Network Security Planning - Assignment Example

Comments (0) Cite this document
Summary
Although the ever-evolving security landscape offer advanced security services to businesses, organizations also perceive it as posing continued challenge given that they have to invest to design and implement networks that regard security highly while guaranteeing integrity,…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.6% of users find it useful
Network Security Planning
Read TextPreview

Extract of sample "Network Security Planning"

Download file to see previous pages White (2001) defines Cisco SAFE as architecture in security that offers guidelines for modular networks design approach (Cisco, 2010). This approach makes its ease for network designers to understand relationships thus proceed to execute security based on one module after the other unlike the traditional approach of implementing one broad approach for the entire enterprise. Despite its advantage of maximizing control and visibility, Cisco SAFE has limitations and this paper explores these limitations in detail and their impacts on network security.
With Cisco SAFE, denial of service attacks is a widespread threat especially for organizations that do not implement protocol analysis in network security design. With poor protocol analysis, the network lacks significant pattern matching with IDS guaranteeing that the rules of each protocol are followed and this results to sending of both protocol related and unrelated data streams. Consequently, traffic is not valid and is an attack that bypasses security systems or an attack crashing the system due to invalid data presence in the intended system. DoS is overcome by ensuring that IDS in Cisco SAFE has the right knowledge of ordinary system protocols like UDP, TCP, FTP, and HTTP.
A second limitation is distributed denial-of-service (DDoS). Without proper configuration of Cisco’s firewall Intrusion Detection System (IDS), organizational networks are subject to DDoS attacks preventing networks from bandwidth access (World, 2002). DDoS attacks consume entire business network bandwidth by attackers while Cisco IDS offers distinctive protection against DDoS by detecting attacks proactively and mitigate them. However, Cisco IDS requires configuration after router configuration to enable it to identify and block attacks prior to the occurrence of intrusion or unauthorized transactions and this calls for effective configuration of Cisco IDS.
For any ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Security Planning Assignment Example | Topics and Well Written Essays - 750 words”, n.d.)
Network Security Planning Assignment Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1655287-network-security-planning
(Network Security Planning Assignment Example | Topics and Well Written Essays - 750 Words)
Network Security Planning Assignment Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1655287-network-security-planning.
“Network Security Planning Assignment Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1655287-network-security-planning.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Network Security Planning

Network security

...the respondents to understand the questions and answer relevantly. There are no such questions in the questionnaire that are of personal kind. There are thirty questions in the questionnaire. 3.2 Research Design – Phase 1: Primary Data Collection This phase of research is exclusively related to the compilation of the primary data, which would be later processed for the outcome of the project. Primary data will be collected by means of generated questionnaires 3.3 Basic Activity for Generating Data The fundamental plan is to compare the network security enhancement features, while adding a wireless network to an existing wired network. 3.3. a. Primary...
50 Pages(12500 words)Dissertation

Network Security

...?Introduction Although there are batch of definition available on the Internet related to security. The definition available on ‘www.businessdictionary.com’ covers the basics and states it as: “Prevention of and protection against assault, damage, fire, fraud, invasion of privacy, theft, unlawful entry, and other such occurrences caused by deliberate action”. In the context of network security definition, it consists of concerns linked to network communication privacy, confidentiality of data over the network, accessing unauthorised classified data, access to prohibited network domains and utilising Internet for concealed communication (Network Security. 2007). It is the twentieth century where improved communication technologies... ...
24 Pages(6000 words)Essay

Network Security

...of building a security policy is to offer the employees with a concise summary of the "satisfactory utilization" of some of the business information and resources. In addition, the intention behind this policy is to proficiently describe the allowable rights of users and consequently employing them in protecting the business sensitive and critical information systems. The security plan behaves like a "must interpret" basis of company information for everybody exploiting in some approach, computer and network resources considered as possible targets. However, a high-quality and superbly established security policy ought to tackle a number of these...
13 Pages(3250 words)Research Paper

Network Security

...transport architectures, and all devices have a specific transport mode that it associates with. Ultimately blackberry security is best when linked up with the blackberry enterprise server, which is designed specifically cooperate and commercial use. This server allows the smartphone to run on a remote platform with all the essential functionalities stored separate from the device. In essence, the blackberry can successfully be used for corporate business functions, and for personal use without any compromise on data integrity. Wi-Fi transport architecture provides internet connection to mobile devices, of a link to private networks. Through least cost routing, a wireless connection can be configured to...
7 Pages(1750 words)Essay

Network Security

...to implement a comprehensive security plan urgently. With carefully planned countermeasures and strict security, the odds of a successful intrusion can be minimized greatly. Overview of Network Security Fundamentals, Security Threats, and Issues Whenever a network is connected to the Internet it is potentially subjected to attacks from malicious programs such as viruses, Trojans, and spyware. Network security is not only about the WAN (Wide Area Network) but also the LAN (Local Area Network), as the two go hand in hand. It is possible to...
3 Pages(750 words)Case Study

Network security

...Network Security Part Today, the computer networking systems are highly vulnerable and prone to the hackers, viruses and other cyber dacoits. Therefore the network security systems have to be sound dependable and free from risks (Marcel Dekker, New York, 1997). This is only possible if the systems and service packs are continuously updated and different versions are enhanced. This dream of a foolproof secure network system can only be realized when the computer hardware is 100% compatible with the policy of security protocols. The following check list helps out the situation in an effective manner. As far as the computer hardware compatibility list (HCL) is concerned the peripherals must be compatible... with the...
6 Pages(1500 words)Essay

Network security

...Network security s of Learning Discuss the term confidentiality as it applies to data. How can data confidentiality be assured on a network? Data confidentiality entails allowing authorized users to access particular data, while preventing unauthorized access of data by intruders. When access eavesdrops into particular data, the principle of confidentiality will not hold. In networks, encryption is the principle techniques of maintain data confidentiality. This process is achieved using encryption algorithms that are used to generate keys for encrypting and decrypting data. 2. Explain the concept of technical security controls. What are some the major components that make up technical control? Technical security controls are used... to...
2 Pages(500 words)Essay

Network Security Planning

...Network security planning Introduction Network security planning entails developing best practices and measures for protecting the network infrastructure. It entails establishing a security baseline for securing the main management planes in an organization. Furthermore, network security planning also aims at developing a strong foundation where more advanced security measures, techniques, and methods can be subsequently established. This is made possible through developing additional security design...
2 Pages(500 words)Research Paper

Network Planning

...Network Planning Contents Contents 2 Introduction 3 Discussion 3 Steps for optimal network 3 Required information for the process 4 Strategy to be employed in this network 5 Conclusion 6 References 7 Introduction Network planning in logistics can be defined as a set of tools that is required so as to perform analysis of the inventory levels, transportation costs and warehouse locations so that these elements are able to support effectively the level of customer service. Network is one of the best scientific methods that are used to analyze and determine the services and the costs that need to be met by the warehouses so...
4 Pages(1000 words)Essay

Network security

...TASK III a) Network security implementation considerations A WAN solution that optimizes application use is an integral part of application delivery network. The following are the considerations for WAN security implementation. Network transparency – A WAN optimization solution with a transparent architecture fully integrates existing networks while preserving their services. Network transparency will protect organizations investment in networks, security features and operational expenses. Some of the services that need to be highly transparent include access control lists, firewall...
3 Pages(750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Network Security Planning for FREE!

Contact Us