Course Code - OSEI-041
Course Code - OSEI-041
Maximum Marks : 20
discharge their daily duties by using the tools and services provided by the
modify/add information on the network. What are the elements that help us
SOLUTION
connected network infrastructure from the core to the edge of the network
hardware to:
● Protect the network, its infrastructure and all its traffic from external
cyberattacks
● Protect all IT assets and resources available via the network from
unauthorized access
Some of the most common threats to network and computer systems are:
● Malware
● Spyware
● Adware
● Computer worms
● Botnets
● Trojan horses
An IT security policy identifies the rules and procedures for all authorized
the principle document for network security. Its goal is to outline rules for
Employees today often use several tools and applications to conduct business
and focuses on safely enabling these tools for employees. Enforcement and
Enforcement
Enforcement concerns analyzing all network traffic flows and should aim to
“CIA” triad:
Strong enforcement strives to provide CIA to network traffic flows. This begins
vehicle for content, all applications must first be identified by the firewall
use to a user identity while inspecting the content at all times for the
security, prescribing for the network to be secured in layers. These layers apply
These layers are built through the deployment of firewalls, intrusion prevention
network security.
Providing CIA of network traffic flows is difficult to accomplish with legacy
technology. Traditional firewalls are plagued by controls that rely on ports and
technology; they observe all traffic across all ports, can classify applications and
their content, and identify employees as users. This enables access controls
add-on components. IPS and antivirus, for example, are effective tools for
must be cautious of the complexity and cost that additional components may
add to network security and, more importantly, not depend on these additional
SOLUTION
Application layer is the top most layer in OSI and TCP/IP layered model. This
with user and user applications. This layer is for applications which are
A user may or may not directly interacts with the applications. Application
layer is where the actual communication is initiated and reflects. Because this
layer is on the top of the layer stack, it does not serve any other layers.
Application layer takes the help of Transport and all layers below it to
information to the Transport layer. The transport layer does the rest with the
every user application can be put into Application Layer. except those
programs.
On the other hand, when we use a Web Browser, which is actually using Hyper
Text Transfer Protocol (HTTP) to interact with the network. HTTP is Application
Layer protocol.
Another example is File Transfer Protocol, which helps a user to transfer text
based or binary files across the network. A user can use this protocol in either
GUI based software like FileZilla or CuteFTP and the same user can use FTP in