StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Concept of Network Security - Case Study Example

Summary
The paper "Concept of Network Security" suggests that understanding network security is identified as the inclusion of multiple layers used to defend the network. At each level of network security, different controls and policies promote access to a particular security network…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful

Extract of sample "Concept of Network Security"

Case Study

In the modern business world, all companies have introduced the essential concept of network security to maintain their unique functionality in the business world. Thus, the understanding of network security is identified as the inclusion of multiple layers used to defend the network. At each level of network security, different controls and policies are used that promote access to a particular security network and user authority. Every organization has an important role in maintaining and protecting its networks to provide better service to customers and employees (Perlman et al., 2016). This is why most companies are rushing to establish an IT security department that will be able to cushion the company if some threats occur. Network security aims to make sure that both the employees and the customers are safe. Also, the safeness of the building, the safety of the finances that ensure the normal operations of the organization.

In this case, the medium-sized startup company will be dealing with financial transactions. This means that they will be dealing with a personal identification number. So the main security is the customer's data, which are highly targeted by malicious people. The company should learn from security breaches that occurred in a large corporation such as Sony. For the company to achieve this, they should follow some steps that they need to follow (Rathore et al., 2017). As such, this document contains a report on the practical evaluation of a company's network security base and a recommendation on the proper use of firewall and VPN solutions.

Network Security Fundamentals

The first step to identifying the network security fundamentals of this company is to differentiate the type of security they are dealing with. If it is physical security or cybersecurity. Categorizing the type of security is essential to the organization to ensure that the right countermeasures are deployed. In cybersecurity, the first fundamental is IT policy. An IT policy will be drafted for the employees and the customers who interact with the company. The policy is a set of rules that the company expects the concerned stakeholders to follow in ensuring that data is safe. For instance, in the policy, employees would be expected not to leave their desks without shutting down their computers while the customers are not supposed to share their credit card PIN. The second network security fundamental is the hardware and software components. These components make up the IT security platform. This includes firewalls, the VPN, and other threat detection software. Organizational technology concepts are key elements in organizational operations. This signal indicates that the organization must recognize the importance of information technology infrastructure, which is an asset that requires greater use and security.

Organizations primarily use gen-based email as their means of communication, and email use is strongly influenced by spam sent by spammers (Stewart, 2014). Such malicious emails can force a company to sign malicious websites that install malicious or malicious software, collect illegal information from the organization, destroy the entire organization's system, and use its equipment—keeping company secrets. As such, antispam software installation will be important to prevent spam from interfering with company information (Chen et al., 2016). The virus also poses a threat to corporate network systems, which cause disaster for the machine without the user knowing its effects. If a virus reaches a request on a network system, it may affect other devices. After all, malware is also a threat that the organization seeks to protect itself from. Malware is a malicious tool that criminals use to hijack a corporate network without uncovering malware created by software like Trojans, spyware, and worms.

Recommendations for Network Security

My recommendation to the company is to create a private network for remote callers; they should ensure that they have a firewall that protects the common network; they should also ensure that they update their security policy and train employees constantly, both new and current employees.

Virtual Private Networks and Firewalls

A virtual private network (VPN) is a network that connects an existing body network to another network or one machine through a public network, usually the network as the center for establishing a connection. This is done securely, by introducing "monitors" on the public network, so that information flows only from point A to point B. In other words, the firewall is the port manager. Internal and external traffic monitors when using specific security policies. Managed traffic is the flow of information on a network that protects all other networks or networks.

Among different security aspects, choosing the most appropriate firewall relying upon the components, for example, the services that need to be protected, also different factors, such as the traffic levels and the recognizable proof of intricacy in the relevant protocol, must be assessed sufficiently. Countless services that ought to be applied in the transverse of much confounds firewalls. At the point when a firewall is precisely arranged, it may be valuable in shielding the organization from outside dangers, which include denial of services. On the other hand, a VPN can be installed on general computing devices, such as a virtual server, where various companies make the best use of VPN and standard security networks and make it available to the company's service providers.

The Cisco ASA 5500-X is also my advice as it has created a VPN functionality. Cisco Easy VPN is available for these models and is integrated with the network management tool. This allows for easier management, reducing the number of tracking software. The reason for this proposal is Cisco's support. Cisco has been a market leader for decades and provides a robust infrastructure for its products. The upfront cost may be a problem with this product, but it is solved by the included software such as login detection, malware prevention, and Firepower network management tool.

The most critical step is the implementation stage. This begins with the user level. At this stage, the staff is trained on the basics of information security; this ensures that employees are safe at the highest user level. The next phase of the training will be Internet access as new security measures are implemented, along with the use of DFA. All of these steps are listed by staff members who sign a consent declaration for the use of the Internet.

