StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Major Importance of Network Security - Research Paper Example

Cite this document
Summary
The paper "Major Importance of Network Security" describes that the functionality includes the detection of attacks that are initiated directly towards the network. Moreover, the firewall tries to identify as many events as possible and therefore generates logs…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.3% of users find it useful
Major Importance of Network Security
Read Text Preview

Extract of sample "Major Importance of Network Security"

? Full Paper Network Security In a world where information flows incessantly, companies usually spend a lot of in their endeavor to attain secure computer systems, including servers, firewall and security software, in addition to other areas of computer security such as the physical space and the rules of access. In this respect, owning the latest technology of software protection and operating system monitoring software are not very efficient if a malicious employee can access critical information on the system and divulge it off the premises of the workplace. Hence, security of a system is an integral package of restriction of physical and virtual access to the system. Security requirements have substantially changed recently. Traditionally, securing a system was provided by preventing access (physical and ethically) to the secure system. However, with the introduction of computer technology, there was a need to develop automated security appliances for protecting the network and data of an organization. Due to vast rise in threats, vulnerabilities, hacking and cyber crimes, firewalls become mandatory as the first choice to implement for securing the network and data for every computer network. Firewalls Computer Security is the general term for a set of resources designed to help protect data and ruin the efforts of hackers. Moreover, it is a set of measures to protect data during transmission over a set of interconnected computer systems. Hence, security is a set measures for deterrence, prevention, detection and correction of security threats that can damage or divulge information either locally or when transmitted. Hence, certain security mechanisms that are designed to detect, prevent and restore security after an attack. Consequently, many network appliances are invented to secure a network. The most popular network security appliance that is used in almost every small or corporate network to provide security is a firewall. Firewall is defined as “a combination of hardware, software, and procedures that controls access to an intranet. Firewalls help to control the information that passes between an intranet and the Internet. A firewall can be simple or complex, depending on how an organization decides to control its Internet traffic. It may, for example, be established to limit Internet access to e-mail only, so that no other types of information can pass between the intranet and the Internet” (Firewall.2007). Firewalls are network security devices that are categorized in hardware-based firewalls and software-based firewalls. The hardware-based firewalls are more secure, as they are not dependent on the operating system. On the other hand, software-based firewalls are dependent on the operating system that may demonstrate risks. The choice from these options depends on the cost as well. However, a full features firewall may protect the computer network from hackers or cyber criminals. It will detect, block and quarantine viruses and malicious codes that tries to enter in the network. Moreover, configuration on the local area network demonstrates a graphical user interface to ensure that each preventive measure is active and running (Agnitum outpost persona firewall pro 2.0.2004). Benefits Constant monitoring of security is achievable via a firewall implementation. As all modifications and logs are stored in a firewall, that are divergent of distribution on hosts on the network. Firewall also provides the protocol-filtering capability as it filters protocols and services associated with them in order to secure them from exploitation. Moreover, firewall hides inbound communication of the network from the outbound network that is also called a wide area network (ADVANTAGES OF FIREWALL). Furthermore, the use of computer networks and communication lines require protecting data during transmission. In addition, firewalls also provide centralized management for the network. This is an ultimate advantage for the network security staff within an organization as the management and configuration of the overall network is possible by accessing a device. Security and access policies can also be configured centrally on the device, as the firewall is the first point of contact for data packets before making their presence to the inbound network of an organization. Facilitating Network Administration and Configuration Network administrators or security specialists conduct the administration and configuration of a firewall. Later, these concerned personnel monitors and modify changes as per the requirements of business processes and policies of an organization. The features of a typical firewall facilitates security specialist with a great extent. Many products in the market are designed to offer more than one WAN port connections as they are categorized in low bandwidth usage and high bandwidth usage. Consequently, administrators can connect a lower bandwidth connection in the low bandwidth usage port and high bandwidth connection can be used to connect high profile users who require high bandwidth Internet connectivity. As two connections can be terminated on the firewall, load-balancing features are also