Professional Documents
Culture Documents
Running Head: Network Protection 1
Running Head: Network Protection 1
Network Protection.
Students Name:
Professors Name:
Date.
NETWORK PROTECTION 2
standard internet of sharing and communicating with different computing devices to enhance
information flow from one person to another. This communication can be permitted within or on
gadgets running on software or hardware configured differently on them. This technology is used
in making internet management tools to identify and even locate other devices (Maggio, 2017).
A simple network management protocol can recognize and monitor network activities while
SNMP exists in three deferent versions. These versions are differentiated based on their
protocols and the strength of security they provide. SNMPV1 the version of SNMP. It has the
weakest security strength of all the three versions. They are used by managers to share data that
is not usually encrypted with agents hence raising the security threats of the data in question
(Oroz, 2016). It deploys the use of default credentials and strings to provide data security. As for
SNMPVc2, it is much more security effective than SNMPv1. It operates on a 64-bit OS, unlike
SNMPv1 that only works on 32-bit OS. Its security strength has been enhanced by the use of
The third SNMP version is the SNMPv3, which is more efficient and has up-to-date
standard network security features. It possesses complex upgraded features that permit or
supports the SNM engine ID locator that can distinguish deferent SNMP entities used (Maggio,
2017). I provide security in two main modes, that is encryption and authentication. Importantly
to understand is that the three versions can be distinguished using the security features each
poses. In a nutshell, SNMPv1 uses only community string to secure a network, whereas
SNMPv2 uses inform and strings to confer network protection. As for SNMPv3 is combines both
References
Maggio, A. (2017, December 14). SNMP v1, v2c and v3 on Cisco Devices Explained -
introduction/
Oros, D. (2016, July 26). Network Basics: What Is SNMP and How Does It Work? Retrieved
from https://www.auvik.com/franklymsp/blog/network-basics-what-is-snmp/
Payne, C. (2018, July 20). What is SNMP and is it Secure? Retrieved from
https://www.advancedcyber.co.uk/it-security-blog/what-is-snmp-and-is-it-secure