cyb 150 week one
docx
keyboard_arrow_up
School
University of Phoenix *
*We aren’t endorsed by this school
Course
150
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
4
Uploaded by EarlFlowerAlligator27
In recent years, the increasing use of technology in every aspect of daily life has led to a rapid
increase in data that is transmitted over networks. As a result, network security has become a
critical aspect of any organization's IT infrastructure. Three key technologies that have gained
immense popularity in recent years are virtualization, cloud computing, and wireless networks.
In this paper, we will examine the security concepts associated with each of these technologies.
Virtual Network Security:
Virtual networks are a type of network that is created by software rather than hardware. This
technology has become increasingly popular due to its flexibility, scalability, and cost-
effectiveness. However, virtual networks are also vulnerable to security threats, such as data
breaches and denial of service attacks.
To ensure the security of virtual networks, it is essential to implement various security measures
such as firewalls, intrusion detection systems, and antivirus software. These measures help to
protect virtual machines and ensure the confidentiality and integrity of data.
Cloud Network Security:
Cloud computing is a technology that supplies on-demand access to a shared pool of computing
resources over the internet. Cloud computing offers benefits, such as cost-effectiveness,
scalability, and flexibility. However, security is a major concern when it comes to cloud
computing.
To ensure the security of cloud networks, various measures such as access control, encryption,
and data loss prevention should be implemented. These measures help to protect data stored in
the cloud and ensure its confidentiality and integrity.
Wireless Network Security:
Wireless networks have become a ubiquitous part of our daily lives. Wireless networks use
radio waves to send data over the air. However, wireless networks are also vulnerable to
security threats such as eavesdropping, denial of service attacks, and hacking.
To ensure the security of wireless networks, various measures such as encryption, access
control, and intrusion detection systems should be implemented. These measures help to
protect wireless networks from security threats and ensure the confidentiality and integrity of
data.
Table of Learnings:
The following table describes two learnings based on our labs on virtual, cloud, and wireless
network security concepts:
Security Concept
Learning one
Learning two
Virtual
Ensure that the virtual
network is isolated
from the physical
network to prevent
unauthorized access.
Implement secure
passwords for virtual
machines to prevent
unauthorized access.
Cloud
Implement multi-factor Ensure that data stored
authentication to
prevent unauthorized
access to cloud
resources.
in the cloud is
encrypted to prevent
data breaches.
Wireless
Ensure that wireless
networks are secured
with strong passwords
to prevent
unauthorized access.
Implement MAC
filtering to restrict
access to wireless
networks to authorized
devices only.
In conclusion, virtualization, cloud computing, and wireless networks are critical technologies in
today's digital landscape. However, they are also vulnerable to security threats. Therefore, it is
essential to implement various security measures such as access control, encryption, and
intrusion detection systems to ensure the security of these networks. By doing so, organizations
can protect their data, ensure the confidentiality and integrity of data, and prevent security
breaches.
Reference
US Department of Education. (2017).
Reimagining the Role of Technology in Education: 2017
National Education Technology Plan Update
.
https://tech.ed.gov/files/2017/01/NETP17.pdf
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Anderson, M. (n.d.).
Acrobat Accessibility Report
. Dodcio.defense.gov.
https://dodcio.defense.gov/Portals/0/Documents/Library/CSResourceReferenceGuide.p
df
Cichonski, P., Millar, T., Grance, T., & Scarfone, K. (2012). Computer Security Incident Handling
Guide: Recommendations of the National Institute of Standards and
Technology.
Computer Security Incident Handling Guide
,
2
(2).
https://doi.org/10.6028/nist.sp.800-61r2