achievable. Moreover, if any connection from the two mediums goes offline, the firewall switches the traffic on the other medium that is operational resulting in efficient WAN network connectivity (Soho firewalls.2002). Supports Packet Filtering Furthermore, firewalls are integrated with proxy servers to provide an optimum level of security for the network. Although, some configuration procedures are mandatory to follow in order to establish firewall security based on configurations. A typical packet filtering firewall is required. The packet filtering firewalls judge the behavior of each packet and then verifies the rule base that includes exceptions and firewall security policies in order to deny or grant permission to a particular data packet. After receiving a data packet, the firewall will determines whether the packet requires proxy filtering. Consequently, firewall plays a role as a dynamic filter on a control channel linking the application layer and the proxy layer. This combined security mechanism significantly amplifies security for the network (Nelson, 1998). Acts as a Circuit Level Gateway Firewall also operates as a circuit level gateway. As per network dictionary, it is defined as “A circuit level gateway is sometimes described as a second generation firewall. It is a fast unrestricted passage through the firewall based on predefined rules maintained in the TCP/IP kernel.” The architecture of a circuit level gateway analyzes handshaking of packets in a data communication channels or sessions on the network, to verify whether the channel is genuine or not. The traffic is filtered by analyzing rule base on the arrival of each packet. Moreover, circuit level gateway provides enhanced security by hiding particulars of workstations that have established a remote session from any computing device outside the network. The computing device outside the network will receive only the gateway address i.e. the firewall. Acts as an Application Gateway As per network dictionary, application gateway is defined as “Application Level Gateway (ALG), also known as Application Layer Gateway, is a type of gateway that consists of a security component that augments a firewall or NAT employed in a computer network. It allows legitimate application data to pass through the security checks of the firewall that would have otherwise restricted the traffic for not meeting its limited filter criteria”. The application gateways are also categorized as software-based firewalls. These types of firewalls provide advantages in terms of securing a personal computer located at home from hackers and intruders. Moreover, application gateway also facilitates parents to incorporate parental controls for children. These firewalls provide in depth level of security and access control for the organizations. Likewise, these firewalls do not allow granting permission to any data packet related to COM and EXE extensions. In addition, to provide enhanced security, the firewall does not allow direct session of data communication with any node on the inbound network. Consequently, application gateway firewall protects the network of an organization with viruses, malicious codes, Trojans, unauthorized access and denial of service attacks (ADVANTAGES OF FIREWALL). Advanced Firewalls named as Intrusion Detection Systems Currently there are two conventional methods to detect threats and vulnerabilities on the network i.e. anomaly based IDS and signature based IDS. The signature based IDS analyze and identify specific patterns of attacks that are recognized by raw data that is in terms of byte sequences called strings, port number, protocol types etc. Likewise, apart from the normal operational pattern, signature based firewall detects any activity that is unusual from previously defined patterns. Moreover, the patterns are monitored with strict control algorithms. The signatures are stored in a signature repository. The prime object of a ‘signature based IDS’ is to search signatures in order to detect a threat or vulnerability that is similar to antivirus software that also detects viruses. The functionality includes the detection of attacks that are initiated directly towards the network. Moreover, firewall tries to identify as many events as possible and therefore generate logs. The detection engine compares predetermined rules in order to deny or accept packets. The rules are categorized in two domains i.e. Chain headers and Chain options. The structure of a signature contains the following attributes: Identification number, Messages and Rules. This particular firewall adds optimal levels of security as it concentrates on network activities constantly. Work Cited ADVANTAGES OF FIREWALL Retrieved 5/4/2011, 2011, from http://www.scribd.com/doc/22594454/ADVANTAGES-OF-FIREWALL Firewall. (2007). Bloomsbury Business Library - Business & Management Dictionary, , 3113-3113. Agnitum outpost persona firewall pro 2.0. (2004). District Administration, 40(2), 68-68. Soho firewalls. (2002). PC Magazine, 21(1), 29. Nelson, M. (1998). Two faces for the firewall. InfoWorld, 20(41), 1. Circuit level Gateway/Firewall. (2007). Network Dictionary, , 99-99. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Firewall Technology (Network Security) Research Paper”, n.d.)
Retrieved from https://studentshare.org/family-consumer-science/1420503-firewall-technology-network-security
(Firewall Technology (Network Security) Research Paper)
https://studentshare.org/family-consumer-science/1420503-firewall-technology-network-security.
“Firewall Technology (Network Security) Research Paper”, n.d. https://studentshare.org/family-consumer-science/1420503-firewall-technology-network-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Major Importance of Network Security

