What methods can be put in place to check the network security problems in an IT department?

      

Discuss methods that can be put in place to check the network security problems in an IT department.

  

Answers


Maurice
(i) Integrity and Authenticity.
The integrity and authenticity of information are threatened by modifying, removing, or misrepresenting existing data. For example, omitting sections of a bad credit history so that only the good credit history remains violate the integrity of the document, and requesting a cash advance using a stolen credit card violates the authenticity of that transaction.

(ii) Biometric controls.
Identification methods that use unique personal characteristics such as fingerprints, retinal patterns, skin oils, deoxyribonucleic acid (DNA), voice variations, and keyboard-typing rhythms to prove the identity of the user based on measurements of the user's unique attributes.

(iii) Encryption.
Refers to a technique used to protect confidentiality of information or data by sending it into a form unreadable by anyone except the intended recipient. Information can be scrambled and unscrambled using mathematical equations and a secret code called a key.

(iv) Approved Users.
Access-control software verifies computer users and limits their privileges to view and alter files. Records can be made of the files accessed thereby making users accountable for their actions.

(v) Use of Passwords.
Passwords are confidential sequences of characters that give approved users access to computers. To be effective, passwords must be difficult to guess. Effective passwords contain a mixture of characters and symbols that are not real words. To thwart imposters, computer systems usually limit the number of attempts to enter a correct password.

(vi) Firewalls.
This refers to the process of mixing (encoding/ encrypting) data in a form that only the sender and the receiver understands.

(vii) Security Servers.
Special computers called security servers provide secure connections between networked computers and outside systems, such as database-storage and printing facilities. These security computers use encryption in the handshaking process ( the initiation of the electronic exchange), which prevents a connection between two computers unless the identity of each is confirmed to the other.
maurice.mutuku answered the question on May 5, 2018 at 06:26


Next: 1.Taja aina nne za ngomezi za kisasa. 2. Eleza sifa nne za maapizo. 3. Eleza kikwazo vitatu vinavyokumba Fasihi simulizi.
Previous: What are the main functions of a network operating system?

View More Computer Studies Questions and Answers | Return to Questions Index


Exams With Marking Schemes

Related Questions