StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Security - Research Paper Example

Cite this document
Summary
This research paper "Network Security" could perfectly demonstrate that during the last few decades several technologies have emerged additionally throughout the whole globe and networking technology is certainly the most amazing achievement in this era. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.6% of users find it useful
Network Security
Read Text Preview

Extract of sample "Network Security"

ID # Network Security Introduction During the last few decades several technologies have been emerged throughout the whole globe and networking technology is certainly the most amazing achievement in this era. Additionally, the innovations in computer and networking fields have open new ways for the businesses to boost their performance. New systems are being developed to effectively handle and administer corporate working and activities. However, security has become a complex assignment for current network administration. Normally, attackers enter into a network by making use of different tools and technologies. In this regard, network security comprises the measures a company can take to protect its computer network, and it is a prime concern for every company that uses computers. On the other hand, if a company does not implement appropriate network security then an attacker or opponent can get access and utilize the important or secret data and information, probably causing data destruction or damage, or even the entire destruction of the computer network. In addition, the revolution of internet has modernized our lives. However these technologies as well have introduced some of the severe safety as well as confidentiality problems. These issues can be tremendously devastating for private information. In this scenario network management systems and procedures are used for the effective management of various aspects regarding network security (Kaminsky and Foster; Armoni; Kaminsky and Foster; Bhattacharya and Ghosh). This paper will present a detailed overview of network security, network security policy, importance of network security policy, its implementation and design considerations for network security. At the moment, network security is a hot topic for the organizations as well as individuals. This research is aimed to highlight technology involved in network security, future trends of network security, companies adopting this issue, regulatory issues in network security and global implications. Network Security Policy The security policy is essentially an arrangement, describing in detail the organization’s decisive resources as well as how well they are organized. Additionally, the basic purpose of building a security policy is to offer the employees with a concise summary of the "satisfactory utilization" of some of the business information and resources. In addition, the intention behind this policy is to proficiently describe the allowable rights of users and consequently employing them in protecting the business sensitive and critical information systems. The security plan behaves like a "must interpret" basis of company information for everybody exploiting in some approach, computer and network resources considered as possible targets. However, a high-quality and superbly established security policy ought to tackle a number of these subsequent fundamentals: (Danchev; Kim, Lee and Han; Bakry) How susceptible business data must be managed How passwords and other credentials have to be upheld effectively How to react to a possible safety event, interruption efforts, etc. How to utilize computers as well as internet technology in a safe way How to suitably exploit the business communication infrastructure On the whole, the prime causes following the formation of a safety policy is to set a business’s sensitive data and information security basics. Another aspect is to clarify to employees how they are liable for the security of business resources and assets, and emphasize the significance of taking benefit from protected business communications when the business activities are being conducted through web based technology (Danchev; Kim, Lee and Han; Bakry). The Need of Network Security Policy Since forming a high-quality security policy offers the basics for the flourishing application of security allied activities in the upcoming period. In this scenario, the initial movement in improving a business’s security is the performance of a specific however applicable security policy of the business. The purpose of this policy is to inform the business staff on the diverse features of their tasks, broad utilization of business’s resources and clarifying that how susceptible business out to be managed. In addition, the business security policy will as well express fully the implication of suitable utilization, as well as defining illegal tasks and responsibilities (Danchev; Kim, Lee and Han; Bakry). Moreover, the improvement and the suitable accomplishment of a business security policy is extremely valuable as it will not just turn all of the business employees into members within the business’s work to protect its sensitive data exchange however as well facilitate to lessen the threat of a possible security violation by "people-issue" errors. These are typically aspects for example exposing business sensitive information to unknown or illegal users and the timid or offensive exploitation of web based framework and a lot of additional risky tasks inside the business environment (Danchev; Kim, Lee and