The Importance of Digital Security

Network Threats Routers, switches and firewalls make up the infrastructure of network.... The paper aims the importance of digital security.... … Organizations are at a greater risk and more prone to digital security threats than individuals, as hackers find it more rewarding breaching their security boundaries.... The most essential need of every single organization is the digital security.... Most importantly, the effective internet security has become a dire need for any kind of organization, small, medium or large which use the information technology and web based services to carry out their work in an easy and effective manner....
14 Pages (3500 words) Essay

Network Security

It examines the importance of network security in organizations and the importance of protecting data.... The author gives a large overview of Jackson, Chris "Network security auditing", Harrington Jan "Network security: A Practical approach", Douglas Comer “Computer Networks and Internets” and other works on the topic of network security.... It helped narrow down my understanding of network security by providing me direction and grounds to be open minded and also recognize facts from fiction in network engineering....
18 Pages (4500 words) Annotated Bibliography

Network Security and Its Business Impact

This essay presents network security which has become a major issue in the business world.... nbsp;The importance strategically of this work is that the integrated network security for wired and wireless network will help the college in securing valuable data, improving network systems performance, protecting networks from internal and external threats, to enable higher availability and accessibility to the network.... Thus, the need of the hour is to identify the security loopholes and develop security policies especially for environments where the wired and wireless networks co-exist....
8 Pages (2000 words) Essay

Network Security & Applications

hellip; Additionally, at present a lot of people get chances to work from home and connect to systems distantly, in this regard network security becomes a significant subject for the companies.... Additionally, at present a lot of people get chances to work from home and connect to systems distantly, in this regard network security becomes a significant subject for the companies.... Thus, this is very important to train the basic computer users and information systems manager in mind, teaching the ideas required to read through the hype in the marketplace and recognize threats associated with the computer security and how to cope with them (network security, 2010; Curtin, 1997)....
1 Pages (250 words) Research Proposal

Wireless Network Security

This paper "Wireless network security" has presented an overview of various security aspects of wireless networks.... These days wireless networking has become an attractive trend and the professionals in all over the world are adopting wireless network security with advance trends and new features in order to protect their networks from various security threats.... Thus, the wireless network security is a major issue that is to be considered while establishing wireless networks (Weber and Bahadur; Makker)....
8 Pages (2000 words) Research Paper

Data Privacy and Security

hellip; This essay discusses that at the present computer security has become a very critical issue.... security refers to the technique to discover as well as stop illicit utilization of our secret information or computer.... However, at the present computer security has become a very critical issue.... Additionally, security refers to the technique to discover as well as stop illicit utilization of our secret information or computer....
8 Pages (2000 words) Research Paper

Privacy-Enhancing Security Mechanisms

There exist many privacy enhancing security mechanisms that ensure secure delivery of data to the intended location.... In this paper, we will discuss the technique to design a reliable and efficient privacy-preserving scheme in order to ensure increased security of data over the network.... Problem Statement The problem statement for the research paper is: "Design and analysis of privacy-preserving network and cryptographic protocols" Conceptual Framework Aim of the Research In realistic networked environments, data security is the main focus of the management....
3 Pages (750 words) Research Proposal

Threats and Methods to Secure a VoIP Network

ike with any new technology, in the early days of VOIP, there were no serious concerns about security related to its use.... As VOIP is gaining wide acceptance and becoming one of the mainstream communication technologies, security has become a major issue.... Network Administrators are finding themselves in a tough position of providing their clienteles with the security and reliability that they have grown accustomed to over these years.... he threats to security and privacy could be in the form of DOS (denial of service), malformed messages, sniffing, spoofing, vishing, VOIP spam and SPIT (spam over VOIP)....
17 Pages (4250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us