Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Network Security Planning - Research Paper Example

Comments (0) Cite this document
It entails establishing a security baseline for securing the main management planes in an organization. Furthermore, network security planning also aims at…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91% of users find it useful
Network Security Planning
Read TextPreview

Extract of sample "Network Security Planning"

Network security planning Introduction Network security planning entails developing best practices and measures for protecting the network infrastructure. It entails establishing a security baseline for securing the main management planes in an organization. Furthermore, network security planning also aims at developing a strong foundation where more advanced security measures, techniques, and methods can be subsequently established. This is made possible through developing additional security design aspects that are inevitable for the enhancement of control, visibility, and general safety of the data panel.
The following areas have been identified as the key elements that require baseline security. This includes the following:
Network policy enforcement
Routing infrastructure
Network telemetry
Switching infrastructure
Infrastructure device access
Device survivability and resiliency
Over the year network infrastructure has always been suffering major threats and immeasurable attacks of the data panel. The following has been established as the major threats to the network infrastructure:
Routing protocol attacks
Spanning tree attacks
Privilege escalations
Session hijacking
Denial of service i.e. DoS
Unauthorized access
Distributed Denial of service i.e. DDoS
Man in the middle attacks i.e. MITM
Network Infrastructure access best practices
In order to secure network infrastructure one must secure and manage the access of such infrastructure devices. Compromising with the infrastructure devise access, compromises the management and security of the entire network. This calls for the establishment of critical and suitable controls necessary to curb unauthorized invasion to the infrastructure devices.
Network infrastructure devices aims at providing a wide range and different variety of access protocols. This includes asynchronous and console connections, In addition to protocols based on remote access such as HTTP, Telnet, rlogin and SSH. Therefore, every infrastructure device should be skillfully configured and reviewed to ensure that only allowed access procedures are enhanced and that they are thoroughly protected.
This has led to development of key measures aimed at protecting both management and interactive access to an infrastructure contrivance. This includes the following.
Authenticate access- make sure access is only permitted to authorized groups, users and services.
Account for all access activities- record whom and when accessed the infrastructure device and all the activities that occurred for auditing purposes.
Restrict the accessibility of the device- limit all the permitted methods of access, as well as the accessible ports and communicators.
Authorize actions- restrict the views and actions permitted by any group, user, or service.
Present legal notifications- exhibit legal information developed in conjunction with the company’s legal framework.
Enhance confidentiality of data- protect all the sensitive data stored from copying or viewing. Protect all the information in a communication channel from session hijacking, sniffing, and man in the middle attacks.
Cisco safe architecture, like any other network security system, is not immune to limitations. However, it has successfully developed threat mitigation and detection programs readily available on Cisco security agents, Cisco firewalls, Cisco network admissions control, and Cisco IPS and web safety appliances.
In addition, these devices alerts and generate information centrally gathered and correlated using the Cisco security monitoring, analysis and response system which recognize the source of threats, envisage the attack route, give the possible suggestions and sometimes optionally implements the response actions. The visibility of Cisco IPS reduces many instances of false positives thus allowing for dynamic quarantine impositions of unsecured hosts. In addition, Cisco security manager helps simplify the management of Cisco safe architecture, carryout threat mitigation, and troubleshooting.
Gregory, A. (2004). Cisco safe architecture. London: Oxford UP.
Kennedy, F. (2007, May 5). Newspaper classifieds contain Cisco safe architecture. Daily News, pp. F1, F9.
Mark, T. (2009). Cisco network systems. New York: Nerd Press. Read More
Cite this document
  • APA
  • MLA
(“Network Security Planning Research Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
Network Security Planning Research Paper Example | Topics and Well Written Essays - 500 words. Retrieved from
(Network Security Planning Research Paper Example | Topics and Well Written Essays - 500 Words)
Network Security Planning Research Paper Example | Topics and Well Written Essays - 500 Words.
“Network Security Planning Research Paper Example | Topics and Well Written Essays - 500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Network Security Planning

Network Security

...use application software that can detect such emails. 5. Shoulder Surfing: Users should be careful of their surroundings while typing in their passwords or looking at any private data as unauthorized users might try to take a glance at what they have typed or what they are doing. Works Cited Ciampa, Mark. (2008). Security + Guide to Network Security Fundamentals. United States of America: Course Technology. Kim, David. Solomon, Michael G. (2011). Intro to IT Security. United States of America: Jones and Barlett Learning. Hallberg, Bruce A. (2009). Networking, A Beginner’s Guide, Fifth Edition. United States of America: McGraw – Hill Companies. Heng, Goh...
5 Pages(1250 words)Essay

