0% found this document useful (0 votes)
27 views4 pages

Network Security Lab Guide

Uploaded by

nursyuhadah1609
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views4 pages

Network Security Lab Guide

Uploaded by

nursyuhadah1609
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

BITS3353 NETWORK SECURITY ADMINISTRATION AND MANAGEMENT: LAB

WEEK 1

NAME: NURSYUHADAH BINTI AHMAD SUDERMAN


MATRIX NO: B032310114

Overview of Network Security Administration and Management

Instructions:
1. Solve the below given question after watching the given YouTube Video’s URLs
below. The answer may be in this video.

URLs:

https://www.youtube.com/watch?v=nXFgPGOPgaM
https://www.youtube.com/watch?v=UJEwjGB1lk0
https://www.youtube.com/watch?v=432IHWNMqJE
https://www.youtube.com/watch?v=ni-ByB4XGmI
https://www.youtube.com/watch?v=hWIgXS9utLM

1. Define Information Security as well as highlight TWO (2) benefit of it to the user.

Information security refers to the practices and processes designed to protect


data and information systems from unauthorized access, use, disclosure,
disruption, modification, or destruction. It ensures confidentiality, integrity, and
availability of information.

Two Benefits to the User:

 Protection from Data Breaches: InfoSec helps safeguard personal and


sensitive information, reducing the risk of identity theft and fraud.
 Trust and Privacy: Proper information security practices protect the
user's privacy, enhancing trust in online transactions and
communications.

1| P a g e
2. Explain on CIA and why we need to be more concerned on CIA.
Tips: Give the definition and highlight the importance of CIA in our daily life.

The CIA Triad stands for Confidentiality, Integrity, and Availability, three
core principles of information security

 Confidentiality: Ensures that sensitive information is only accessible to


authorized individuals. This prevents data breaches and unauthorized
access.

 Integrity: Guarantees that data is accurate and unaltered by unauthorized


parties. It protects the trustworthiness of data.

 Availability: Ensures that authorized users have continuous access to


information and resources when needed, preventing disruptions.

Importance of CIA: In our daily life, we rely on technology for communication,


banking, shopping, and more. Protecting confidentiality, integrity, and
availability of information ensures that sensitive personal data remains secure,
transactions are accurate, and services are always accessible.

2| P a g e
3. List FIVE(5) computer security terminology and explain on ALL of it.

 Encryption: The process of converting information or data into a code to


prevent unauthorized access. It is essential for securing sensitive information
in transit and at rest.
 Malware: Short for "malicious software," malware is software designed to
disrupt, damage, or gain unauthorized access to computer systems. Examples
include viruses, worms, and trojans.
 Phishing: A type of cyberattack where attackers impersonate legitimate
institutions to trick individuals into providing sensitive information, like
passwords and credit card numbers.
 Vulnerability: A weakness in a system or network that can be exploited by
attackers to gain unauthorized access or perform malicious actions.
 Two-Factor Authentication (2FA): An additional layer of security that requires
not only a password and username but also something that only the user has
on them (e.g., a physical token or mobile device) to verify their identity.

3| P a g e

4. Define firewall as well as highlight TWO (2) benefit of it to the user.


Firewall: A firewall is a network security device or software that monitors and
controls incoming and outgoing network traffic based on predetermined security
rules. It serves as a barrier between a trusted internal network and untrusted
external networks.

Two Benefits to the User:


 Protection Against Unauthorized Access: Firewalls help block unauthorized
users from accessing your network, reducing the chances of cyberattacks.
 Traffic Monitoring: Firewalls monitor network traffic, allowing the user to
detect and block malicious activity in real-time.

5. In case your get attacked by CyberAttacker. What steps might be taken to defense
against attacks?

 Update and Patch Systems: Ensure that all operating systems, software, and
applications are updated with the latest security patches to close any
vulnerabilities.
 Enable Firewalls and Antivirus: Use firewall protection to block unwanted
access and antivirus software to detect and remove malicious threats.
 Backup Data: Regularly back up important data to ensure that it can be
restored in case of a ransomware attack or data loss.
 Use Strong Passwords and 2FA: Implement strong passwords and enable
two-factor authentication to reduce the risk of unauthorized access.
 Incident Response Plan: Establish and follow an incident response plan to
identify, contain, and mitigate any attack as quickly as possible.

4| P a g e

You might also like