{"id":33,"date":"2024-03-24T18:37:56","date_gmt":"2024-03-24T18:37:56","guid":{"rendered":"https:\/\/student.wp.odu.edu\/tburc011\/?p=33"},"modified":"2024-03-24T18:37:59","modified_gmt":"2024-03-24T18:37:59","slug":"eportfolio-entry-10","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/tburc011\/2024\/03\/24\/eportfolio-entry-10\/","title":{"rendered":"eportfolio entry #10"},"content":{"rendered":"\n<p>Creating Secure Network Architectures: To protect against cyberattacks, engineers create secure network architectures with several tiers of defense. This entails putting into practice concepts like least privilege, network segmentation, and access control to restrict the exposure of important assets and lower the attack surface.<\/p>\n\n\n\n<p>Putting Data Protection and Encryption into Practice: Engineers use encryption technologies to safeguard data while it&#8217;s in transit and at rest, making sure that private information is kept safe from prying eyes. Data transmissions over networks are encrypted by encryption protocols like Secure Sockets Layer (SSL) and Transport Layer Security (TLS), and stored data is protected from compromise by encryption algorithms and cryptographic techniques.<\/p>\n\n\n\n<p>How Intrusion Detection and Prevention Systems (IDPS) Are Deployed: Engineers use IDPS to monitor network traffic, identify suspicious activity, and react instantly to possible security events. Advanced algorithms, signature-based detection, and anomaly detection techniques are used by IDPS solutions to detect and lessen the effects of malicious activity, including malware infections, intrusion attempts, and denial-of-service (DoS) attacks.<\/p>\n\n\n\n<p>Putting Access Control Mechanisms into Practice: Within cyber networks, engineers create and put into practice access control mechanisms to regulate user privileges, verify identities, and enforce security regulations. By limiting unauthorized access to network resources, applications, and data, access control technologies\u2014like firewalls, authentication protocols, and role-based access control (RBAC)\u2014avoid malevolent actors from breaking into the network and jeopardizing confidential data.<\/p>\n\n\n\n<p>Conducting Penetration Testing and Vulnerability Assessments: To find flaws and vulnerabilities in cyber networks and systems, engineers regularly carry out penetration tests and vulnerability assessments. Through proactive detection and remediation of security vulnerabilities, engineers can reduce the likelihood of malevolent actors exploiting them and enhance the network&#8217;s overall security stance.<\/p>\n\n\n\n<p>Putting Security Policies and processes into Practice: To guarantee adherence to industry norms, legal requirements, and organizational security goals, engineers create and implement security policies, processes, and best practices. In order to foster a culture of cybersecurity knowledge and accountability within the company, engineers set defined policies for security controls, incident response procedures, and staff training.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Creating Secure Network Architectures: To protect against cyberattacks, engineers create secure network architectures with several tiers of defense. This entails putting into practice concepts like least privilege, network segmentation, and access control to restrict the exposure of important assets and lower the attack surface. Putting Data Protection and Encryption into Practice: Engineers use encryption technologies &hellip; <a href=\"https:\/\/student.wp.odu.edu\/tburc011\/2024\/03\/24\/eportfolio-entry-10\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">eportfolio entry #10<\/span><\/a><\/p>\n","protected":false},"author":26349,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/tburc011\/wp-json\/wp\/v2\/posts\/33"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/tburc011\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/tburc011\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/tburc011\/wp-json\/wp\/v2\/users\/26349"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/tburc011\/wp-json\/wp\/v2\/comments?post=33"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/tburc011\/wp-json\/wp\/v2\/posts\/33\/revisions"}],"predecessor-version":[{"id":34,"href":"https:\/\/student.wp.odu.edu\/tburc011\/wp-json\/wp\/v2\/posts\/33\/revisions\/34"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/tburc011\/wp-json\/wp\/v2\/media?parent=33"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/tburc011\/wp-json\/wp\/v2\/categories?post=33"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/tburc011\/wp-json\/wp\/v2\/tags?post=33"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}