StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Risk Analysis Issues - Outline Example

Cite this document
Summary
The outline "Security Risk Analysis Issues" focuses on the critical analysis of the major issues in security risk analysis. Conducting security risk analysis includes taking in the view of communication systems and equipment in networking. It involves taking an insight into the working procedure…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.2% of users find it useful
Security Risk Analysis Issues
Read Text Preview

Extract of sample "Security Risk Analysis Issues"

Conducting security risk analysis includes taking in the view of communication systems and equipment in networking. Further, it involves taking an insight into the working procedure of communications systems and the vulnerabilities of the communication network to proactively detect possible intrusion and cybercrime activities. The risk involved should be analyzed in the network with regards to cybercrime and the effects. Intrusion Detection methods suggests steps taken to curtail vulnerabilities in the system. Source determination and intrusion prevention procedures are designed as per level of threat they pose. Network security has advanced from a fascinating curiosity to a vital rather essential part of the network management activity for potential corporate users in all sectors of the economy. Successful test projects are helping an increasing number of institutions to make the shift towards incorporating security measures in their organizations. In the recent past, last decade, network security implementations have shifted the focus from the relatively small early adopters to a much larger group of organizations that use the network security to expand and comprehensively cover the networking capabilities and enhance their solicitation to their clientele. This report examines the state security implementation on an organization’s network based on the success stories and perceived benefits. It examines the objectives, background and level of detail into implementing the service. Further, the report incisively looks at the motivation for making the technological shift from wired infrastructure to wireless networking solutions and nature of the expected implementation Majority of the existing organizations, commercial and non commercial, have in the very least installed a certain security mechanism in their organizations. This comes in the form of simple firewall to a complex layered network of switches, routers etc. in a single room to rolling out large campus areas and few metropolitan area networks. Granted the continuing forecasts and advances for network technology and the pervasive use of network applications, the era for implementing tight network security in an organization is at hand. Organizations are growing increasingly concerned about security of their data, especially as the very value of their data continues to increase. This value refers to what strategic and planning information that the data can be used for. Network security has been overlooked in this rising awareness about security. It is often not possible to put a price tag on the stored data but the organization knows that it is its most valuable asset. Compromising or exposing the information can cause them pervasive damage of their brand and reputation. Organizations ought to adopt security strategies, for instance, tagging data with a level of confidentiality to make sure only those permitted have access to such data (Connolly and Begg 2009). Security strategies are designed as the overall plans to mitigate risk. As mentioned earlier, most organizations have security strategies, but miss out on network security or do not adequately address the issue. A comprehensive security strategy must lessen the overall possibility of loss or harm to an organization’s data. Furthermore, the strategy must focus on the business data concerns from a statutory, contractual and legal perspective. There exist multiple regulatory standards and requirements that have imposed on the organization to address information security risks. Contracts are making it necessary to organizations to consider security of their data at all levels. Proactive network security management and planning can save organizations significant amounts of money and reduce the overall exposure to risk. Striking a balance between the organizational objectives and security requirements is a task that squarely falls on the IT department. They are charged with developing the ICT policy for companies in consultation with management, operational support and other stakeholders. The policies aim to increase the benefits of implementing IT in business. A comprehensive support and security strategy should touch on the following areas. First, it should have a clear definition of organizational control objectives and have controls to meet those objectives. The organizational control objectives are the processes of evaluating, assigning and regulating resources on a continuous basis to meet organization’s goals. It should then have feasible approaches to meet the objectives with metrics and/or benchmark standards to manage the controls. It is also necessary to have a clear implementation of the controls and have testing and maintenance tasks while going forward. The motivation for network security strategy in an organization may come in form of a response to regulatory requirements. These requirements may be contractual and often require that the issue of network security is addressed as part of an overall security strategy. Besides this, networks have become highly targeted by attackers. A recent study by Verizon in 2009 indicates that 30 percent of breaches were against network systems followed by Point of Sale systems which in any event interact with a network. Data plays a very important role in the organization’s environment. Security has traditionally been addressed by keeping external hackers out of operating systems and networks. Focusing on security applications is a recent consideration for organizations. They are spending considerable amounts of resources adding operating system controls, policies, IDS, IPS, access controls, firewalls and other security controls to nodes on the network. These practices give the