider of application software. The firm was proud to be the number two company in the enterprise firewall market. Firewalls ensure network Security for businesses by determining whether to approve or deny access to corporate networks and applications. They have security software that inspects com- munication...

  • I wanted to update you on my efforts to secure an increased line of credit for...

    I wanted to update you on my efforts to secure an increased line of credit for working capital. Despite my repeated efforts and the calls that both of you have made to our bank's senior officers, Miami Dade Merchant's Bank (MDM) continues to be inflexible. It refuses to increase our $3.2 million line of credit and says that it will not change its mind. It is also proposing tighter covenants. I have highlighted for MDM our improved EBIT and free...

  • Select two of the discussion questions and analyze the case study using project management principles. Apply...

    Select two of the discussion questions and analyze the case study using project management principles. Apply your knowledge of project management to the facts presented in the case study to describe how you would proceed. We only need to answer one of the questions. A thorough answer will probably require 300 to 500 words for each question.   Feel free to use text bullets, tables, or graphics to summarize your points. Questions Q1: Make or Buy decision – Describe the make...

  • Please see the articles below… 1.  What is your opinion on the subject? 2.  Which ethical views (i.e.,...

    Please see the articles below… 1.  What is your opinion on the subject? 2.  Which ethical views (i.e., utilitarian view, moral rights view, justice view, practical view) you feel are being used by both sides of the argument (i.e., for and against downloading) to justify their positions? High Court Enters File-Sharing Spat; Justices Must Determine Software Providers' Liability For Copyright Violations by Anne Marie Squeo. Wall Street Journal. (Eastern edition). New York, N.Y.: Mar 30, 2005. pg. A.2 WASHINGTON -- The Supreme...

  • I have this case study to solve. i want to ask which type of case study...

    I have this case study to solve. i want to ask which type of case study in this like problem, evaluation or decision? if its decision then what are the criterias and all? Stardust Petroleum Sendirian Berhad: how to inculcate the pro-active safety culture? Farzana Quoquab, Nomahaza Mahadi, Taram Satiraksa Wan Abdullah and Jihad Mohammad Coming together is a beginning; keeping together is progress; working together is success. - Henry Ford The beginning Stardust was established in 2013 as a...

  • I need help with my very last assignment of this term PLEASE!!, and here are the instructions: After reading Chapter T...

    I need help with my very last assignment of this term PLEASE!!, and here are the instructions: After reading Chapter Two, “Keys to Successful IT Governance,” from Roger Kroft and Guy Scalzi’s book entitled, IT Governance in Hospitals and Health Systems, please refer to the following assignment instructions below. This chapter consists of interviews with executives identifying mistakes that are made when governing healthcare information technology (IT). The chapter is broken down into subheadings listing areas of importance to understand...

  • I need help with the case W16165 SOMEBODY STOP THE RADIO STAR: JIAN GHOMESHI AT THE...

    I need help with the case W16165 SOMEBODY STOP THE RADIO STAR: JIAN GHOMESHI AT THE CBC Questions: What negative behavior is attributed to Ghomeshi? What was the impact of his alleged behavior on Q employees? Why did the employee get together to compile the red sky presentation for Groen and Noorani? What else could they have done. If is is true that Goneshi treated Q staff extremely poorly over a long period of time (e.g. from April 2007 to...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT