Applied Learning Practical Paper- Computer Network Security- 2 pgs- Amerkhan
docx
keyboard_arrow_up
School
Masinde Muliro University of Science and Technology *
*We aren’t endorsed by this school
Course
MISC
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
4
Uploaded by ombuyajapheth
Running head: COMPUTER NETWORK SECURITY
1
Name
Affiliated institution
Date
COMPUTER NETWORK SECURITY
2
My novel course for this semester is called "Computer Network Security," and its
objective is to offer students with an in-depth grasp of the basic principles, technologies, and
practices that are essential to successfully secure computer networks from a variety of cyber
threats. The following is a list of the learning objectives that have been defined for the course
entitled "Computer Network Security": The application of theoretical concepts learned in
academic courses to practical training initiatives; the application of experiences gained in
practical training to academic projects; and the investigation of connections between practical
training and academic courses.
During the course of this semester, I have acquired a comprehensive grasp of a broad
variety of subjects and skills that are related to the protection of computer networks.
Comprehending encryption methods, putting firewalls into action, conducting vulnerability
assessments, and coming up with incident response plans are some of the most important
responsibilities associated with this area of expertise. In addition, I have received hands-on
experience in the process of configuring intrusion detection systems and analyzing the patterns
of network traffic.
The aforementioned concepts and skills have shown their significance as essential
components of the working environment that now exists. The focus placed on various types of
encryption throughout the course work led to a direct increase in the safety of sensitive data
while it was being sent (Stallings, 2017). Our network's safety has been significantly improved
as a result of the implementation of firewalls, as advised in the curriculum, which has reduced
the likelihood of unauthorized access. Due to the emphasis placed on doing vulnerability
assessments throughout the course work, I was able to identify and resolve any flaws in the
structure of our network. In addition, the gathering of information throughout the process of
COMPUTER NETWORK SECURITY
3
developing incident response plans has been an essential factor in the creation of a methodical
approach to the management of security events.
Even though the class presented a thorough overview, my comprehension may have been
enhanced if it had included a deeper investigation of new dangers such as zero-day
vulnerabilities and advanced persistent threats (APTs). In addition, it would be useful to do a
more in-depth review of the requirements for security compliance, particularly within regulated
businesses (Anderson, 2021). This would be helpful in ensuring that our network security
procedures are in line with the standards set by the industry as well as the responsibilities
imposed by the law.
It is predicted that the information and capabilities that I will get from completing this
program will have a significant impact on the future career goals that I pursue. When working in
the subject of cybersecurity, it is very vital to have a comprehensive comprehension of the
dynamic landscape, which is comprised of ever-evolving threats and technical advancements.
The inescapable pursuit of ongoing education in disciplines such threat intelligence, ethical
hacking, and security governance, amongst others, is essential to the resilience of computer
networks, which must be maintained at all costs.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
COMPUTER NETWORK SECURITY
4
References
Stallings, W. (2017). NETWORK Security Essentials: Applications and Standards. Pearson.
Anderson, R. (2021). Security Engineering: A Guide to Building Dependable Distributed
Systems. Wiley.