organizations the belief that they are protected. In order to have a successful network security implementation, different functional departments and divisions of a company must come together and support the effort. The already established players, companies with the technology, have IT departments that have planned and designed the process as it would be expected. Beyond the IT personnel, which is by far a critical group, various other participants – customers, management, administrators, finance – are involved directly, with the stakeholders initiating the planning process. Whereas the practical requirements of the IT personnel largely influences the decisions in issues of new technology implementation, organizations need make sure that the needs of other departments are also considered. The different factors cited as crucial in the decision to roll out the security infrastructure must reflect the concerns and reservations of different departments and stakeholders in the business process. The factors include, improved and more efficient network access, support for omnipresent network access, easier mobility for IT department and return on investment to the management of the company. Not all organizations may be able to address all stakeholders’ needs, but it is clear that having all stakeholders in the process is aesthetic. It is aesthetic in the sense that the technology will be well received by all users but only a few make the crucial decisions. Data and alert correlation in the computer network and the future of intrusion detection and prevention methods are essential in design of these solutions. It follows recommended appropriate procedures to control the threats and reduce the vulnerability of the system to lower the levels making them acceptable keeping in mind the information network and the sensitivity of data protection in this case. Computer networks have been and still are a fast growing area of interest. They are accompanied by the rising popularity and the need for multimedia applications. The potential commercial use of the networks has raised interest in the quality and service delivery that comes with the network. The ideas and knowledge of the network models developed for wired networks support the interoperability required. From the numerous researches conducted, computer networks require appropriate models, signaling protocols and other supplementary mechanisms such as policy management and queuing for congestion to ensure quality and effective routing and communication. Networks are of different types (configurations) and sizes (geographical) from the simplest to the short-lived networks that are for sure the most flexible computer networks that are in existence. They can be setup anywhere, anytime, using network equipment and stations and provide node-to-node connectivity. Quality of service in networks is of critical importance and various tools and features have been put in place to ensure quality reliability. For a stable and reliable internetwork to exist, there are several requirements that a short-lived network has to fulfill. First, all the nodes have to cooperate with each other towards the single effort of communication. Second, transfer speeds, adaptation to topology changes and power usage effectiveness have to be the same. The need for network security and the vulnerability associated with unprotected information has made many organizations reconstruct their security strategies. To begin with, networks are naturally complex. Many security personnel simply lack the background to grasp the security and risk issues related to various versions and brands of networks. This has left the network security to network administrators who spend under five percent of their task time on network security. Organizations are therefore making strategic mitigation measures. They are making sure that the network administrators have full knowledge of the network assets in the enterprise environment. Training and support of their network administrators is a strategic move to make them aware of networks, columns, and tables containing sensitive data. This takes the network administrators through legacy applications and processes of documenting data models where their properties exist. The training is aimed at equipping the network administrators with the latest technology and most importantly becoming conversant with the unique security implementation procedures of network security systems. This is because more than 90 percent of organizations support more than a single network type in their environment. In addition, to the large number of productions networks in use there are business applications running on these networks which can pose significant risk exposure by introducing additional application layer weak points. Designing a network for security Layered Architecture Design A local Area Network can consist of three main layers: the access layer, the aggregation layer, the core layer. At the access layer is where the various wired and wireless LAN connectivity for the various ip devices i.e telephones, PDAs, surveillance cameras etc. A Number of considerations factored in while implelementing the above network include: Quality of service: The various devices at the access layer should be able to identify, classify and queue traffic across the LAN to ensure there is optimal perfomance. After careful assignment and management of the various applications, there is delivery of satisfactory perfomance across the entire LAN. Since each type of data flow will have different QOS requirements i.e the stock control and sales product system Security Measures: Strict security measures should be implemented to increase the security exposures which may have serious service impacts. By implementing the firewall at the router will prevent malicious attacks from outside the network. Similarily at the access layer integrated security features will be incorporated to guard against intruders as well as other external threats i.e the DDoS attacks. An extra layer of security will be put at the access layer to ensure that the users are first authenticated and a virus check is performed on all the Pcs. This will ensure that there is end-to-end security policies which will determine who will get access what network resources