Name
NTC 410
Instructor 's Name
November 1, 2005
File security falls into two categories, encryption and access. Access to files can mean physical access to a computer with unsecured files or access via user permissions or privileges in the form of access control lists (ACLs) (Strengthen Your Users ' File Security, 2003). The files kept on a server with NTFS storage can be locked to prevent anyone who does not have the correct permissions from opening them. This is secure but can be bypassed with physical access to an open computer and should not be used for sensitive information. The other method of securing files is by encrypting the information in the files using an Encrypting File System (EFS), which employs public key encryption privileges (Strengthen Your Users ' File Security, 2003).
A firewall prevents access to an internal system from the outside the company via the internet on any open ports. A firewall will also prevent internal network users from accessing certain internet sites which could be dangerous or offensive (Shay, 2004). The firewall acts at the OSI model 's layers three and four by searching packets for certain types of headers (Shay, 2004). So, firewalls differ from file security because anyone inside the company can theoretically access files behind the firewall, while file security provides internal security against a company 's own workers.
Symmetric and asymmetric encryption differ from each other in that with symmetric encryption, the same key is used for both the encryption and decryption process. With asymmetric encryption, the keys are in pairs but are not the same, and one is used for encryption and another for decryption (Matuszek, 1999). Symmetric encryption is simple and faster than asymmetric encryption, with the security of the key being directly related to the length of the key. Asymmetric encryption has one key that is known only to the person receiving the encrypted data, which does not
References: Aber, R. (2004, May 7). Network security basics. Retrieved on November 2, 2005 from http://www.ciscopress.com/articles/article.asp?p=170742&seqNum=2 Arizona enterprise architecture target technology table Convery, S. (2004, June 18). General design considerations for secure networks. Retrieved on November 2, 2005 from http://www.ciscopress.com/ Cryptography Frazier, R. (n.d). Security Frameworks. Retrieved on November 2, 2005 from http://www.ccc.de/congress/2004/fahrplan/files/89-security-frameworks-paper.pdf Kozierik, A Matuszek, Steve (1999, March). Encryption. Retrieved on October 31, 2005 from http://www.cs.umbc.edu/ Mitchell, R PKI. (2002). Retrieved on November 1, 2005 from http://searchsecurity.techtarget.com Shay, William Song, K. (2004, February). The ABC 's of network security. Retrieved on November 1, 2005 from http://www.certmag.com/ Strengthen Your Users ' File Security with Windows XP Professional TLS. (2005). Retrieved on November 1, 2005 from http://www.webopedia.com/TERM/T/TLS.html Tomsho, G., Tittel, E Vulnerabilities in TCP. (2004, April 20). Retrieved on November 2, 2005 from http://www.net-security.org/advisory.php?id=3243