COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Security requirements
|
|
Service provider agreement
|
|
Risk assessment
|
|
Cyber security plan
|
Detailed explanation-1: -Firewall. Software or firmware inspects incoming and outgoing traffic to prevent unauthorized network access. Firewalls are some of the most widely used security tools.
Detailed explanation-2: -When we discuss data and information, we must consider the CIA triad. The CIA triad refers to an information security model made up of the three main components: confidentiality, integrity and availability.
Detailed explanation-3: -Identity. Accurate and positive identification of network users, hosts, applications, services, and resources is a must. Perimeter security. Data privacy. Security monitoring. Policy management.
Detailed explanation-4: -Data remains confidential. Data cannot be modified. Data cannot be replayed. Lost packets can be detected.