Han; Bakry). Implementation of Security Policy The moment network security policy is all prepared, modified, restructured and accepted, the application procedure will start. However, this is typically more difficult than the formation of business network security policy on its own, because of the reason that at this phase businesses as well require teaching and informing their employees to perform in a "safe" way and accept every core fundamentals mentioned inside the official network security policy of the business (Danchev; Kim, Lee and Han; Bakry). The ultimate description of the network security policy has to be accessible to all the business human resources who are eligible to access some of the business information resources. In addition, a good implementation of network security policy needs not just teaching personnel about every core element declared as dangerous within the official network security policy, however as well altering their responsibility in an attempt to defend business decisive data and sensitive information from illegitimate exploitation (Danchev; Kim, Lee and Han; Bakry). Design Considerations of Network Security The moment we consider network security aspect, it should be ensured that the entire networking structure is protected. Additionally, the network security is not only related to the safety of computer systems at every point of the network communication boundaries. However, during data transmission the communication medium should be secure enough to avoid any vulnerability. Network hacker or cracker would target the medium of communication, get the secret or confidential data, decode it and may introduce some wrong message into the original one (Daya; Ray). Protecting the network environment is as imperative as defending the computer systems as well as encrypting or encoding the transferrable content. In order to maintain optimal security, the subsequent aspects should be recognized inside the network security design model: (Daya; Ray) 1. Access: This aspect highlights that only legal clients or users are offered the ways to correspond inside a network environment. 2. Secrecy: It is the vital aspect in network security design consideration, and it states that business data and sensitive information inside the network should be kept secret. 3. Verification: This aspect ensures the genuineness of users working inside the corporate or business network 4. Reliability: This aspect guarantees that message contents have not been altered during transmission or transit. 5. Non?repudiation: This aspect declares that the computer user or client is not able to deny that he/she utilized the network or its resources. Moreover, an efficient network security arrangement is designed with the consideration of security problems, possible attacks, required dimension of security, as well as factors which offer vulnerability to network attacks (Daya; Ray). Technology involved in Network Security The basic purpose of implementing network security is to defend business critical data, information, devices for instance server machines, routers, DSL modems switches, etc from the illegal use and it has turned into the main alarm of the small and large sized businesses all through the globe to deploy a network security system. Network security comprises various tools and techniques such as intrusion detection, user authentication, firewall, network sniffing, encryption, security policies and physical protection and so on. In this scenario, a network security manager must know about the widespread security and confidentiality matters. In addition, the most common forms of network security attacks are password attacks, IP spoofing, packet sniffers, DOS Attacks as well as the automated sharing of the business critical data and sensitive information to the outside companies. This section presents discussion on various security technologies that can be used to protect a computer network: (NetworkTutorials; Daya; Ray; Turban, Leidner and McLean). Anti viruses Diverse anti viruses programs exist in the marketplace like Symantec, McAfee, Avira, G-Data Panda and Trend Micro that offer solutions to virus programs and these programs are called as antivirus programs. In this scenario, Norton offers a lot of security software. For instance, Norton 360 product is a comprehensive program package which offers antivirus, anti-phishing, anti-spyware email scanning, firewall security, identity security, backup and reinstate and automatic updates capabilities and enhancements (NetworkTutorials; Daya; Ray; Turban, Leidner and McLean). Firewall Firewall is a committed suite of software or hardware technology which cleans the network messages on the basis of internet protocol address, policy and other conditions. However, it is implemented on the gateway computer system to secure the network arrangement from the outside threats for example hackers’ as well as illegal utilization of corporate resources (NetworkTutorials; Ioannidis, Keromytis and Bellovin). VPN (Virtual Private Network) A VPN connection technology defends business sensitive information among the users systems and business server machine. After this arrangement the communication done is considered to be decoded and legitimate thus VPN technology offers protected network transmission (NetworkTutorials; Daya; Ray; Turban, Leidner and McLean). Cryptography Cryptography is application of concealing business sensitive data and information by making use of the encryption and decryption techniques. In addition, various systems’ passwords, automated teller machine (ATM) card numbers and e-commerce