The devices designed for the purpose of addressing security in the network generate a number of...

50.1K

Verified Solution

Question

Programming

The devices designed for the purpose of addressing security inthe network generate a number of logs during the continuousmonitoring of the network. Discuss in detail the different types oflogs created and how the security professional can use thisinformation for analysing security in the network.

Answer & Explanation Solved by verified expert
3.9 Ratings (473 Votes)
Network Security Controls The list of security attacks is very long and the news media carry frequent accounts of serious security incidents From these you may be ready to conclude that network security is hopeless Fortunately that is not the case Previous chapters have presented several strategies for addressing security concerns such as encryption for confidentiality and integrity reference monitors for access control and overlapping controls for defense in depth These strategies are also useful in protecting networks This section presents many excellent defenses available to the network security engineer Subsequent sections provide detailed explanations for three particularly important controlsfirewalls intrusion detection systems and encrypted email Security Threat Analysis Recall the three steps of a security threat analysis in other situations First we scrutinize all the parts of a system so that we know what each part does and how it interacts with other parts Next we consider possible damage to confidentiality integrity and availability Finally we hypothesize the kinds of attacks that could cause this damage We can take the same steps with a network We begin by looking at the individual parts of a network local nodes connected via local communications links to a local area network which also has local data storage local processes and local devices The local network is also connected to a network gateway which gives access via network communications links to network control resources network routers and network resources such as databases These functional needs are typical for network users But now we look again at these parts this time conjuring up the negative effects threat agents can cause We posit a malicious agentcall him Hectorwho wants to attack networked communications between two users Andy and Bo What might Hector do Read communications The messages sent and received are exposed inside Andys machine at all places through the network and inside Bos machine Thus a confidentiality attack can be mounted from practically any place in the network    See Answer
Get Answers to Unlimited Questions

Join us to gain access to millions of questions and expert answers. Enjoy exclusive benefits tailored just for you!

Membership Benefits:
  • Unlimited Question Access with detailed Answers
  • Zin AI - 3 Million Words
  • 10 Dall-E 3 Images
  • 20 Plot Generations
  • Conversation with Dialogue Memory
  • No Ads, Ever!
  • Access to Our Best AI Platform: Flex AI - Your personal assistant for all your inquiries!
Become a Member

Other questions asked by students