Professional Documents
Culture Documents
Task 1
Network Security threat A network security threat is something that
jeopardises the integrity of the network. Network security threats come in
many forms, varying what sort of threat they impose and what sort of
damage they can do. Some threats will simply watch your activities
where as others will steal information, upload malicious softwares or erase
important data. It is very important to know about network security
threats so you can protect your networks from them or repair and remove
any damage or intrusions that occur. Different types of threats include
viruses, eaves dropping (like wiretaps), DDoS, employees that put
information at risk whether it be through allowing unauthorised access to
information or compromising the network, unsecured vulnerabilities or
access points to name a few. When managing networks often privacy and
security is highly regarded as data can be of a sensitive nature or carry
value with it. Often unauthorised users try to piggyback on connections,
gaining free internet or network use for free, this causes network/internet
speeds to be effected as well as the network be at risk to the intruder.
Network function can also be important to the running of a business as a
whole if it is necessary to perform certain tasks. These are a few reasons
why network security threats should be understood and prevented
against.
Netwo Description of Why is it a How it effects How to
rk threat threat a reduce/mange this
Securit network threat
y
Threat
1. An attack in It bottle necks Network or Firewalls and some
DDoS which a access to connection routers can be
network/connecti networks or resources could configured to detect
on or server is connections or be vital for flooding traffic and not
sent an extreme interrupts them operations or allow it. Depending on
amount of fully making simply desired the network type the
packets. This is them unusable. to be used and connection can be
considered are not severed from the DDoS
illegal in a few accessible. source and started
countries. fresh with an
unaffected network.
2. A hacker tries to It can be to Private data is Have secure passwords
Hackin exploit network destroy data, at risk, so are for network access,
g weaknesses for steal data, any files etc on including encryption.
different simply intrude the network. Have physical locations
reasons. in a private The hacker can have security measures
network or affect how the implemented.
upload network runs
malicious too.
software
3. Monitoring of Some activities Data or Ensure no listening
Eaves network performed, activities software of the sort is
Droppin activities. such as storing performed are somehow installed in
g data could be under the eye the network, checking
storing of of a watcher for this malicious
sensitive data and this could software occasionally.
which could be result in loss of
intercepted. information of
any sort.
4. Employees who Network data Network Train employees and
Careles dont follow or access to the functioning can enforce the training,
s guidelines and network can be be effected or monitor within reason.
Employ regulations or do lost or data can be Have limitations on
ee not know them compromised. lost or stolen. certain employees so
they dont put too
much at risk.
Task 2
Task 4
Microsoft System Center Configuration Manager Software that allows for
advanced system management. SCCM is designed to allow administrators of
systems to have greater control, ensure the network remains compliant with
policies, to protect the network by reducing vulnerabilities and protecting against
threats whilst allowing users to access everything they need to be productive.
It allows features such as software deployment, software updates deployment,
remote control, network access protection, network health monitoring, software
and hardware inventory (what software and hardware are on the network and
can be distributed through the services of SCCM), operating system deployment
and patch management, all in a secure setting. SCCM can manage all devices
that access a network and deploy policies, what assets the devices can access or
have distributed to them and compliance reporting. SCCM has a service called
Endpoint Protection, which as a service provides malware protection against
known and unknown threats. It also identifies and provides remediation for
network vulnerabilities. Endpoint combines previous services into one which
allows for easier management and less resource use for multiple services. SCCM
is a strong network security tool as well as a strong tool for administrating a
network, many of the services it provides reduce attack surfaces immensely
which keeps the network safe from many threats. Some of the things that SCCM
provides management over are seen as vulnerabilities and this helps manage
them safely too.
Compliance and Settings Management
How SCCM could reduce some of the network security threats and
network vulnerabilities.
SCCM can reduce threats from viruses and malware by detection and removal
through its features, its malware protection is reported as advanced and highly
efficient. SCCMs unique management tools allow for less outside network
interaction with its software deployment features, deploying the software and
updates internally after SCCM obtains them is better than each client accessing
outside network media. SCCMs monitoring tools provides discovery of/insight
into vulnerabilities which makes it easier to remedy them. SCCMs device
management and compliance settings make it easier to detect any unauthorised
users/devices and reports on them. SCCM overall reduces the attack surface of
the network through many of its management features and services.