The next phase of implementation will take place at the system level. At that point, a new firewall is created, security policies are created, and a VPN is created. This is done outside business hours so that they do not disrupt normal activities. As part of this phase, computers must also be updated for users who are logged in to establish a new VPN connection. The final level of implementation is the application. At some point, all this new security implementation begins and is now the reason for employees to connect and work online and monitor network traffic.

For the long term Network security, I would recommend a similar deployment method. More staff need training. Yearly updates, as well as short run-up tutorials, if problems are detected. At the system level, ongoing updates and patches ensure system updates, regular penetration testing by the administrator or third party to ensure that there is no problem. Lastly, strict policy compliance and compliance to ensure that security policies are appropriate and that users adhere to them.

Conclusion

Overall, information about basic network security concepts has developed many recognized cybersecurity practices and methods that are used to create a viable network security management strategy. The use of data from network security practices is important to maintain the effective performance of the organization and the performance of services that improve real-world tasks that focus on important crime prevention procedures and exercises that could harm the results of the organization. It basically captures the viable use of VPNs and firewalls in the organization to promote high-security networking practices that aim to protect important customer information and data for the administrative transfer of the association.

Read More

CHECK THESE SAMPLES OF Concept of Network Security

Network Security and Different Ways to Secure Networks

In order to understand the Concept of Network Security, the core issues related to it needs to be analyzed.... Now let's take a look at the history of network security.... This research will begin with the statement that network security can be defined as the protocols and security measures were taken in order to secure and protect the data in the existing network so that unauthorized access to the data can be prevented.... The Need for network security In practice, network security is an important part of many networks at homes, at public places, at colleges and universities and at various offices such as banks, stock exchanges, all kinds of multinational firms and other businesses, law enforcement agencies and even the Government offices and departments where important information is stored....
9 Pages (2250 words) Essay

Privacy-Enhancing Security Mechanisms

Off-the-record messaging techniques will be used because it enables private conversations over the wireless networks using the concept of encryption, authentication, deniability, and perfect forward secrecy.... There exist many privacy enhancing security mechanisms that ensure secure delivery of data to the intended location.... In this paper, we will discuss the technique to design a reliable and efficient privacy-preserving scheme in order to ensure increased security of data over the network....
3 Pages (750 words) Research Proposal

Network Security as a Business Benefit

ole of network security: How does it protects youIt performs the key role as the name indicates as quoted by (Bragg et al) : • Unauthorized access: It secures the network and does not allow any unauthorized access.... The paper "network security as a Business Benefit" develops the assumption every organization needs its own proper security system to maintain its reputation.... network security refers to any activities designed to protect your network....
6 Pages (1500 words) Case Study

Security and Privacy in the Network Context

We must first ensure that our network security is reliable and constantly updated.... In the paper 'security and Privacy in the Network Context,' the author argues that database security is often disregarded by companies that provide more priority on operating systems and network stability.... The author states that the key to database security is access control.... Oracle's 'Label security' makes another layer of security....
2 Pages (500 words) Essay

Network Security Attack Methodologies

This essay "network security Attack Methodologies" is about the current computer network security systems which are faced by numerous attacks, thus creating the need for robust means of protecting the systems against threats and potential attacks.... Traditionally, the attack on network security systems was purely a matter of fun, where the computer systems attackers and hackers were doing it for the fun of enjoying their prowess in managing to tamper and penetrate through established network security systems....
7 Pages (1750 words) Essay

Role of Network Security: How Does It Protect You

From the paper "Role of network security: How Does It Protect You" it is clear that network security is a very challenging and difficult task.... A network security system is a combination of many computer networks that can be either public or private.... In organizations, enterprises, and other types of institutions network security is involved so as to maintain the confidentiality of their data (King, 10).... Every organization needs its own proper security system in order to maintain the reputation of their company....
6 Pages (1500 words) Essay

Wireless Technology Security and Its Types

This essay "Wireless Technology security and Its Types" discusses three main types of wireless networks and types and security protocols namely, Wireless Wide Area Networks (WWAN), Wireless Local Area Network (WLAN) and Wireless Personal Area Network (WPAN).... Since setting up a wireless network must include means that ensure only authorized users can access and use it, the paper will also look at the security risks government and businesses run by using wireless networks with their associated security measures....
6 Pages (1500 words) Essay

Security Quality Requirements

The authors emphasize that IT infrastructure security practices and the techniques of network security do not adequately guard application software against security threats.... This paper 'security Quality Requirements" focuses on the fact that the authors of the complete textbook draw widely on the systematic method created for the Build security In (BSI) Web site to represent two renowned resources in the security world: Cigital, Inc....
20 Pages (5000 words) Annotated Bibliography
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us