StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Network Security - Case Study Example

Cite this document
Summary
The Internet has become a staple of the business world today It is because of this that a company should remain continually up to date with the latest security measures.Vulnerabilities due to designs flaws,poor security management can contribute to the loss of company assets…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
Network Security
Read Text Preview

Extract of sample "Network Security"

Download file to see previous pages

The Internet has become a staple of the business world today It is because of this that a company should remain continually up to date with the latest security measures. Vulnerabilities due to designs flaws, poor security management, incorrect implementation, and malicious intent can all contribute to the loss of company assets. Therefore, it is paramount to implement a comprehensive security plan urgently. With carefully planned countermeasures and strict security, the odds of a successful intrusion can be minimized greatly.

Overview of Network Security Fundamentals, Security Threats, and Issues Whenever a network is connected to the Internet it is potentially subjected to attacks from malicious programs such as viruses, Trojans, and spyware. Network security is not only about the WAN (Wide Area Network) but also the LAN (Local Area Network), as the two go hand in hand. It is possible to not only have an external attack but also an internal one too. The moment any form of computer device becomes network capable or dependent of some form of network function, there is a given need for protection to safeguard the flow of information to and from the said device on a given network whether public or private or from a trusted to non-trusted source.

The problem with locking down a network tightly is the administrative overhead it creates. The more secure the network becomes the greater the need is for a team to administrate this. There has to be a fine balance between the two whilst still safeguarding the network and the information it contains. Attackers generally have motives or goals—for example, to disrupt normal business operations or steal information. To achieve these motives or goals, they use various methods, tools, and techniques to exploit vulnerabilities in a computer system, or security policy and controls.

Threats can originate from two primary sources: humans and nature. Human threats subsequently can be broken into two categories: malicious and non-malicious. The non-malicious “attacks” usually come from users and employees who are not trained on computers or are not aware of various computer security threats. Malicious attacks, however, usually come from non-employees or disgruntled employees who have a specific goal or objective to achieve. Due to the harmful nature and repercussions on malicious attacks, security should be specifically focused on this area.

The most prevalent and common forms of malicious attack are viruses, Trojan horses, worms, password cracking, denial-of-service attacks, e-mail hacking, impersonation, eavesdropping, and intrusion attacks. Using up-to-date equipment and technology and enforcing a comprehensive security plan, attacks such as those mentioned above can be prevented and denied. (Bhatnagar, 2009). Proper equipment and maintenance are vital to the consistency of the network security. In a continually advanced technological landscape, security measures need to adapt to threats accordingly.

Methods such as the use of firewalls and Virtual Private Networks will help keep a network stable and secure. Detailed Network Security Recommendations A firewall is the first line of defense for your network. A firewall can be a hardware device or a software application and generally is placed at the perimeter of the network to act as the gatekeeper. There are four mechanism used by firewalls to restrict traffic. One device or application may use more than one of these in conjunction with each other to provide more in-depth protection.

The four mechanisms are packet filtering, circuit level, gateway proxy server, and application gateway. An established internal network should

...Download file to see next pages Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Security Case Study Example | Topics and Well Written Essays - 750 words”, n.d.)
Network Security Case Study Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1484371-network-security
(Network Security Case Study Example | Topics and Well Written Essays - 750 Words)
Network Security Case Study Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1484371-network-security.
“Network Security Case Study Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1484371-network-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Security

Computer Network Security

The prime purpose of the paper "Computer Network Security" is to discuss patch management issues that frequently update security patches on systems.... Secondly, configuration management also plays an essential role in ensuring security for mission-critical aviation applications.... All the identified attack interfaces must be addressed by taking the following factors into consideration (Mitigating security threats by minimizing software attack surfaces....
4 Pages (1000 words) Essay

Data and Network Security

This paper ''Data and Network Security'' tells that The company is known as 'Enterprise Training Solutions' is involved in the primary activity of providing training services and is based in Leeds, England as well as in Edinburgh, Scotland.... This point signifies the fact that there are no notable security measures at least for the ground floor.... The fact that a large share of 'Enterprise training solutions' offices are located on the ground floor adds to the threat of a potential security breach....
11 Pages (2750 words) Essay

Network Security Assignment

Security policies provide roadmap to the IT staff that is planning Network Security implementations and identifies acceptable use of organizational resources; more so, it acts as a security contract with employees This paper makes a conclusion that all employees of the organization should adhere to the following policies of the company.... security on them other hand refers to the measures.... hellip; According to the report information security entails the adoption of specific measures that are supposed to prevent the unauthorized access, manipulation, use or the denial of access to any data, information, or capabilities that will ensure confidentiality....
9 Pages (2250 words) Assignment

Wireless Network Security

The wireless MANET network is associated with protocols that are not well designed in terms of Network Security, as there is no centralized administration to monitor or configure MANET.... However, most of the wireless network protocols associated with MANET is designed for optimum bandwidth utilization but not for optimal security.... This report talks about Mobile Ad Hoc network which refers to a type of mobile network in which each node has the ability to act as a router”....
7 Pages (1750 words) Essay

Network Security Planning

Furthermore, Network Security planning also aims at… This is made possible through developing additional security design aspects that are inevitable for the enhancement of control, visibility, and general safety Network Security planning Introduction Network Security planning entails developing best practices and measures for protecting the network infrastructure.... Furthermore, Network Security planning also aims at developing a strong foundation where more advanced security measures, techniques, and methods can be subsequently established....
2 Pages (500 words) Research Paper

Network security infrastructure

Without proper Network Security measures, many individual, government agencies and business enterprises risk losing their data. Network Security is basically a process by Network Security INFRASTRUCTURE By: Network Security Infrastructure Recently, theuse of the Internet has continued to grow exponentially.... Without proper Network Security measures, many individual, government agencies and business enterprises risk losing their data....
2 Pages (500 words) Essay

Network Security Assessment

As a consultant of assessing the Network Security for a large… Network scanning on the other hand is the process of identifying any active networks either to attack or assess them.... As a consultant of assessing the Network Security for a large organization, I must undertake various methodologies and use various tools in this assessment.... This type of scanning makes use of a software that looks for flaws in the database, testing the system for such flaws and coming up with a report on the same that is useful in tightening the security of the system....
2 Pages (500 words) Essay

Network Security System

This case study "Network Security System" evaluates the network topology in the institution in terms of efficiency and safety and provides the best alternative or option for maintaining the security apparatus.... It specifically outlines the installation of a Perimeter Network Security system.... It specifically outlines the installation of a Perimeter Network Security system based on Cisco devices.... The present network topology and design of the computer present on the campus are highly at risk of being compromised in terms of security Bridge....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us