Get help with any kind of project - from a high school essay to a PhD dissertation
Network Security Concepts File safety falls into two classes, access and encryption. Access to documents can mean physical access to a computer with unsecured documents or access via user permissions or privileges in the form of access control lists (ACLs) (Strengthen Your Users' File Security, 2003). The documents stored on a server with NTFS storage may be secured to prevent anyone who doesn't have the right permissions from launching them. This is secure but may be bypassed with physical access to an open computer and should not be used for sensitive information. Another method of procuring files is by encrypting the information in the documents with an Encrypting File System (EFS), which employs public key encryption privileges (Strengthen Your Users' File Security, 2003). A firewall prevents access to a internal system in the outside the company through the internet on any open ports. A firewall may also prevent internal system users from accessing certain online sites which could be harmful or offensive (Shay, 2004). The firewall acts at the OSI model's layers three and four by searching packets for certain types of headers (Shay, 2004). So, firewalls differ from file security because anyone within the business may theoretically access files behind the firewall, while file security provides internal security against a company's own workers. Symmetric and asymmetric encryption differ from each other in that with symmetric encryption, the same key is used for both the encryption and decryption process. With asymmetric encryption, the keys are in pairs but aren't the same, and one is used for encryption and another for decryption (Matuszek, 1999). Symmetric encryption is simple and faster than asymmetric encryption, with the.