StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Security Planning - Research Paper Example

Cite this document
Summary
It entails establishing a security baseline for securing the main management planes in an organization. Furthermore, network security planning also aims at…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.5% of users find it useful
Network Security Planning
Read Text Preview

Extract of sample "Network Security Planning"

Network security planning Introduction Network security planning entails developing best practices and measures for protecting the network infrastructure. It entails establishing a security baseline for securing the main management planes in an organization. Furthermore, network security planning also aims at developing a strong foundation where more advanced security measures, techniques, and methods can be subsequently established. This is made possible through developing additional security design aspects that are inevitable for the enhancement of control, visibility, and general safety of the data panel.

The following areas have been identified as the key elements that require baseline security. This includes the following:Network policy enforcementRouting infrastructureNetwork telemetrySwitching infrastructureInfrastructure device accessDevice survivability and resiliencyOver the year network infrastructure has always been suffering major threats and immeasurable attacks of the data panel. The following has been established as the major threats to the network infrastructure:IntrusionsRouting protocol attacksSpanning tree attacksBotnetsPrivilege escalationsSession hijacking Denial of service i.e. DoS Unauthorized accessDistributed Denial of service i.e. DDoSMan in the middle attacks i.e. MITM Network Infrastructure access best practices In order to secure network infrastructure one must secure and manage the access of such infrastructure devices.

Compromising with the infrastructure devise access, compromises the management and security of the entire network. This calls for the establishment of critical and suitable controls necessary to curb unauthorized invasion to the infrastructure devices. Network infrastructure devices aims at providing a wide range and different variety of access protocols. This includes asynchronous and console connections, In addition to protocols based on remote access such as HTTP, Telnet, rlogin and SSH. Therefore, every infrastructure device should be skillfully configured and reviewed to ensure that only allowed access procedures are enhanced and that they are thoroughly protected.

This has led to development of key measures aimed at protecting both management and interactive access to an infrastructure contrivance. This includes the following.Authenticate access- make sure access is only permitted to authorized groups, users and services.Account for all access activities- record whom and when accessed the infrastructure device and all the activities that occurred for auditing purposes.Restrict the accessibility of the device- limit all the permitted methods of access, as well as the accessible ports and communicators.

Authorize actions- restrict the views and actions permitted by any group, user, or service. Present legal notifications- exhibit legal information developed in conjunction with the company’s legal framework. Enhance confidentiality of data- protect all the sensitive data stored from copying or viewing. Protect all the information in a communication channel from session hijacking, sniffing, and man in the middle attacks. Cisco safe architecture, like any other network security system, is not immune to limitations.

However, it has successfully developed threat mitigation and detection programs readily available on Cisco security agents, Cisco firewalls, Cisco network admissions control, and Cisco IPS and web safety appliances. In addition, these devices alerts and generate information centrally gathered and correlated using the Cisco security monitoring, analysis and response system which recognize the source of threats, envisage the attack route, give the possible suggestions and sometimes optionally implements the response actions.

The visibility of Cisco IPS reduces many instances of false positives thus allowing for dynamic quarantine impositions of unsecured hosts. In addition, Cisco security manager helps simplify the management of Cisco safe architecture, carryout threat mitigation, and troubleshooting. ReferencesGregory, A. (2004). Cisco safe architecture. London: Oxford UP. Kennedy, F. (2007, May 5). Newspaper classifieds contain Cisco safe architecture. Daily News, pp. F1, F9.Mark, T. (2009). Cisco network systems.

New York: Nerd Press.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Security Planning Research Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
Network Security Planning Research Paper Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1609590-network-security-planning
(Network Security Planning Research Paper Example | Topics and Well Written Essays - 500 Words)
Network Security Planning Research Paper Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1609590-network-security-planning.
“Network Security Planning Research Paper Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1609590-network-security-planning.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Security Planning

Network Security

The author gives a large overview of Jackson, Chris "network security auditing", Harrington Jan "network security: A Practical approach", Douglas Comer “Computer Networks and Internets” and other works on the topic of network security.... hellip; Current annotated bibliography includes Winkler Vic "Securing the Cloud: Cloud Computer Security Techniques and Tactics", Chey Cobb "network security for dummies", Cole Eric "Networking security bible", Donahue Gary Network Warrior" and other books on the stated topic....
18 Pages (4500 words) Annotated Bibliography

Network Security and Its Business Impact

This essay presents network security which has become a major issue in the business world.... nbsp;The importance strategically of this work is that the integrated network security for wired and wireless network will help the college in securing valuable data, improving network systems performance, protecting networks from internal and external threats, to enable higher availability and accessibility to the network.... Thus, the need of the hour is to identify the security loopholes and develop security policies especially for environments where the wired and wireless networks co-exist....
8 Pages (2000 words) Essay

Network Security and Its Business Impact in Educational Institutions

network security and Its Business Impact in Educational Institutions By Mohammed Abdul Rahman Supervisor: Dr.... Student Particulars Name: Mohammed Abdul Rahman Student Id: xxxxxxxxxx Project Title: network security and Its Business Impact in Educational institutions Student Declaration I declare that 1.... Kim Heng Teo for the advisory support during the formulation of this project Abstract network security is a crucial issue.... The research analyzes that the business impacts of combined wireless and wired network security in educational institutions....
56 Pages (14000 words) Dissertation

Network Security

Overview of network security Fundamentals, Security Threats, and Issues Whenever a network is connected to the Internet it is potentially subjected to attacks from malicious programs such as viruses, Trojans, and spyware.... network security is not only about the WAN (Wide Area Network) but also the LAN (Local Area Network), as the two go hand in hand.... Proper equipment and maintenance are vital to the consistency of the network security.... Detailed network security Recommendations A firewall is the first line of defense for your network....
3 Pages (750 words) Case Study

Information Security Program Survey

Information security Program Survey (Name) (University) (Date) Information security Program Survey Introduction The National Aeronautics and Space Administration (NASA) is the United States' agency to manage the nation's aerospace research, aeronautics, and other civilian space programs.... Since the NASA needs to manage highly sensitive data, information, strategic plans, and space programs, the organization pays particular attention to its information security program....
4 Pages (1000 words) Essay

Information Security Policy

The purpose of the Information security Policy is to safeguard the Information Technology based assets of Strega Oil and Gas Company from all threats whether internal, external, deliberate or accidental. ... his Information security policy of Strega Oil and Gas aims at protecting all the systems of the company belonging to the Information Technology infrastructure.... igned: ______________________Title: ______________________ Date: ___________________IntroductionThis Information security policy of Strega Oil and Gas aims at protecting all the systems of the company belonging to the Information Technology infrastructure....
39 Pages (9750 words) Essay

Network Operating Systems Past and Present

A network operating system is a program that is executed in server machine and also able to take care of the users, facts and figures, security, groups, applications and other networking operations.... … network operating systems in the past and presentWith the advent of information systems and computerization in many organizations, computer technologies have been seen to get more advanced every day.... With these, there has been need to have computers network operating systems in the past and presentWith the advent of information systems and computerization in many organizations, computer technologies have been seen to get more advanced every day....
9 Pages (2250 words) Essay

Penetration Testing in Network Security

This report "Penetration Testing in network security" presents corporate organizations to maintain their integrity and avoid revealing confidential data to third parties; penetration testing of the corporate network has to be perfectly conducted by the network administrators.... enetration testing entails security evaluation of a company's interconnection of computer systems with an effort to circumvent the security status of its key features based on the system design and implementation of the networking services....
10 Pages (2500 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us