StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

: Solution to Network Security - Case Study Example

Cite this document
Summary
The aim of the paper “Case Study: Solution to Net Work Security” is to analyze the unprecedented degree of risk of using the Internet. Computer viruses propagate on the internet within a very short period, carrying potential hazards to systems…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.1% of users find it useful
Case Study: Solution to Network Security
Read Text Preview

Extract of sample ": Solution to Network Security"

 Case Study: Solution to Net Work Security 1.0 Introduction Most organizations today use networked information systems responsible for storing, processing and delivering data globally. This infrastructure especially the use of internet has unprecedented degree of risk. Computer viruses propagate in the internet within a very short period, carrying potential hazards to systems. Hacking of organization systems and fraud has been common in the 1980s. Thus, network security has become a major concern for organizations. Attempts have been made to curb the vice but since technology is very dynamic, substantial improvements are still required. Repeated occurrence of similar security breaches like misuse of email, suggest that most organizations have failed to tackle network security with the urgency needed. Since most organizations depend on computer networks to store, access and provide business information both internally and externally to customers and suppliers, this information plays a key role in daily operations of the organization (Harrington, 2005). A company that processes credit card transactions must raise its profile of network security to survive in the business. The value of information and the cost of security breaches are important assets that must be appreciated. 2.0 Overview of Network Security Fundamentals, Security Threats, and Issues A company that process credit cards is at great threats through computer networks and data. Therefore, computer hardware and software, policies and procedures necessary for developing layers for network security should be designed to defend the systems of the company. Some of the common threats are; • Viruses, worms, Trojan horses, spyware, malware, adware, and botnets. • Zero-day and zero-hour attacks • Hacker attacks • Denial of Service (DoS) and Distributed Denial of Service Attacks (DDoS) and • Data theft. These threats exploit the following: • Any unsecured wireless networks • Software and hardware that is unpatched • Websites that is unsecured • Potentially unwanted applications (PUAs) • Weak passwords • Lost devices and • Unwitting users- These are internet users with malicious intention (Harrington, 2005). There are several network fundamentals to protect a company’s reputation and reduce liability. Among these fundamentals are: • Keeping current patches and updates Programs need to be updated frequently. These programs include Adobe Acrobat and Reader, Adobe Flash, Oracle Java, Microsoft Internet Explorer and Microsoft Office Suite. Computer administrators should not be lax on applying patches and computer updates. Laxity created will make the system vulnerable to cyber criminals. An inventory should be kept to ensure that ALL devices are regularly updated. • Use of strong passwords Weak passwords is vulnerable to threats by malicious internet users. The password should include upper-case and lower-case letters, numbers and symbols. The password must be kept secret to the organization and revealed and shared with trusted employees and only when in need. Hackers impersonate technical support to access passwords. The employees need training to realize social engineering techniques to avoid hazards. The passwords need to be changed frequently, may be monthly, and any duplicate avoided. Multiple failed log-on attempts by users to their accounts should be locked within a short period of time. • Secure the VPNs Documentation for the server and VPN software must be reviewed. In order to protect the organization’s network and data from hackers during execution of information through internet, the strongest protocols for encryption and authentication must be used. For identity authentication, multi-factor method of authentication is the best. Extra steps that prove user’s identity such like PIN inhibits hackers from attacking the company’s network. A firewall should be used to separate the VPN from the rest of the network. • The user access privileges should be actively managed. In most organizations, most employees have access to sensitive, confidential data outside the scope of their job portfolio. This is a security threat and need not be overlooked. Information should be availed to employees according their job portfolio. In case the responsibilities of an employee changes, the IT department is notified so that access privileges of the employee are modified to fit current job portfolio. • All the inactive accounts should be cleaned up Inactive accounts are vulnerable to hackers since they were assigned to employees. These inactive accounts make hackers access and disguise their malicious activities. There are softwares used for cleaning up inactive accounts for large networks that hold many users. 3.0 Detailed Network Security Recommendations. Secure connections between endpoints will use VPNs since they are a weapon in security arsenal. VPNs transports traffic securely in an unsecured network. It achieves this by combining encryption, authentication and tunneling or encapsulation. Encapsulation refers to embedding a network protocol and carried within packets of another network. Firewalls are an old and more established mode of security than VPNs and found in most environments. Firewall is a collection of components and is placed between two networks. In this position scenario, firewall acts as a gateway for the two networks. In other words, firewall refers to any process that filters transmission of packets of digital information; especially when they pass through an interface between networks. The VPN must be incorporated in the company’s security policy and should harmonize with firewall. 3.1 Fundamentals of Firewalls and VPNs A firewall is determined effective when it meets the following principle requirements: When it a door for incoming and outgoing traffic When it allows only authorized traffic to pass and When it is immune to penetration or compromise. 3.2 Recommendations for Firewall and VPN Solutions for New Company In the security policy of the organization, firewall should be documented. To successfully use firewall for network security, a perimeter needs to be established. The perimeter acts as a boundary between two zones of trust and puts clear cuts for areas blurred by extranet, VPN and mobile devices. When firewall is at the perimeter, a checkpoint is set up to block viruses and infected email messages before they are granted access. One limitation of firewall is that it cannot prevent security breaches, but reduce external access threats. Unauthorized access cannot be prevented by a single firewall placing a soft divide between the intranet and internet of the organization (Poole, 2003). 3.2 Recommendations for implementing proposed solutions The success of network security in the organization will largely depend on its network security policy. The firewall policy should be engineered on a basic policy of permitting traffic flow through the network, with denial specifications or denying all traffic unless specifically permitted. The policy should allow employees in the organization direct access of internet while protecting the network from attacks. Several firewalls, strategically placed at various nodes within the network are required (Harrington, 2005). Employment of VPN protocols is necessary for the organization. Some of the protocols include: • Point-to-Point Tunneling Protocol (PPTP) • Layer 2 Tunneling Protocol (L2TP) • Internet Protocol Security (IPSec) and • SOCKS. Implementation of VPN has various approaches. The configuration could be router-to-router, server-to-server, server-to-router, workstation-to-server, or workstation-to-router. Costs should guide the type of configuration to be adopted. The low-cost approach for the organization is the implementation of Windows NT servers that employ PPTP with xDSL, frame relay or fractional T1 (Poole, 2003). 3.3 Practices for Long-term Solutions Firewall serves as a security tool but does not secure a network. They need proper configuration and monitoring. Since firewall does not track the internal network, the organization needs to focus on the fundamental principles of network security. This strategy will prevent internal attackers as well as external hackers. Systems of importance must be configured to check logins, failed logins and network activity. In most cases, every computer and NOS have these utilities which assist in monitoring such activities. Widows NT server has event viewer while UNIX allows the administrator to monitor logins through wtmp file and at the same time record unsuccessful login attempts (Poole, 2003). 4.0 Summary Any organization that relies on Information Technology for success is vulnerable to network threats. The threats are responsible for hiccups that may deform the image of the organization, resulting to massive losses. This supports the massive investment in network security by most firms today. The organization must develop network security policies for its employees, and ensure that the policies comply with other institutions like the government. The choice of network security is essential and need to be evaluated prior implementation. This will enable the organization to look at viable methods that are economical and user friendly. Reference List Harrington, J. (2005). NETWORK SECURITY A PRACTICAL APPROACH. Elsevier Inc.; U.S.A. Poole, O. (2003). Network security a practical guide. Butterworth-Heinemann Publications; Great Britain. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Case Study: Solution to Network Security Study Example | Topics and Well Written Essays - 1250 words”, n.d.)
Retrieved de https://studentshare.org/information-technology/1620124-case-study-solution-to-network-security
(Case Study: Solution to Network Security Study Example | Topics and Well Written Essays - 1250 Words)
https://studentshare.org/information-technology/1620124-case-study-solution-to-network-security.
“Case Study: Solution to Network Security Study Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1620124-case-study-solution-to-network-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Case Study: Solution to Network Security

