StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Network Security - Essay Example

Cite this document
Summary
The certification process takes a lot of time and addresses systems that are considered as high availability systems. The prime purpose of the paper "Computer Network Security" is to discuss patch management issues that frequently update security patches on systems…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97% of users find it useful
Computer Network Security
Read Text Preview

Extract of sample "Computer Network Security"

Computer Network Security For minimize risks and vulnerabilities from the organization; certification for an information security standard is a key aspect that addresses design, deployment and operational processes. Certification process takes a lot of time and addresses systems that are considered as high availability systems. Likewise, it also addresses patch management issues that frequently updates security patches on systems. There is no way of completely securing a network, system and applications. However, periodic penetration testing and code reviews are conducted by security professionals and consultants for exploiting vulnerabilities and security flaws within an application and computer network. It is now considered as a fundamental fact that if any application is connected and operates on the network, it can be exploited and compromised. Organizations are keen to build a layered defense of protection to counter cyber threats from internal and external entities. Likewise, there is a requirement of constantly monitor live traffic from and to the World Wide Web, remote connections, real time interaction of users to applications, Internet gateways and client interactions with the applications. Code reviews are essential, as patches from vendors must be tested first before implementation into the live environment. However, for effective implementation of patches, patch management practices must be documented and standardized. Likewise, there are efficient tools available for performing effective patch management. Secondly, configuration management also plays an essential role for ensuring security for mission critical aviation applications. For instance, if a faulty hardware component is replaced with the new one, it is important to address issues with hardware compatibility, as any mal functioned device may introduce vulnerability. Thirdly, change management procedures must also be document and approved from the respective application owners prior any changes to the application. For instance, change request form requiring any changes within the application can be approved and documented for ensuring no vulnerable spots in the architecture and infrastructure. All the identified attack interfaces must be addressed by taking following factors into consideration (Mitigating security threats by minimizing software attack surfaces.2008): Uninstall and prevent unnecessary features Default utilities and programs that are installed within the operating systems must be utilized (If required) Strong access management by user authentication Remove all default passwords on the application server Configure only required protocols on the application server Limiting the unnecessary codes from the application Applying metrics to measure the attack surface on periodic basis Disabling unwanted protocols on the application server Nowadays, hackers encapsulate a malicious code or a script for attacking a web page by using several techniques including obfuscation, polymorphism and encryption. As the anti-virus program detects viruses by signatures, malicious codes are able to bypass them by using these techniques. These types of methods are known ad passive attacks (Gharibi & Mirza, 2011). Likewise, encryption is the best security control that can be implemented for securing the code and ciphering the user data. Secondly, polymorphism is a technique that replicates an application partially so that it appears just like the original application. Similarly, for hiding the source code of an application, obfuscation techniques can be applied for making the code complex to exploit and analyze while keeping complete functionality (Gharibi & Mirza, 2011). These three factors need to be handled to provide better security. In order to tackle all three factors, Christian Frühwirth, recommended an event based intrusion detection system. The system will support these three factors by (Krügel, 2002): Advanced tools incorporated with IDS to detect intrusions and eliminate attacks Standardized frameworks to handle legal compliance Efficient security management application tools to handle information security The computer incident response teams are triggered when a security breach shows its existence within the network. However, these teams conduct investigation of suspect workstations and servers. For instance, if a server is responding slowly, or a workstation is broadcasting messages will be examined for any possible issue. After specifying the incident that is related to security, the incident recovery steps are performed accordingly to assure adequate information collection and documentation. There are cases where security incidents also involves the contribution of law enforcement agencies such as National Transportation Safety Board, concerned managers, board of directors and security professionals. Incidents in the context of adverse events demonstrate a negative impact such as a system crash, flooding of network packets, unauthorized access of system privileges, viruses, malicious codes etc. and referred as a policy violation for computer security policies and standard security practices. Firewalls are network security devices that are categorized in hardware-based firewalls and software-based firewalls. Mission critical redundant systems must be protected via layered defense and hardware based firewalls that must monitor data transmission on continuous basis. The hardware-based firewalls are more secure, as they are not dependent on the operating system. On the other hand, software-based firewalls are dependent on the operating system that may demonstrate risks. The choice from these options depends on the cost as well. However, a full features firewall may protect the computer network from hackers or cyber criminals. It will detect, block and quarantine viruses and malicious codes that attempt to compromise the aviation network. Moreover, configuration on the local area aviation network must demonstrate a graphical user interface to ensure that each preventive measure is active and running (Agnitum outpost persona firewall pro 2.0.2004). Currently there are two conventional methods that can be deployed to detect cyber threats and vulnerabilities on the aviation network i.e. anomaly based IDS and signature based IDS. The signature based IDS analyze and identify specific patterns of attacks that are recognized by raw data that is in terms of byte sequences called strings, port number, protocol types etc. Likewise, apart from the normal operational pattern, signature based firewall detects any activity that is unusual from previously defined patterns. Moreover, the patterns are monitored with strict control algorithms. The signatures are stored in a signature repository. The prime object of a ‘signature based IDS’ is to search signatures in order to detect a threat or vulnerability that is similar to antivirus software that also detects viruses. The functionality includes the detection of attacks that are initiated directly towards the computer network. Conclusion The mission critical systems stores sensitive information, for this reason, not evens a smallest of risk can be left out. Initially, we discussed about the ‘net-centric’ approach to demonstrate an end to end intranet application. Likewise, propagation threats were discussed that can be addressed by System Wide Information Management (SWIM) certification. Moreover, patch management along with obfuscation, polymorphism and encryption is also discussed that can effectively counter cyber threats and vulnerabilities. Furthermore, event based intrusion detection system and computer security incident response teams. Security administration and configuration issues were also discussed. In addition, firewalls with advanced protection techniques such as Packet Filtering, circuit level gateway were discussed. Lastly, anomaly based IDS and signature based IDS were discussed to ensure ultimate protection to critical information systems interacting with live feeds. References Agnitum outpost persona firewall pro 2.0. (2004). District Administration, 40(2), 68-68. Gharibi, W., & Mirza, A. (2011). Software vulnerabilities, banking threats, botnets and malware self-protection technologies. International Journal of Computer Science Issues (IJCSI), 8(1), 236-241. Krügel, C. (2002). Service specific anomaly detection for aviation network intrusion detection 2012(3/14/2012), 3/14/2012. doi:10.1145/508791.508835 Mitigating security threats by minimizing software attack surfaces.(2008). Computer Economics Report, 30(5), 15-19. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Network Security Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1490447-identifying-potential-malicious-attacks-threats
(Computer Network Security Essay Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/information-technology/1490447-identifying-potential-malicious-attacks-threats.
“Computer Network Security Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1490447-identifying-potential-malicious-attacks-threats.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Network Security