technology proficiently make use of the cryptography algorithms to conceal business actual data and confidential information (NetworkTutorials; Daya; Ray; Turban, Leidner and McLean). Encryption It is a security method wherein data is transformed into a coded format which could not be accessed or understood by the illegal users across and over the network. Additionally, there exist diverse methods which are utilized to encode or encrypt business imperative data flow with the help of software product. In addition, the additional integrated influence of encryption technique is regarded as the data compression feature. Therefore encryption is an outstanding technique of securing the communication and imperative business data and information (NetworkTutorials; Daya; Ray; Turban, Leidner and McLean). Password Authentication Password authentication is a safety method which is implemented to validate network as well as web based users. In addition, the PAP transfers ASCII format passwords on the network and thereafter network server machines authenticate these passwords. Moreover, approximately all the network operating systems or NOS are compatible with PAP technology (NetworkTutorials; Daya; Ray; Turban, Leidner and McLean).  Figure 1Network Security Structure, Image Source: http://www.agileit.com/PublishingImages/Microsoft-Network-Security-Audits-San-Diego-SAS70-SOX-PCI.jpg IP Sec IP Sec is a network security method which operates over the network layer and is utilized for sending the susceptible information on the un-trusted networking environment. By means of the IP sec, secret business information is able to be safely passed on over the internet (NetworkTutorials; Daya; Ray; Turban, Leidner and McLean). SSL SSL is an abbreviation of secure socket layer. SSL makes use of the cryptography techniques (public as well as private specific length key encryption) to encode the data.  However, SSL is regarded as a protocol which is utilized to effectively administer safety of the transferred communication over web based framework (NetworkTutorials; Daya; Ray; Turban, Leidner and McLean). Digital Signature Digital signature is the form of electronic signature which is implemented to validate the identity of the transmitter of communication. In addition, digital signatures can be time-marked as well as can be utilized with some sort of communication irrespective of its encrypted format (NetworkTutorials; Tidd and Heesacker). WEP WEP is an abbreviation of Wired Equivalent Privacy. It falls in the category of 802.11 wireless network security standards.  Additionally, the basic purpose of WEP is to offer protection to the wireless networks. In addition, it is utilized with wireless networking environment. In this scenario, WEP offers security by encoding the information into the radio waves. Moreover, it works on the Layer 2 and Layer 3 of Open System Interconnectivity (OSI) paradigm (NetworkTutorials; Daya; Ray; Turban, Leidner and McLean). Future trends in network security The network security discipline is making progress in the real world. In this scenario, various security techniques are being utilized with the integration of biometric recognition. In view of the facts that biometrics offers a much better technique of verification than offered through the passwords techniques. Thus, this aspect may perhaps deeply lessen the illegal admittance of business protected computers. Additionally, latest technology for instance the smart-card is developing within research in the field of network security. In addition, the software feature of network security is extremely active. Continuously latest technology based firewalls and encryption or encoding mechanisms are being practiced (Daya; PatroklosArgyroudis, McAdoo and Toner; Lacey). The initial implementers of network security technology have mainly been the banking sectors as well as business domains, intimately practiced through the ITeS and BPO business areas. Additionally, the corporate users are an imperative target marketplace as an extensive level of insightful data and business decisive information along with electronic commerce dealings are done over some sort of internet or company’s network environment. Moreover, at the moment network security based products possess an inspiring and rising collection of individual-point safety solutions to various companies, varying from easy verification methods to complete identity administration. However, taking benefit from network security based aspects is hard because characteristics as well as physical layout of network are the prime issues. Furthermore, the possession limitations and lawful controls and it's tough to set up a collection of block points from network data packets could be checked or restricted to enter the network (Daya; PatroklosArgyroudis, McAdoo and Toner; Lacey; Mukherjee). The department of BFSI remained the principal implementer of network security based solutions during the year 2009, tackled intimately by service suppliers and the management domain. Additionally, the management activities are a mostly profitable marketplace intended for information safety business as they are top listings of extremely secret business data and vital information. In the upcoming era of information technology, corporations will have fun with protecting IP telephony as well as alliance technologies which were installed without appropriate network security selection, for instance Voice over IP as well as incorporated interactions configuration. Furthermore, improved practice of business mobility as well as Web based functions are augmenting