StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Security Fundamentals, Security Threats, and Issues - Case Study Example

Cite this document
Summary
As the paper "Network Security Fundamentals, Security Threats, and Issues", the Internet is a huge network of networks, as well as for reason that its basic design is intrinsically insecure and unsafe. Data and information are often distributed all the way through the network as apparent text…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
Network Security Fundamentals, Security Threats, and Issues
Read Text Preview

Extract of sample "Network Security Fundamentals, Security Threats, and Issues"

?NETWORK SECURITY FUNDAMENTALS, SECURITY THREATS, AND ISSUES Network Security Fundamentals, Security Threats, and Issues Affiliation Date 3.1. Network Firewalls Security consists of tools, technologies, measures and laws used to ensure the safety of resources. At the present, security has become one of the biggest issues outlined by information technology firms and business organizations which connect their domestic Local Area Networks (LANs) and Wide Area Networks (WANs) to the Internet. In view of the fact that the Internet is a huge network of networks, as well as for the reason that of its basic design is intrinsically insecure and unsafe. In addition, data and information (in the form of communication) are often distributed all the way through the network as apparent text (for instance it is not twisted or encrypted). Additionally, using the Internet it is also simple to imitate someone else as they are online. On the other hand, there is at the moment a great deal of suspicion on the subject of internet security, however an excellent information is that we have a wide variety of tools and technologies accessible which can ensure the maximum security of our network against illegal interruption (McConnell, 2004). Normally, the use of a firewall is associated with the Internet. In fact, with the growing popularity of the Internet, the term “firewall” is a great deal more frequently employed in computer networks. Similar to the firewalls that are used in buildings and homes, computer firewalls take steps as a fence between computers on a network. A firewall is critical for the companies that use a computer network or for individuals with a stable connection to the internet (for instance through cable or DSL). In addition, in the absence of a firewall, any unauthorized person on the network would possibly be able to access, wipe out, and move around to the files or data and information stored in our computer. A firewalls can be both either a hardware oriented or software oriented. Basically, they work with a variety of tools and filters that are designed to continually keep an eye on traffic flowing in the network. In this scenario, whenever a data packet is sent or received one of the filters, tops it from moving through with the intention of preventing damage. Certainly, in some cases firewalls also block the required transmission, and throughout a frequent practice of alteration, the filters can be tailored to enhance their effectiveness (Wynn, 2012) Moreover, a firewall encompasses a wide variety of associated applications and tools, installed at a network gateway server, which ensures the security of the resources (data, information, and other resources) of a private network from outside users or people from other networks. Additionally, the network firewalls also refer to the security policies that are utilized with the applications and programs. In addition, a business organization having an intranet that facilitates its staff members to get access to the extensive Internet usage makes use of a firewall to stop unauthorized people from getting access to its own confidential data and information resources as well as for keeping an eye on what other resources its own users are able to access. In this scenario, a firewall works directly with a router program, which determines the characteristics of each network packet to decide whether it should be allowed to move toward its target or not. Additionally, a firewall also encompasses or can be installed on a proxy server that formulates network requests in support of terminal users. In some cases, a firewall is installed in a specifically selected computer that is other than the remaining network with the intention that no received requests or queries can reach openly at confidential network resources (Rouse, 2007). At the present, organizations are able to choose from a wide variety of firewall solutions. In fact, there are numerous firewall transmission techniques and tools. In this scenario, one well-known technique is to monitor requests and queries in an attempt to confirm that they approach from suitable (formerly recognized) domain name as well as Internet Protocol (IP) addresses. In addition, for mobile users, firewalls offer remote access in to the private network through protected logon method and validation certificates. At the present, many software organizations offer a wide variety of firewall products. Some of the well-known characteristics of these firewalls comprise automatic alarms at specified thresholds of attack, logging and reporting, and a graphical user interface for managing the process of the firewall (Rouse, 2007). Keeping in mind a number of advantages offered by the firewall I will recommend our business organization to install these firewalls on proxy and the network server. In this way our business will be able to save itself from any illegal access and loss. 3.2. Virtual Private Networks (VPNs) A Virtual Private Network (or simply VPN), is a computer network (or sometimes called separate networks) combined jointly through over a public network specifically, the internet. A virtual private network is based on a public telecommunication framework that is known as the Internet. The basic purpose of this network is to allow remote offices or individual users to securely access their company’s network. Additionally, a virtual private network can be compared to a luxurious system of personally owned or leased lines that are simply licensed to be used by one company. In this scenario, a virtual private network provides the company with the same services and capabilities, but at an affordable price. In addition, individuals can make use of a VPN to get access to network resources and organizations can make use of them to establish connection among distant data centers, while they are not actually a part of the LAN (local area network), or as a way of encrypting and securing their data transmissions when they are making use of an insecure public network. In this scenario, when a user connects to a VPN, they frequently initiate a VPN client on your computer (or want to access or open a link of a particular website), log in with their particulars and their computer transfers confidential and authorized keys with a remote server. In addition, once these particulars have been verified and authenticated by both the computers, all of their internet communication and data are encrypted and secured from eavesdropping. Moreover, an organization must keep in mind that a VPN secures your computer's internet connection to make sure that all of the communications and data transmission whether they are sending and receiving are encrypted and secured from illegal access and use (Henry, 2012; Rouse, virtual private network (VPN), 2007). In this paper we have discussed two most important techniques to secure internet communications. Our company should use both these techniques in order to ensure the secure communication. First of all, they should form a virtual private network and then install a firewall on each network server. In this way, we will be able to attain the maximum security. References Henry, A. (2012). Why You Should Start Using a VPN (and How to Choose the Best One for Your Needs). Retrieved November 22, 2012, from http://lifehacker.com/5940565/why-you-should-start-using-a-vpn-and-how-to-choose-the-best-one-for-your-needs McConnell, B. (2004). What Are Firewalls and Do I Really Need One? Retrieved November 22, 2012, from http://telecom.hellodirect.com/docs/Tutorials/Firewalls.1.040899.asp Rouse, M. (2007, May). firewall. Retrieved November 22, 2012, from TechTarget.com: http://searchsecurity.techtarget.com/definition/firewall Rouse, M. (2007, May). virtual private network (VPN). Retrieved November 20, 2012, from TechTarget.com: http://searchenterprisewan.techtarget.com/definition/virtual-private-network Wynn, L. S. (2012). What are Firewalls? Retrieved November 22, 2012, from WiseGeek.com: http://www.wisegeek.com/what-are-firewalls.htm Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network security fundamentals, security threats, and issues Case Study”, n.d.)
Network security fundamentals, security threats, and issues Case Study. Retrieved from https://studentshare.org/information-technology/1462567-network-security-fundamentals-security-threats-and
(Network Security Fundamentals, Security Threats, and Issues Case Study)
Network Security Fundamentals, Security Threats, and Issues Case Study. https://studentshare.org/information-technology/1462567-network-security-fundamentals-security-threats-and.
“Network Security Fundamentals, Security Threats, and Issues Case Study”, n.d. https://studentshare.org/information-technology/1462567-network-security-fundamentals-security-threats-and.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Security Fundamentals, Security Threats, and Issues