Exotic Fruit Importers Limited Network Systems

The paper “Exotic Fruit Importers Limited network Systems” analyzes the company, which has been into the trade for more than 20 yrs now.... Development of an integrated approach encompassing safe growing, harvesting, processing and retail/foodservice handling practices from farm to table required a real-time information network with effective means of enhancing fresh fruits safety.... This requires a dependable backbone in the form of an Information network....
9 Pages (2250 words) Case Study

Definition, Organisation, and Creation of Botnets

This is in order to escape the security measures put in place.... Within a few hours, a botnet can become very large with a composition of millions of PCs on different network throughout the world.... The paper "Definition, Organisation, and Creation of Botnets" portrays botnets as a major problem facing networks, devastating the economy to the extent that if they are not checked they could lead to a shutdown of online business....
7 Pages (1750 words) Case Study

Designing a Network for a Company

The company can go on operating without fear of infiltration into its data transmission systems by intruders… With advanced technology, today, network security has become a real problem.... The other challenge facing network security is hacking, which can be done from different sources.... The security has been threatened by masquerading, which is the main problem of network infrastructure.... Proper design should cater to security measures to eliminate masquerading....
12 Pages (3000 words) Case Study

Best Practice for Software Developers in Mobile Application Development - Security and Challenges

This research "Best Practice for Software Developers in Mobile Application Development - security and Challenges" focuses on the mobile application development cycle, challenges faced in implementation, security challenges, analysis, and maintainability aspects.... The security aspects of the applications.... The learning process focuses on solution development....
11 Pages (2750 words) Case Study

Operating Systems - Hardening and Security

The paper "Operating Systems - Hardening and Security" presents NextGard technologies that specialize in network consulting services and face a number of network security vulnerabilities and risks.... Windows access control is particularly an integral component of the entire network security used by NextGard technologies and it directly affects the organization's information security, integrity, confidentiality, and availability.... network security solutions and appropriate Microsoft Windows access controlsThe fact that all employees at NextGard technologies have internet access and are free to browse the web significantly increases the vulnerability of the organization's network system to the risks of malicious access by exposing its information to a number of serious security threats....
8 Pages (2000 words) Case Study

Business Process Management

The paper 'Business Process Management' presents many organizations that use BPM for identifying, monitoring, and optimizing their business processes.... An organization that wants to introduce BPM in their business, face the challenge of high investment costs on software, hardware, and maintenance....
5 Pages (1250 words) Case Study

Communication Advantages

International Communication Union (2004) provides the following technique of building layers:The first layer, network administration, it is the most important asset in the network security of an organization.... Other factors accounted for in this article are increased operational efficiencies and security, while further demonstrating cost reduction, ensuring quality levels as well as the engagement of newly evolving technologies of voice and data.... ayered security involves the practice of providing multiple security controls in order to protect resources and data....
5 Pages (1250 words) Case Study

Logistics: ALBA Company

 One of the big challenges faced by shipping through road transportation is the delay caused by traffic blocks and security checks.... Trucks from Bahrain to Saudi reaching a certain destination should spend many hours because of the delays on the way caused by blocks and causeway security checks.... One of the main problems of road transportation from Bahrain to Saudi Arabia is the delay caused by traffic block and causeway security checking....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us