the approval of network security devices market inside the area with the extensive implementation of social-networking and cloud computing technologies and implementations by various companies across the globe (Mukherjee; Lacey). Example of companies involved in this Network Security Lots of companies like that Coactive Networks, Juniper networks, Netilla networks, AirTight Networks etc, are worried with network security problems. In this scenario, Cisco is considered as one of the prime companies in the network security field. Additionally, along with the latest technologies, Secure Borderless Network design offered by Cisco has its great significance. Despite that, the retailer has as well publicized an AnyConnect Secure Mobility Solution that proficiently incorporates operational performance over the Cisco AnyConnect Secure Mobility Client. Considering the latest developments, the business initiated imperative improvements to its cloud security operational environment during the year 2010. In 2009, Cisco attainments integrated PostPath that is the source of e-mail in addition to calendaring product. Jabber, a contributor of existence and communication products; plus Tidal Software, a facilitator of solutions regarding data-center domains (JazTech; Mukherjee). Figure 2Top Network Security Companies, Image Source: http://voicendata.ciol.com/images010/touchingnew'stopplayer_june2k10.jpg Moreover, Fortinet, an organized contestant, has come out like the universal manager of UTM marketplace. This year, the retailer established a contribution for the Wireless LAN marketplace in network security. FortiAP is a protected project group WLAN policy and it has the power to work in combination with FortiGate that is a multi-threat safety application. Additionally, it is acting like the useful access-point controller to offer a particular networking environment which merges wireless networking technology through incorporated network security (JazTech; Mukherjee). Considering the network security issues Juniper network stated the OEM conformities with Dell Inc to provide networking technological solutions with the name of Dell's PowerConnect. And through International Business Machine (IBM) to re-vend Juniper's Ethernet networking solutions also offers capabilities for data-center clients of IBM business. As well, they joined in a corporation with Nokia Siemens Networks to offer and re-vend dual level Ethernet solution providers (JazTech; Mukherjee). Regulatory issue in Network Security Security and confidentiality do not come under the management domains. There exists a vital need for the private region to apply accessible, self-regulatory rules. Additionally, the managements will need to cooperate with business and recommend discovering suitable network security solutions to cyber-crime issues which may not be tackled sufficiently through the private region in business environment. In this scenario, an imperative assignment is to augment consciousness at all the levels of people inside administration, within the private regions, and inside social culture. In addition, one thing that is required is the consciousness of security offenses those are performed within cyber-world and the potential actions beside them. In the end, and conceivably most imperative, it is critical that businesses establish a community agreement regarding the appropriate as well as ethical exploitation of computer systems in various domains of business (WikiBooks; Shelly, Cashman and Vermaat; Moteff). The Counterfeit Access Device and Computer Fraud and Abuse Act of 1984 (P.L. 98-473, Title II, §2102(a), 18 USC 1030, as amended) comprise policies related to the illegal access to system a national offense. Such as, it is an offense to intentionally get illicit right of entry to a private centralized computer system utilized by or for the national administration. In this scenario, the function and tasks of a variety of national or federal sectors and organizations inside the domain of computer and network security are comparatively precise. Moreover, NIST and OMB are held answerable for defining rule and establishing security standards, and for managing the accomplishment of those specific rules and standards, focusing on the majority of national or federal management’s information systems and networking environment (WikiBooks; Shelly, Cashman and Vermaat; Moteff). In most cases, the national administration does not control the safety of non-administrative computer and information systems. Conversely, the national government needs valuable information detained on non-administrative arrangements to be secluded beside illegal access as well as revelation, mostly out of confidentiality contemplations. However, in any case 3 vital problems can occur regarding these functions and tasks: (WikiBooks; Shelly, Cashman and Vermaat; Moteff) The role that national management plays in controlling the state’s secretly owned and working decisive business information communications The imperative functions of the Department of Homeland Security and the National Security Agency in defining rules and standards intended for computer networks security as well as telecommunication systems management decisive framework information The imperative function of the National Communication System as well as National Cyber Security Division in defining rules and standards intended for managing the private area Global implications of Network Security Considering the various aspects of network security, since global passage has forever grown to business standards with the view to network