as well as the QoS policies: To accommodate growth as well as new technologies, it’s advisable to use the modular chassis technology at the access layer. This technology will offer high density, high-speed ports with optional, cost-effective PoE capabilities. By employing the EX4200 Ethernet Switches.this ensures the economics of networkig by delivering the high port density of a modular chassis which is in a compact, cost-effective, pay-as-you grow platform. Each of the EX4200 Ethernet switch will support an optional front panel uplink model that will support either four Gigabit Ethernet or two 10-Gigabit Ethernet ports to facilitate the high-speed connections. Adopting Virtual Chassis Technology By employing the Virtual Chassis technology will enable the addition of as many EX4200 switches as possible to meet the increasing needs. With the pay-as-you pay model being employed, it will allow the companies start with the current EX4200 switch and incrementally add more as the firm needs grow with time. The switches at the distribution layer will be interconnected via a 128 Gbps virtual backplane. The virtual chassis technology lowers capital expenses as well as reducing operating expenses. Switch Location: By placing the switches on the second floor, it will ensure that minimal cable length will be used to connect the Pcs to the switch. By adopting the virtual chassis technology, the interconnected switches will be easily managed, monnitored, upgraded hence reducing the overall management and maintenance costs. Distribution Layer: At the aggregation layer/distribution layer where there is aggregation of the traffic flows from the multiple access layer switches hence providing the high density connectivity to the LAN core. By adopting the above connection method as illustrated in the diagram, the distribution layer switches are able to provide the scalability, high density, wire-rate ports, and high availability hardware and software features that will deliver a carrier-class reliable and robust network. By using multiple Gigabit Ethernet downlinks from access layer closet allows for redundancy. In addition, they allow for route summarization, fast convergence,load sharing and redundant paths. By using a LAN network design that includes an aggregation layer, it’s possible to increase scalability as well as high availability. High Availability: By employing the Virtual chassis technology, there is provision of high availability. Each of the switches will support redundant, load sharing, hot swappable AC and DC power supplies to ensure that the fall of one sitch doesn’t affedt the operations . Core Layer: Availability: This is the layer that provides a fabric for the high speed packet switching for the multiple aggregation devices ar the access layers. This is the gateway where all communication to the other company will take place. At the core layer will be a10-Gigabit Ethernet interface to ensure the high throughput as well as high wire-rate perfomance. With regard to high availability, the EX8200 to be deployed at the core layer ensures redundant links are provided in the event there is a link failure. The redundant routing edges and switch fabrics and redundant power supplies and fans are provided. Scalability: With respect to scalability at the core layer, the EX8200 modular switch will deliver a powerful, high density, high perfomance solution capable of upto 3.2 Tbps throughput. High Availability in the Firms Network To achieve device –level high availability, the firm need to use high-quality, carrier class network devices i.e the EX series Switches and routers which support dual power supplies, abd redundant fans or blowers that minimize equipment failure. Additional device –level HA will be provided to ensure that there is a back up device in the event of a failed device. To ensure Link-level High availability, the various business processes shall maintain vital dataflow through the internal as well as the external resources provided through the link-level HA. Network Management Network management refers to the broad subject of managing computer networks. It deals with keeping the services provided by the network up and functional. The chief intent of this task is to maximize a network’s efficiency and productivity. There are several approaches to network management; response to reported programs, scheduled maintenance and proactive monitoring. These approaches are intended to reduce the network downtime and most importantly efficiency. Network administration is a strenuous task. The administrator is often charged with many different activities, such as, network documentation, network design, management, backup and storage, troubleshooting, virus and security upgrades as well as managing users. The specific tasks of the administrator will vary slightly depending on individual situations. This could be the size of the network, number of devices, regional coverage or the technology used. Additionally, the administrator may be involved in researching hardware and software acquisitions and purchasing information. There is a variety of tools that assist the network administrators in their tasks. Faults in the network are unavoidable and maintenance is an inherent component of the administrator’s responsibilities. However, performing the maintenance in response to a reported problem is discouraged. The reported problems call for interrupt-driven maintenance tasks and can be reduced by proactively performing regular maintenance tasks. There are some common tasks in network maintenance. This include, monitoring performance, replacement or older or failed hardware, scheduled backups, configuration changes etc. The skills matrix of a network administrator is an important factor to consider in relation to the network that they are going to manage. They should have specific technical skills and thorough knowledge in the network support field. In management of the network security, choosing the best deployment method that works in an individual situation is important since each has a set of its own weaknesses and strengths. The size of the network has a lot to do in the management decision and managing a single deployment individually quickly becomes an administrative hurdle. Many Network Management Solutions (NMS) exist as