Applied Learning Practical Paper- Computer Network Security- 2 pgs- Amerkhan

docx

School

Masinde Muliro University of Science and Technology *

*We aren’t endorsed by this school

Course

MISC

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

4

Uploaded by ombuyajapheth

Report
Running head: COMPUTER NETWORK SECURITY 1 Name Affiliated institution Date
COMPUTER NETWORK SECURITY 2 My novel course for this semester is called "Computer Network Security," and its objective is to offer students with an in-depth grasp of the basic principles, technologies, and practices that are essential to successfully secure computer networks from a variety of cyber threats. The following is a list of the learning objectives that have been defined for the course entitled "Computer Network Security": The application of theoretical concepts learned in academic courses to practical training initiatives; the application of experiences gained in practical training to academic projects; and the investigation of connections between practical training and academic courses. During the course of this semester, I have acquired a comprehensive grasp of a broad variety of subjects and skills that are related to the protection of computer networks. Comprehending encryption methods, putting firewalls into action, conducting vulnerability assessments, and coming up with incident response plans are some of the most important responsibilities associated with this area of expertise. In addition, I have received hands-on experience in the process of configuring intrusion detection systems and analyzing the patterns of network traffic. The aforementioned concepts and skills have shown their significance as essential components of the working environment that now exists. The focus placed on various types of encryption throughout the course work led to a direct increase in the safety of sensitive data while it was being sent (Stallings, 2017). Our network's safety has been significantly improved as a result of the implementation of firewalls, as advised in the curriculum, which has reduced the likelihood of unauthorized access. Due to the emphasis placed on doing vulnerability assessments throughout the course work, I was able to identify and resolve any flaws in the structure of our network. In addition, the gathering of information throughout the process of
COMPUTER NETWORK SECURITY 3 developing incident response plans has been an essential factor in the creation of a methodical approach to the management of security events. Even though the class presented a thorough overview, my comprehension may have been enhanced if it had included a deeper investigation of new dangers such as zero-day vulnerabilities and advanced persistent threats (APTs). In addition, it would be useful to do a more in-depth review of the requirements for security compliance, particularly within regulated businesses (Anderson, 2021). This would be helpful in ensuring that our network security procedures are in line with the standards set by the industry as well as the responsibilities imposed by the law. It is predicted that the information and capabilities that I will get from completing this program will have a significant impact on the future career goals that I pursue. When working in the subject of cybersecurity, it is very vital to have a comprehensive comprehension of the dynamic landscape, which is comprised of ever-evolving threats and technical advancements. The inescapable pursuit of ongoing education in disciplines such threat intelligence, ethical hacking, and security governance, amongst others, is essential to the resilience of computer networks, which must be maintained at all costs.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
COMPUTER NETWORK SECURITY 4 References Stallings, W. (2017). NETWORK Security Essentials: Applications and Standards. Pearson. Anderson, R. (2021). Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley.