--%>

Security and Recovery in networking

Security and Recovery: While dealing with network security and information security audit, there are many small but critical things which plays very significant role and need to handle very carefully. Subsequent to the last security audit, it is essential to trace all the changes and modifications which have been brought to the current plans, policies and also performance. This is essential since each and every change play a very significant role while offering security. Reviewing of all firewall logs are necessary, this is because firewall is acts as a main gateway and security wall for all the threats. Any major change in the in the log which is unexpected and results in strange output should be traced first. While dealing with network and information security audit, there are numerous cases and policies for firewall which require implementing in order to offer good security feature. While dealing with network security and information security audit, there are many small but critical things which plays very significant role and need to handle very carefully. After the last security audit, it is necessary to trace all the changes and modifications that have been brought to the current plans, policies as well as performance. This is essential since each and every change play a very significant role while offering security. Reviewing of all firewall logs are necessary, this is because firewall is acts as a main gateway and security wall for all the threats. Any major change in the in the log which is unexpected and results in strange output should be traced first. While dealing with network and information security audit, there are lots of cases and policies for firewall which require implementing in order to offer good security feature. This is because; with the help of firewall log analysis many important components can be traced like for example it can generate security, traffic, and bandwidth reports which are very helpful in analysis. There are many firewall log policies which should be audit in order to trace the security check points. The policies can be security policy, traffic policy, detecting intrusion policy etc. The information need for these kind of polices may vary from policy to policy This is because, with the help of firewall log analysis many important  components can be traced like for example it can generates security, traffic, and bandwidth reports which is very helpful in analysis. There are many firewall log policies which should be audit in order to trace the security check points. The policies can be security policy, traffic policy, detecting intrusion policy etc. The information need for these kind of polices may vary from policy to policy.

   Related Questions in Computer Network Security

  • Q : What is Service set id or SSID-LAN

    SSID (Service set id): SSID is an identifier of the users of the network. SSID acts as a password and it is of 32 characters. The users in the particular network need to know the SSID. Since only users have the 32 SSID, the attackers cannot access the

  • Q : Suppose you worked for a US- based

    Suppose you worked for a US- based company that wanted to develop its own MIB for managing a product line. Where in the object identifier tree would it be registered? ( Hint: You’ll have to do some digging through RFCs or other documents to answer this question.)

  • Q : The purpose of data security 1.

    1. Introduction: The purpose of data security is to ensure the business continuity and minimize damage by Preventing and minimizing the effect of security incidents. Data and Information security management gives an enabling mechanism to share information which ensures the protection of informatio

  • Q : Network layers What are the methods

    What are the methods used by a station to sense whether a station is idle or busy? Explain with a neat diagram.

  • Q : Key algorithms in S/MIME Specify the

    Specify the key algorithms which are used in the S/MIME?

  • Q : Wireless networks Why detection

    Why detection difficult in wireless networks?

  • Q : What is Add Round Key What is meant by

    What is meant by the term Add Round Key.

  • Q : Advances of LAN Security Setup Advances

    Advances of LAN Security Setup: The company should use firewall in order to separate the wireless Local Area Network. A gateway/ firewall is used in order to separate the wireless and wired networks. This helps to screen the traffic in wired network.

  • Q : Construction of S-box Explain how the

    Explain how the S-box is constructed?

  • Q : Wired equivalent privacy or WEP-LAN

    WEP (wired equivalent privacy): Wired equivalent privacy is capable of providing the same level of privacy as it is there in the wired network. The WEP makes use of a static key which both the access points and the clients know. The static key helps i