available software packages to provide easy and efficient management. Network description The company network has been designed to serve the head office, main site, and two branches. The main office is located in New York city and has four departments served by this network. The branch offices, remote sites, are in Manhattan and Virginia. These sites have three departments each with between 10 and 30 employees. Manhattan is 25 miles away from the main office while Virginia is 45 miles away from the main office. This network spans a wide geogrphical area and is categorized as a Wide Area Network (WAN). In a network such as this, it should have adequate bandwidth to handle data, audio and video requirements of the users. Administration of this network will be structured in a way to sychronise maintenance tasks between the main site administrator and branch administrators. Resource and information sharing has to be well structured since each administrator manages admisssion and commision of the resources in their site. (figure. 1 Wide Area Network network topology diagram) Network management solutions offer comprehensive care to networks not only configuration management but they provide many other services. These services include performance management, system accounting, security management etc (Claise and Wolter 27). As the size of the network grows, the harder it becomes to manage and maintain thus the need for a network management solution. Remote login is among the oldest means of network management, using remote login to configure or monitor a network device. However, more sophisticated tools have been made available and currently network management is a requirement for anyone who would like to monitor and control networks. Typically network management software is based on a particular network management protocol. The capabilities provided with the software are basically based on the functionality support by the network management protocol. Most systems are not only using open protocols, but also vendor specific proprietary protocols. When selecting management software, the decision is driven by present status alerts and information to the operator, managed devices and network environment (Schwalbe 205). Evaluation of the Network Management Solutions An organization that has plans to radically expand and upgrade its existing network infrastructure by opening new branches needs a real and well designed solution. This brings out more requirements and tasks for the administrator in terms of; management, monitoring and configuration. Expansion to remote branches requires remote configuration, proactive management with backbone links to all remote sites. IT support is critical and availability of the network will be a factor for support to consider. The fact that there is existing infrastructure will affect the compatibility and setup configuration of the additional devices. For this reasons the organization needs a solution to cut across the typical installed operational platform. One that is built up a system that is not integrated and the consideration that integration costs more time and resources than available is crucial. Network Planning The complexity of the network in this firm has to be in line with their IT expertise. Recognizing the needs of the business so as not to make the network overly complex is an important step in network planning (Kurose and Ross 34). In the new design trying to standardize on a few different types of devices, as opposed to different types in every location is a good option to ensure quality of service and maximum benefits from all options. As a result, the manager has simplified configuration and easy troubleshooting efforts. The type of LAN network that could work best for the firm that is medium sized is switched LAN. This provides better, full duplex, speeds as compared to the current design, half duplex, lower speed. The star topology is the best solution for the current and future expansion plan in a small or medium sized firm. In this topology, the physical topology points out the actual connection, that will have all devices connected to a top level central point, “hub” which could be a router, switch or hub. All nodes in this topology are connected to the central device with a point-to-point connection. In terms of the data transfer, the topology will be logical, all data in this topology passes through the central device before reaching the intended destination and flows logically as opposed to the layout. Star topology gives better performance since signals are only transmitted to specific workstations. Besides this, connecting new nodes is easy. Similarly, removing a node is not technical but a matter of plugging out. Last but not least, star topology provides centralized management and helps in monitoring the network. If the current network design in the organization uses the 10Base T standard with the Ethernet access method. In essence, the Ethernet access method is retained but the standard shall be raised to 100Base T. This is the standard for switched LAN and will guarantee double speed and increased bandwidth. The physical access will use UTP cables that will span all over the network. The organization may require some infrastructural upgrades, such as, replacing the hubs with the switches. Additionally, cabling that will carry more bandwidth across the network. A server to manage the application access will be necessary in this network since the Linux network operating system will add functionality and control to the network access. Network Maintenance Network maintenance, at its essence, is doing whatever is required to keep the network functioning and meeting the business needs of an organization. The subtleties of each network should be considered when constructing a structured network maintenance model. This is considering that the list of tasks required in maintaining one network could be quite different from the list of tasks required to maintain another work. Network maintenance tasks can be categorized as; structured tasks or interrupt-driven tasks. In structured tasks approach, maintenance is performed as a predefined plan while in interrupt-driven tasks approach the maintenance involves resolving issues as they are reported. Routine network maintenance tasks help