114061 LG 1.48 SECURITY ADMINISTRATION PROCEDURES

Email: info@saypro.online Call/WhatsApp: + 27 84 313 7407

SayPro is a Global Solutions Provider working with Individuals, Governments, Corporate Businesses, Municipalities, International Institutions. SayPro works across various Industries, Sectors providing wide range of solutions.

The following are security procedures for WAN;

  1. Encryption

The primary purpose of encryption is to protect the confidentiality of digital data stored on computer systems or transmitted via the Internet or other computer networks. Modern encryption algorithms play a vital role in the security assurance of IT systems and communications as they can provide not only confidentiality, but also the following key elements of security:

  • Authentication: the origin of a message can be verified.
  • Integrity: proof that the contents of a message have not been changed since it was sent.
  • Non-repudiation: the sender of a message cannot deny sending the message.

Network encryption (sometimes called network layer, or network level encryption) is a network security process that applies crypto services at the network transfer layer – above the data link level, but below the application level. The network transfer layers are layers 3 and 4 of the Open Systems Interconnection (OSI) reference model, the layers responsible for connectivity and routing between two end points. Using the existing network services and application software, network encryption is invisible to the end user and operates independently of any other encryption processes used. Data is encrypted only while in transit, existing as plaintext on the originating and receiving hosts.

  1. Keys

It connects your computers or other devices to your router, allowing you to receive the signal and get online. If your computer forgets or someone changes the network security key, you will be unable to access your internet-based websites, programs, and files. You very often will need it if trying to connect a new device to your network.

 

On Your Router

Often, the network security will be marked on a label on your router, and if you never changed the password or reset your router to default settings, than you’re good to go. It may be listed as “Security Key,” “WEP Key,” “WPA Key,” “WPA2 Key,” “Wireless Key,” or “Passphrase.”

You might also find this in the documentation that came with your router.

If you can’t find it on your router or in the paperwork, how you find it depends on your operating system.

On Your Computers and Devices

When you are connected to the network, your computer remembers it, and you can look in your PC to obtain the password. It’s a good idea to write it down somewhere ahead of time and keep it somewhere safe so you can easily retrieve it as needed.

  1. Logs

Logs containing information relevant to security management are generated by many sources, including:

  • Firewalls
  • Intrusion detection and prevention systems
  • Anti-malware systems, especially centrally managed solutions with aggregated reporting
  • Operating systems
  • Switches
  • Routers
  • Workstations
  • Applications

Many organizations ignore the logs until there’s a security incident.  However, preventive security measures require a daily review of information from business critical sources.  This type of review can help identify (Karen Kent and Murugiah Souppaya, NIST SP 800-92, September 2006):

  • Security incidents
    o Password hacking
    o Large numbers of login failures
    o Malware attacks
    o Port scans
    o Denial of service attacks
    o Excessive errors on network devices
  • Policy violations
  • Fraudulent activities
  • Operational problems
  • Regulatory compliance issues

The challenges to log review can be overwhelming to many businesses.  Logs are continuously growing, are located in many silos, and the staffing and skills necessary to make sense from all the information collected is unavailable.  Security Log Management helps with the process of aggregating, correlating, and reacting to information captured in logs across an enterprise.

  • Neftaly Malatjie | CEO | SayPro
  • Email: info@saypro.online
  • Call: + 27 84 313 7407
  • Website: www.saypro.online

SayPro ShopApp Jobs Courses Classified AgriSchool Health EventsCorporate CharityNPOStaffSports

Comments

Leave a Reply