The Major Project
Network Security
Introduction
The meaning of the Network Security can be summarize in few words, as the ability to providing high levels of optimization and created confidentiality , authentication and integrity, that includes de configuration of the computer system. The network Security focus also in variety of aspects as the intrusion ,analysis, detention and traffic, as Mohammed,Kabiru, Hassan Abubakar and Yusuf Mohammed sad, on Network Security we have to implement, identify and access management system using the lightweight access directory protocol.
The security in our digital world is a really important concept when comes to protect private information of personal on date base, this fact is more visual in organization , therefore as the technology improves the level of security have to develop aswell. The most important point in network security is block any type of unauthorized devices to reach a Network.
Main body
The tool we can use to secure the Network, is measuring the disability or the confidentiality of large numbers of Network configurations to be able to secure them. That can be, work or estimate the weak level of the Network optimization, so basely that allow the administrator to select the best option , that action will be the key to Secure a Network.
We can mentioned different types of Network Security;
.Access control- block the access of the unauthorize users and also, protect the Network of any attack.
.Application security- track the accessibility and vulnerabilities and secure the hardware and software.
.Firewall- this device act like a filter, decide ,it can allow and blocking traffic.
.Virtual Private Network(VPN}- Secure the communication and the Network in all internet space.
.Intrusion prevention system-Those are type of systems Network that identify also block hackers by scan network traffic.
As we can see those are the ones of the many ways to security the Network, in that point this will be important for cyber security, because will block and defend against any external attack, creating a strong Network therefore is important to Selecting the best and powerful security system against the cyber attack, would be the key for success, that can be provide in efficient way, using firewall, on this point of view software engineering design firewall policy is set of codes. So the consistency of security policy and firewall policy is the method verify the
security level of satisfaction .
Normally the WAN covering a a large area of Network, like a Metropolitan area and the LAN covering a Network local area and allow to communicate in consecutive devices , also the Network collection is made by interface devices.
The security is made base on traffic and can be applied from LAN zone to the WAN zone or vice verse , the router created a zone for traffic itself and can be made automatically therefore the firewall will figure out and then to apply to traffic, therefore we need zones in pairs to configure the global zone security. The Network security, concentrate more in single broadcast LAN, this measure is made by identify possible Network attack , that can be made by compare the usage of the Network and determinate by the history profile then calculate the possibility of violation been occur. The authors Heberlein,LT; Dias,GV; Levitt,KN; Murkherjee,B; Wood, J and Wolber, D, refer that, "several Network attack has been simulated and refer to how the monitor has been able to detect those attacks are also analyzed" therefore it can be explain that the huge amount are detectable with monitor, can also be defeated , the main focus of Network is on integration , bate the host have to be based in the type of technics been used.
References:
Traitov, 2022. Cybersecurity and secure network concept. [image] Available at: <https://www.gettyimages.co.uk/detail/photo/cybersecurity-and-secure-nerwork-concept-data-royalty-free-image/1197780051> [Accessed 5 May 2022].
MARIN, G. M,

This needs a bit more information and include an image too to enance the overall outlook.
ReplyDeleteIn-text citatons and references need to be included in academic writing.