Network Security and Its Business Impact

...Security 5 11 Research Design-Research method: 5 11.1 Research Design – Phase 1: Primary Data Collection: 5 11.2 Basic Activity for Generating Data: 6 11.3 Primary Data: 6 11.4 Collection Protocols: 6 11.5 Primary Data Collection Presentation: 6 11.6 Research Design – Phase 2: Processing and Presentation: 6 11.7 Design for Pre-Processing for Primary Data Collection: 7 11.8 Design for generating the intended project outcome: 7 12 Intended Project Outcome: 7 13 Table 1 indicates the major project tasks including the estimated time 7 14 Time plan: 8 15 Suggested plan for the dissertation: 10 16 Internet References: 10 17 BookReferences: 11 18 Survey...
8 Pages(2000 words)Essay

Network security

...the respondents to understand the questions and answer relevantly. There are no such questions in the questionnaire that are of personal kind. There are thirty questions in the questionnaire. 3.2 Research Design – Phase 1: Primary Data Collection This phase of research is exclusively related to the compilation of the primary data, which would be later processed for the outcome of the project. Primary data will be collected by means of generated questionnaires 3.3 Basic Activity for Generating Data The fundamental plan is to compare the network security enhancement features, while adding a wireless network to an existing wired network. 3.3. a. Primary...
50 Pages(12500 words)Dissertation

Network Security

...?Introduction Although there are batch of definition available on the Internet related to security. The definition available on ‘’ covers the basics and states it as: “Prevention of and protection against assault, damage, fire, fraud, invasion of privacy, theft, unlawful entry, and other such occurrences caused by deliberate action”. In the context of network security definition, it consists of concerns linked to network communication privacy, confidentiality of data over the network, accessing unauthorised classified data, access to prohibited network domains and utilising Internet for concealed communication (Network Security. 2007). It is the twentieth century where improved communication technologies... ...
24 Pages(6000 words)Essay

Network Security

...of building a security policy is to offer the employees with a concise summary of the "satisfactory utilization" of some of the business information and resources. In addition, the intention behind this policy is to proficiently describe the allowable rights of users and consequently employing them in protecting the business sensitive and critical information systems. The security plan behaves like a "must interpret" basis of company information for everybody exploiting in some approach, computer and network resources considered as possible targets. However, a high-quality and superbly established security policy ought to tackle a number of these...
13 Pages(3250 words)Research Paper

Network Security

...transport architectures, and all devices have a specific transport mode that it associates with. Ultimately blackberry security is best when linked up with the blackberry enterprise server, which is designed specifically cooperate and commercial use. This server allows the smartphone to run on a remote platform with all the essential functionalities stored separate from the device. In essence, the blackberry can successfully be used for corporate business functions, and for personal use without any compromise on data integrity. Wi-Fi transport architecture provides internet connection to mobile devices, of a link to private networks. Through least cost routing, a wireless connection can be configured to...
7 Pages(1750 words)Essay

Network Security implement a comprehensive security plan urgently. With carefully planned countermeasures and strict security, the odds of a successful intrusion can be minimized greatly. Overview of Network Security Fundamentals, Security Threats, and Issues Whenever a network is connected to the Internet it is potentially subjected to attacks from malicious programs such as viruses, Trojans, and spyware. Network security is not only about the WAN (Wide Area Network) but also the LAN (Local Area Network), as the two go hand in hand. It is possible to...
3 Pages(750 words)Case Study

Network security

...Network Security Part Today, the computer networking systems are highly vulnerable and prone to the hackers, viruses and other cyber dacoits. Therefore the network security systems have to be sound dependable and free from risks (Marcel Dekker, New York, 1997). This is only possible if the systems and service packs are continuously updated and different versions are enhanced. This dream of a foolproof secure network system can only be realized when the computer hardware is 100% compatible with the policy of security protocols. The following check list helps out the situation in an effective manner. As far as the computer hardware compatibility list (HCL) is concerned the peripherals must be compatible... with the...
6 Pages(1500 words)Essay

Network security

...Network security s of Learning Discuss the term confidentiality as it applies to data. How can data confidentiality be assured on a network? Data confidentiality entails allowing authorized users to access particular data, while preventing unauthorized access of data by intruders. When access eavesdrops into particular data, the principle of confidentiality will not hold. In networks, encryption is the principle techniques of maintain data confidentiality. This process is achieved using encryption algorithms that are used to generate keys for encrypting and decrypting data. 2. Explain the concept of technical security controls. What are some the major components that make up technical control? Technical security controls are used... to...
2 Pages(500 words)Essay

Network Planning

...Network Planning Contents Contents 2 Introduction 3 Discussion 3 Steps for optimal network 3 Required information for the process 4 Strategy to be employed in this network 5 Conclusion 6 References 7 Introduction Network planning in logistics can be defined as a set of tools that is required so as to perform analysis of the inventory levels, transportation costs and warehouse locations so that these elements are able to support effectively the level of customer service. Network is one of the best scientific methods that are used to analyze and determine the services and the costs that need to be met by the warehouses so...
4 Pages(1000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Network Security Planning for FREE!

Contact Us