reliability, business network security agreement facilitates to attain the innovative dimensions of United States network security paradigm being recognized in domains of "decisive communications" for instance telecommunications, energy exploitation, shipping and economic structures. Additionally, it is seen that companies’ employees regularly use social networking web sites during their working hours thus security problems are complicated here. In addition, a recent research conducted by Cisco business advocates that workers are constantly facing information technology security regulatory issues in an attempt to get access to the business information by means of unconfirmed campaigns and practices. In this scenario, the changing business network security framework is developing since boundary less networking platform is raising. Additionally, the unconfirmed practices are not just employed in the business working location however as well in cloud computing platform. Thus, unconfirmed practices and devices are turning out to be more than a problem for IT security setting; on the other hand severe regulatory issues have a pessimistic influence on recruiting and keeping human resources. In this scenario, security is stability between an optimistic user practice as well as having admittance to business sensitive data across the corporate (Global Crossing; Daya; Mukherjee; NetworkTutorials). Conclusion Networking technology is certainly the most amazing achievement in this era. Additionally, the network security has become a challenging job for the companies. Normally, network security encompasses rules and regulations and measures a company can apply to protect its computer network, and it is a prime concern for every company that uses computers. In addition, if businesses do not implement appropriate network security then some hackers or business competitors can get access and make use of the important or secret data and information, which could result in data destruction or damage, or even complete destruction of the computer network. This paper has presented a detailed overview of network security, network security policy, importance of network security policy, its implementation and design considerations for network security. This paper has highlighted the technology involved in network security, future trends of network security, companies adopting this issue, regulatory issues in network security and global implications. Works Cited Armoni, Adi. "Data Security Management in Distributed Computer Systems." Informing Science 5.1 (2002): 19-27. Bakry, Saad Haj. "Development of security policies for private networks." International Journal of Network Management, Volume 13 Issue 3 (2003): 203-210. Bhattacharya, Somak and S. K. Ghosh. "An intelligent search technique for network security administration ." International Journal of Artificial Intelligence and Soft Computing, Volume 1 Issue 2/3/4 (2009): 338-351. Danchev, Dancho. Building and Implementing a Successful Information Security Policy. 2010. 08 May 2011 . Daya, Bhavya. Network Security: History, Importance, and Future. 2010. 08 May 2011 . Global Crossing. RAISING THE BAR FOR NETWORK SECURITY . 2011. 15 May 2011 . Ioannidis, Sotiris, et al. "Implementing a distributed firewall ." Conference on Computer and Communications Security Proceedings of the 7th ACM conference on Computer and communications security . Athens, Greece : ACM New York, NY, USA , 2000. 190 - 199 . JazTech. Network Security Policies. 2011. 11 May 2011 . Kaminsky, A and Niki Foster. What is Network Security? . 30 January 2011. 07 May 2011 . Kim, Geon Woo, et al. "Security policy specification for home network ." International Journal of Ad Hoc and Ubiquitous Computing, Volume 4 Issue 6 (2009): 372-378. Lacey, David. The future of network security . 31 January 2008. 09 Mayy 2011 . Moteff, John. Computer Security: A Summary of Selected Federal Laws, Executive Orders, and Presidential Directives. 16 April 2004. 13 May 2011 . Mukherjee, Madhura. A promising future for Network Security Services . 09 June 2010. 10 May 2011 . NetworkTutorials. Introduction to Network Security Technology. 2007. 09 May 2011 . PatroklosArgyroudis, et al. "Analysing the Security Threats against Network Convergence Architectures ." IAS '07: Proceedings of the Third International Symposium on Information Assurance and Security . IEEE Computer Society Washington, DC, USA, 2007. 241-246. Ray, Ramon. Technology Solutions for Growing Businesses. New York: American Management Association (AMACOM), 2004. Shelly, Cashman and Vermaat. Discovering Computers 2005. Boston: Thomson Course Technology, 2005. Tidd, Ronald R. and Gary Heesacker. "Digital Signatures and Certificates." CPA Journal 78.5 (2008): 60-61. Turban, Efraim, et al. Information Technology for Management: Transforming Organizations in the Digital Economy . New York: Wiley, 2005. WikiBooks. Legal and Regulatory Issues in the Information Economy/Cybercrimes. 20 December 2006. 11 May 2011 . Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Security Research Paper Example | Topics and Well Written Essays - 3250 words”, n.d.)
Retrieved from https://studentshare.org/family-consumer-science/1420972-network-security
(Network Security Research Paper Example | Topics and Well Written Essays - 3250 Words)
https://studentshare.org/family-consumer-science/1420972-network-security.
“Network Security Research Paper Example | Topics and Well Written Essays - 3250 Words”, n.d. https://studentshare.org/family-consumer-science/1420972-network-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Security