Taha Computer Network Security Services

The present essay "Taha Computer Network Security Services" provides a business plan for a Computer Network Security company known as Taha.... hellip; Taha Computer security services business is a new organization that will offer computer security services to its clients since the world is in the midst of a global technological revolution, which will bring change in all proportions of the world.... aha Computer security Service Company has a competitive advantage over any other business since there is none other company that offers computer security services in the region....
3 Pages (750 words) Essay

Technologies in Identifying Crime

The first case study involves the guides for the first respondents using electronic The second case study involves the need for the use of computer forensics in general.... It is essential to note that different departments have embraced technology in their working areas in different perceptions....
4 Pages (1000 words) Case Study

Security policy document

The document further provides a clear blue print for Computer Network Security management.... In the paper “Security policy document” the author examines security policy document which entails a document that contains rules/policies practices, laws and procedures for regulating accessibility to a computer network.... hellip; The author of the paper states that the General security architecture entails an integrated security design that helps to solve security threats/ risk that may emerge in an organisation....
7 Pages (1750 words) Term Paper

Ethics Project

My recommendation to the company CEO of the Computer Network Security Company regarding the client who intends to buy partial services is that she should decline the client's request.... Another thing that underpins my recommendation Ethics in Information Technology Part A My recommendation to the company CEO of the Computer Network Security Company regarding the client who intends to buy partial services is that she should decline the client's request.... This is because the company might not be able to establish the efficacy of the other levels of the client's security system that were done by another or other Computer Network Security companies (George 45)....
2 Pages (500 words) Case Study

CYB Week 2 Discussion

?Computer Network Security.... In computer security, reconnaissance is usually an initial step toward a further attack pursuing to exploit a computer system.... In computer security, reconnaissance is usually an initial step toward a further attack pursuing to exploit a computer system.... Network reconnaissance is an important process as it helps to identify security threats to the system and services provided.... Facilitates solution to Cyber-security which is an area in which much course development is taking place and of much interest, Cyber-security training is important and necessities to be extended....
1 Pages (250 words) Assignment

Computer Security

Guide to Computer Network Security.... The KDC server Computer Security Kerberos computer network Authentication Protocol Kerberos serves as a network authentication protocol that allows for mutual identification, in which case the computer server and the user identify one another in the course of operation.... Cryptographic Protocol: security Analysis Based on Trusted Freshness.... Kerberos serves as a network authentication protocol that allows for mutual identification, in which case the computer server and the user identify one another in the course of operation....
1 Pages (250 words) Assignment

The Global Policy of Walmart

A guide to Computer Network Security.... Since it adopted the global policy, it has continued aggressively to pursue globalization, which has led to unprecedented growth… In order to gain a competitive advantage over the other organizations in the industry, it has been forced to adopt information systems on a global platform. Since the adoption of the global information systems, Walmart has increased its reach and is now operational in 27 Globalization al Affiliation) Globalization In the current period, there are many organizations that have gone global and a good example of such an organization is the retail giant, Walmart....
1 Pages (250 words) Coursework

Professional Practice in Informational Technology Field

Additionally, the report identified information security and management to be two major areas requiring students to prepare for future information-technology based corporate operations.... The report concludes that information technology status favors contemporary business models and students following their academic careers in IT should consider information security a universal requirement since future corporations aim at capitalizing on e-marketing and big data management....
6 Pages (1500 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us