Discussion on network security – Voice and data communications.

In any discussion about network security — which includes protecting both the voice and data communications — there is always some mention of “ports.”

Discussion on network security – Voice and data communications.

6.3 Module 6 Discussion Read Chapters 20 and 21 Anderson, R. (2008). Security Engineering (2nd ed.). Hoboken, NJ: John Wiley & Sons. In any discussion about network security — which includes protecting both the voice and data communications — there is always some mention of “ports.” By this, we do *not* mean deep-sea harbors (which are my favorite!), of course, but the “holes” made in the firewall so that some communication protocols can pass through. It is not intended for you to get too deep technically on this topic, but it is an item of importance. Plus, there is uncertainty whether 100% of everyone fully understands what significance ports play in a networked environment.

Discussion on network security – Voice and data communications.

So, let’s discuss that… specifically, what do you do (or should you do) as it pertains to ports and securing an environment? When responding to this topic, it is important to consider the context of ports, services, and protocols. If you are involved in network security, explain your approach. And related to this, what is the best rule … Shut everything off, then allow the services you need *or* turn everything on and shut off the bad stuff? By the way, if you do need a quick link that identifies some of the ports and services, check out: Service Name and Transport Protocol Port Number Registery (iana.org)
For your papers use Times New Roman, 12-point font. The page layout should employ one-inch margins, double-spacing, and left justification.

Discussion on network security – Voice and data communications.

If section headings are used, make sure they are bolded, italicized, or both. While most papers are not formal, they are to be professional. Use a spell-checker, and proofread carefully to ensure proper usage of syntax, punctuation, wording, etc. Ideally, have someone else proofread your papers.
Please write essays and papers using the third person format. When stating something that you think, use: “The author thinks….” rather than “I think…” This usage can take a while to master but it soon becomes second nature; the reader would assume it is the author’s opinion as determined by the writing style. Similarly, do not refer to the reader as “you.” As an example, rather than say “When using this program, you would use the Tools menu,” try something like “When using this program, the user would use the Tools menu.”

Additional Files

order now with paypal
Powered by WordPress