Major Importance of Network Security

Full Paper Title Name University Network Security In a world where information flows incessantly, companies usually spend a lot of in their endeavor to attain secure computer systems, including servers, firewall and security software, in addition to other areas of computer security such as the physical space and the rules of access.... The most popular Network Security appliance that is used in almost every small or corporate network to provide security is a firewall....
5 Pages (1250 words) Research Paper

Network Security Best Practices

From the paper "Network Security Best Practices" it is clear that Regular maintenance of a network is vital to its security.... To ensure impeccable Network Security, comprehensive analysis and exploration of the entire network need to be conducted.... Network Security is balanced art.... hellip; Based on the best practices for a secure network listed above, a company should then review and update its security policy.... The document should never be considered complete, as threats are continually adapting, and in this way, so should the security policy....
8 Pages (2000 words) Essay

Computer Network Security

The prime purpose of the paper "Computer Network Security" is to discuss patch management issues that frequently update security patches on systems.... Secondly, configuration management also plays an essential role in ensuring security for mission-critical aviation applications.... All the identified attack interfaces must be addressed by taking the following factors into consideration (Mitigating security threats by minimizing software attack surfaces....
4 Pages (1000 words) Essay

Network Security Assignment

Security policies provide roadmap to the IT staff that is planning Network Security implementations and identifies acceptable use of organizational resources; more so, it acts as a security contract with employees This paper makes a conclusion that all employees of the organization should adhere to the following policies of the company.... security on them other hand refers to the measures.... hellip; According to the report information security entails the adoption of specific measures that are supposed to prevent the unauthorized access, manipulation, use or the denial of access to any data, information, or capabilities that will ensure confidentiality....
9 Pages (2250 words) Assignment

Network Security Planning

Furthermore, Network Security planning also aims at… This is made possible through developing additional security design aspects that are inevitable for the enhancement of control, visibility, and general safety Network Security planning Introduction Network Security planning entails developing best practices and measures for protecting the network infrastructure.... Furthermore, Network Security planning also aims at developing a strong foundation where more advanced security measures, techniques, and methods can be subsequently established....
2 Pages (500 words) Research Paper

Network Security Questions

When installations are done based on the default settings of the system, there is no regard for Network Security and the default configuration is not reset.... The second cause is by setting configuration properties that… For example, when the IP addresses, and the subnet mask and the DNS server addresses do not have any connection, the network services cannot be supported. Botnet are pieces of malware, which infect victims by contacting Assignment, Computer sciences and Information technology Network Security Questions Question How to mitigate Configuration WeaknessesIn order to mitigate the weaknesses with network configuration, the first step is to identify the causes....
2 Pages (500 words) Assignment

Network security infrastructure

Without proper Network Security measures, many individual, government agencies and business enterprises risk losing their data. Network Security is basically a process by Network Security INFRASTRUCTURE By: Network Security Infrastructure Recently, theuse of the Internet has continued to grow exponentially.... Without proper Network Security measures, many individual, government agencies and business enterprises risk losing their data....
2 Pages (500 words) Essay

Network Security Assessment

As a consultant of assessing the Network Security for a large… Network scanning on the other hand is the process of identifying any active networks either to attack or assess them.... As a consultant of assessing the Network Security for a large organization, I must undertake various methodologies and use various tools in this assessment.... This type of scanning makes use of a software that looks for flaws in the database, testing the system for such flaws and coming up with a report on the same that is useful in tightening the security of the system....
2 Pages (500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us