administrators in not forgetting important tasks, for example, file servers backup. Emerging networking management technologies take a very critical role in daily administration of information technology networks (Oppenheimer 2010, p. 78). An increasing number of services are being created online with large quantities of rich multimedia content; this is intended to reach the public or a group of selected users. Public networks are now essential enablers for the communication that supports every-day activities. Governments, private sector businesses and authorities are being increasingly dependent on technology supported communication and in their own internal organizations. If an organizations internet and communication infrastructure is widely spread. Their main intent would be to share information and have a platform to collaborate. This may involve remote access and private individual data exchange over public networks. I would recommend Virtual Private Networking solutions that will facilitate connecting off campus resources and onsite programs. This technology can provide secure encrypted connections so that data transmitted across will not be compromised. VPN provides access through a GUI or command line software program called VPN client. Safeco can use one of the many available VPN client software packages that will suit their type of network devices and computer systems. VPN technology has the potential of synchronizing computer network infrastructure of a company by providing a customized enterprise IP network service. The technology has the ability to support a large number of sites and requiring very little effort to configure and support. Organizations activities can be made more efficient by the flexibility provided by the VPN solution. To use the technology, VPN, each client has to acquire the required networking hardware and software support on their local computers and networks. In terms of web conferencing and resource sharing the technology provides minimal configuration and administration. This makes it easy to support the users on the network. Organizations have had to rent network capacity such as T1 lines to get a full secure remote connection to their branch offices. With this technology Safeco can use the public network infrastructure including the internet to make connections to their branch offices. This can significantly reduce the infrastructure requirements and overall cost. Running the business activities that require resource sharing and collaboration can be easily achieved in a VPN scenario. With a VPN solution, an organization can tap into multi-tenancy principle. This architecture will facilitate a single instance of software running on a server and serve multiple clients on the network (Limoncelli et al. 123). It can therefore reduce cost greatly and ease the maintenance. The administrator is only charged with the task of maintain one instance of the software and can support the clients on the secure network. The option of outsourcing needed support from a professional third-party service provider. External providers may enjoy a much lower cost of support and be in position to offer professional and technical support at better costs. In a network that has many platforms, server and client machines, there is the possibility of having hardware and software incompatibilities. The suggested technology provides an independent platform and eliminates this hurdle. VPN will facilitate communication between the devices and interoperability. For instance, users on a Windows XP platform can web conference with users on a Linux operating system platform. VPN technology can be deployed inside and outside the network. The focus and purpose would be to harmonize data and resource sharing securely. It would build user confidence by providing secure access to resources from the remote sites (Claise 70). Electronic mail users are confident in accessing their data and any other restricted information. Conclusion Traditionally, while computer networks and telecommunications have greatly changed our options on what and how we communicate, by facilitating mobility, comfort and accessibility. However, we need to be aware of measures to secure how information as it flows in the network. Works Cited Claise and Wolter. Network Management: Accounting and performance strategies, San Francisco: Cisco Press, 2007, Print. Clemm, A. Network management fundamentals, San Francisco: Cisco Press, 2006, Print. Limoncelli, T, Hogan, J and Chalup, S .The Practice of system and network administration, Boston: Addison-Wesley Professional, 2001, Print. Mani, S. Network management: Principles and practice, Boston: Addison Wesley1999, Print.Oppenheimer, P. Top-down network design, New York: John Wiley and Sons, 2010, Print. Schwalbe, K. Information technology project management, Massachusetts: Course Technology, 2005, Print. ScienceLogic LLC (SL). EM7 Meta-Appliances: Integrated Systems, Network & Application Management, Boulevard: Author, 2008. Hopper, A. et al. .Local area network design International computer science series, Addison-Wesley :Redwood, 1986, Print. Karris, S. Networks: Design and Management, Orchard Publications: New York, 2009, Print. Mikalsen, A and Borgesen, P. Local area network management, design and security: A Practical approach, Wiley :New York, 2002, Print. Freebersyser, A. and Macker, J,. Realizing the Network Centric Warfare Vision: Network Technology Challenges and Guidelines. Defense Advanced Research Agency, 2009. Endorf, C. Scultz, E. & Mellander, J. Intrusion Prevention and Detection. California, CA: Brandon Nordin, 2006, Print. Peiravi, A & M. (2010). Internet security. Journal of American Science, 6,17-19. Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Security Outline Example | Topics and Well Written Essays - 4250 words”, n.d.)
Retrieved de https://studentshare.org/information-technology/1393798-network-security
(Network Security Outline Example | Topics and Well Written Essays - 4250 Words)
https://studentshare.org/information-technology/1393798-network-security.
“Network Security Outline Example | Topics and Well Written Essays - 4250 Words”, n.d. https://studentshare.org/information-technology/1393798-network-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Risk Analysis Issues

