COLLEGE OF TECHNOLOGY
SEC 6040 WEEK 3
Week – Reading Summary
In this week, I focused on chapters 3 and 5. In chapter 3, I read about network defense and its importance in a system. Network defense can be guaranteed through a focus on the common vulnerabilities and exposures standard. This ensures that potential vulnerabilities that pose a threat to the network security are pointed out early enough and relevant defense strategies adopted. Through analysis of the common vulnerabilities and exposures standards, an organization is able to determine the relevant standards for information sharing and enables the system resources to act in collaboration in the detection of potential network attacks. Network traffic can also be monitored using network monitors and packet sniffing to detect any problems or vulnerabilities in the system.
In chapter 5, I focused on the importance of protecting data from unauthorized access by intruders or other unauthorized personnel. The security of such data can be achieved through the adoption of relevant .These methods were explained in length and the scenarios in which they can be applied. The chapter was very relevant since in the modern day, there are numerous threats to data security. Lack of proper security to data from an organization may result in the infringement of the privacy and confidentiality of customers. Overall, the two chapters provided a learning opportunity to enable dealing with threats to network defense and methods of protecting access to data.