Network security is hard to achieve because networks interact with other networks outside the private placement of control. And networks just as safe as the system less secure networks to which they are attached
2. Why are network vulnerability assessments important?
Because looking for weaknesses are the best way to maintain operability. If not analyzed often, and the weaknesses that go undetected.
3. Why is IP Spoofing always unethical? What are some examples from real life?
Because you are masquerading all over as if you were a person or anything else. Possibly causing damage by using someone else's reputation. Its identity theft of IP.
4. What is the basis for defining trust in networks and what does that imply in terms of the protection requirements?
The basis for defining trust in …show more content…
networks are the following:
Reliable networks- It's located inside the perimeter of specific security.
Untrusted networks - They are the outer perimeter of security and lack of control.
Networks unknown - Is not reliable or unreliable. They are external perimeter security.
5.
Why are perimeters so important to the physical design of secure networks?
Because there's only so much you can control. And also Networks can be fragmented by design to fit within a certain perimeter, leading to a more centered response
6. What differentiates network equipment from other kinds of computer equipment? What unique security issues foes this difference raise?
Network equipment differs from other equipment because it interacts with computers and systems that aren't reliable. For that reason this leads to greater scrutiny to enable network equipment, and there is a need for more precautions to make it safe.
7. How does connection control differ from transmission control? Why are both of these functions essential to secure transmission?
The connection control differs because Connection Control and focus explicitly on getting a connection between two devices set up and besides Transmission Control regulate the flow of data between devices. Both are important, because one without the other is useless to them.
8. Why is configuration an important aspect of both transmission control and connection
control?
Because Control configuration ensures that systems are configured with the appropriate settings and configuration are documented. If we knew what the organization should be connected and what should be transmitted, the security will be the easiest. If not installed and connected properly way, that leads to either to fail to control the action.
9. What is the purpose of a virus? Why is it harmful? What property of a virus might make it even more harmful?
Viruses are pieces of code attached to host programs and the re-publication itself when the host is executed. They are harmful because they may destroy the data on the computer. An infected system with viruses is more harmful because they invoke additional procedures that may cause damage.
10. What potential ways can a Trojan horse attack your computer? How are Trojan horses delivered over networks? What special property of a Trojan horse makes it particularly dangerous to Internet users?
A Trojan is not very dangerous or violent, because it often comes with viruses, or spyware, and often opens up backdoor ports on the computer which leads to, make it possible for invisible attackers to gain access to the computer. But subject to the orders of the attacker because in this case the machine is under his control.