Security Administration and Management

These methods of analysis are useful but do not provide the complete story.... rom our analysis, by focusing on differentiation strategies in the security industry, Securitas AB success can be attributed to its vast experience in the market, product differentiation, and assorted brands.... Securitas AB by using its trademark experience and know how both product differentiation and cost leadership strategy means the company has a focus strategy, focusing on cash on transit and other security system....
14 Pages (3500 words) Essay

Security and Risk Managment

It is interesting to note that the government has adopted four core strategies for dealing with the management and control of risk.... There is a high risk involved in the lives of the people living in the UK due to the terrorist activities and this risk...
14 Pages (3500 words) Essay

Security & Risk Management

The need for the understanding of risk The studies of risk perception and risk management have resulted in the development of different psychological models of risk perception.... These models play an important role in understanding the behavior of the people toward risk and their reactions.... This is followed by another brief discussion on risk perception which provides the base for the paper....
9 Pages (2250 words) Essay

Risk Assessment

The risk assessment undertaken will help in the assessment of all the participants.... The management of Hewlett-Packard undertook this risk assessment to meet the requirement of risk management ISO 27005 in order to perform an extensive assessment of the system.... The participants involved in the risk assessment include: Jack Philips, Hewlett-Packard chief IT officer who reviewed the safety of the entire report after completion....
30 Pages (7500 words) Essay

Security and Risk Management

security risk Management is part of the Risk management process.... security risk management in industrial establishments has been increasingly considered as a part of the risk management strategies.... security risk Management is a part of Risk management Process.... analysis of the macro environmental factors relating to the business through PESTLE analysis (Political, Economical, Social, Technological, Legal and Environment) would be useful in firming up the companies' strategies with regard to security and risk management....
8 Pages (2000 words) Literature review

Similarities and Differences between Security Risk Management

risk analysis: Assessing uncertainties beyond expected values and probabilities.... The paper "Similarities and Differences between security risk Management" states that the outcome of both assessments provides recommendations that maximize the protection of confidentiality, integrity and availability while providing usability and functionality.... Running head: Similarities and differences between security risk management and security threat security ...
10 Pages (2500 words) Coursework

Security and Risk Management Issues

risk analysis and the Security Survey.... risk analysis in loss prevention research.... security risk management is applied to vast extends of the nation from hospitals, police department, government to marine and homeland security.... itigating security risk entails reliable information to allow the security personnel perform efficiently.... There are different types of risks that are identified by the security risk management system (Fink, 1986)....
10 Pages (2500 words) Assignment

Security Roles Analysis

Therefore, in order to ensure that the financial sector players do not fall back to this security risk into the future is through the establishment of a security function (Federrath & Gollmann, 2015).... ?security risk management body of knowledge.... Thus, in order to ensure that an organisational security system is well equipped and ready to handle emerging issues, the recruited and selected security manager should posses the relevant ICT skills, The possession of these vital skills are an imperative in ensuring that the manager is able to prepare key security systems such as the CCTV monitoring systems among others in an organisation....
13 Pages (3250 words) Research Proposal
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us