cyb 150 week one

docx

School

University of Phoenix *

*We aren’t endorsed by this school

Course

150

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

4

Uploaded by EarlFlowerAlligator27

Report
In recent years, the increasing use of technology in every aspect of daily life has led to a rapid increase in data that is transmitted over networks. As a result, network security has become a critical aspect of any organization's IT infrastructure. Three key technologies that have gained immense popularity in recent years are virtualization, cloud computing, and wireless networks. In this paper, we will examine the security concepts associated with each of these technologies. Virtual Network Security: Virtual networks are a type of network that is created by software rather than hardware. This technology has become increasingly popular due to its flexibility, scalability, and cost- effectiveness. However, virtual networks are also vulnerable to security threats, such as data breaches and denial of service attacks. To ensure the security of virtual networks, it is essential to implement various security measures such as firewalls, intrusion detection systems, and antivirus software. These measures help to protect virtual machines and ensure the confidentiality and integrity of data. Cloud Network Security: Cloud computing is a technology that supplies on-demand access to a shared pool of computing resources over the internet. Cloud computing offers benefits, such as cost-effectiveness, scalability, and flexibility. However, security is a major concern when it comes to cloud computing.
To ensure the security of cloud networks, various measures such as access control, encryption, and data loss prevention should be implemented. These measures help to protect data stored in the cloud and ensure its confidentiality and integrity. Wireless Network Security: Wireless networks have become a ubiquitous part of our daily lives. Wireless networks use radio waves to send data over the air. However, wireless networks are also vulnerable to security threats such as eavesdropping, denial of service attacks, and hacking. To ensure the security of wireless networks, various measures such as encryption, access control, and intrusion detection systems should be implemented. These measures help to protect wireless networks from security threats and ensure the confidentiality and integrity of data. Table of Learnings: The following table describes two learnings based on our labs on virtual, cloud, and wireless network security concepts: Security Concept Learning one Learning two Virtual Ensure that the virtual network is isolated from the physical network to prevent unauthorized access. Implement secure passwords for virtual machines to prevent unauthorized access. Cloud Implement multi-factor Ensure that data stored
authentication to prevent unauthorized access to cloud resources. in the cloud is encrypted to prevent data breaches. Wireless Ensure that wireless networks are secured with strong passwords to prevent unauthorized access. Implement MAC filtering to restrict access to wireless networks to authorized devices only. In conclusion, virtualization, cloud computing, and wireless networks are critical technologies in today's digital landscape. However, they are also vulnerable to security threats. Therefore, it is essential to implement various security measures such as access control, encryption, and intrusion detection systems to ensure the security of these networks. By doing so, organizations can protect their data, ensure the confidentiality and integrity of data, and prevent security breaches. Reference US Department of Education. (2017). Reimagining the Role of Technology in Education: 2017 National Education Technology Plan Update . https://tech.ed.gov/files/2017/01/NETP17.pdf
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Anderson, M. (n.d.). Acrobat Accessibility Report . Dodcio.defense.gov. https://dodcio.defense.gov/Portals/0/Documents/Library/CSResourceReferenceGuide.p df Cichonski, P., Millar, T., Grance, T., & Scarfone, K. (2012). Computer Security Incident Handling Guide: Recommendations of the National Institute of Standards and Technology. Computer Security Incident Handling Guide , 2 (2). https://doi.org/10.6028/nist.sp.800-61r2