Information Security

McFarlane (2010) asserts, “There is no doubt that network administrators are today dealing with much more sophisticated network and computer security threats than they did a few years ago”.... Fundamental Issues in network security Introduction Before going into the discussion regarding fundamental issues in network security, let us get a better understanding of what network security actually is and why is it important in the present world....
5 Pages (1250 words) Research Paper

Network Security & Applications

security threats.... Additionally, at present a lot of people get chances to work from home and connect to systems distantly, in this regard network security becomes a significant subject for the companies.... Additionally, at present a lot of people get chances to work from home and connect to systems distantly, in this regard network security becomes a significant subject for the companies.... Thus, this is very important to train the basic computer users and information systems manager in mind, teaching the ideas required to read through the hype in the marketplace and recognize threats associated with the computer security and how to cope with them (network security, 2010; Curtin, 1997)....
1 Pages (250 words) Research Proposal

Network Security setup

The necessary security measure here is installation of updated anti-spyware and antivirus.... In order to ensure security at this domain, it is recommended to ensure proper addressing schemes, proper protocol selection and enhanced encryption of communication equipments.... security measures necessary at this stage is proper authentication, quality network design, authorization, node security, and accounting are an imperative security considerations at this domain....
7 Pages (1750 words) Research Paper

Network Security Principles

As discussed above to deal with network security threats and an organization must implement an effective security policy.... network security PRINCIPLES network security Principles Author Author Affiliation Date network security is a set of rules and regulations that a business organization must follow in order to protect its computer system.... At the present, network security is a major concern for each business in which computers are utilized to a great extent....
3 Pages (750 words) Essay

Network Security

Overview of network security fundamentals, Security Threats, and Issues Whenever a network is connected to the Internet it is potentially subjected to attacks from malicious programs such as viruses, Trojans, and spyware.... The non-malicious “attacks” usually come from users and employees who are not trained on computers or are not aware of various computer security threats.... network security is not only about the WAN (Wide Area Network) but also the LAN (Local Area Network), as the two go hand in hand....
3 Pages (750 words) Case Study

Case Study: Solution to Network Security

The author claims that network security has become a major concern.... The repeated occurrence of similar security breaches like misuse of email suggests that most organizations have failed to tackle network security.... A company that processes credit card transactions must raise its profile of network security to survive in the business.... Therefore, computer hardware and software, policies and procedures necessary for developing layers for network security should be designed to defend the systems of the company....
5 Pages (1250 words) Case Study

Network Security Fundamentals

The paper "network security fundamentals " discusses that the company and the CISO need to adopt a plan that should ensure tighter information security for the customers.... Overview of network security fundamentals, security threats, and issues The medium-sized credit card company needs to employ several mechanisms to ensure its customers and their private information remains safe and confidential.... network security fundamentals Cyber-criminals careless users, disgruntled former and current employees present major challenges in handling network security especially the experts that target the system with aim of disrupting the normal company operations....
5 Pages (1250 words) Essay

Fundamentals of Network Security

The paper "Fundamentals of network security" discusses that a combination approach towards computer forensics is proposed to comprehensively as well as effectively gather facts for processing of information regarding the allegation of the employee for a possible crime.... As a result network security is increasingly becoming an issue of significant importance in the world of today.... Here the importance of network security becomes paramount which has to be managed proactively....
15 Pages (3750 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us