This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

NETWORK SECURITY

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

 

 

 

NETWORK SECURITY

STUDENT NAME

COURSE NAME

COURSE CODE

INSTRUCTURE

 

 

 

 

 

 

 

 

 

 

Developing security strategies to protect the entire complex network having a limited effect can ease use and performance. Cyberspace securing systems have to be designed and implemented. Practical strategies employed to ensure cybersecurity include;

  1. Developing a secure cyber ecosystem– this strategy surveys the future of having a healthy and robust cyber ecosystem to prevent cyber-attacks, find solutions in case of an attack, and decrease inconvenience in case of an attack. A robust cyber ecosystem has automation, authentication, and interoperability, which present monitoring techniques where software systems used to notify security weaknesses. Types of attack can be; malware, attrition, hacking, improper usage, and social tactics.
  2. Protecting crucial data infrastructure- critical information infrastructure forms the backbone of institutions, both private and public, thus impacting its national and economic security. Government has to work with the private sector to prevent and coordinate in mitigating against cyber-attacks.
  3. Creation of an assured framework-the national framework; the Cybersecurity Assurance Framework is developed to cater to the federal security requirements. The body accommodates critical infrastructure, which aids the government to enable and endorse actions.
  4. Strengthening the regulatory framework- a working 24/7-hour mechanism has to be endorsed to curb the cyber threats through the National Critical Information Infrastructure Protection Center (NCIIPC)
  5. Developing mechanisms for Information Technology security-primary instruments used to ensure IT security include end-to-end measures, data encryption, link-oriented measures, and association-oriented measures. (Soliman &Omari, 2004)

Firewall monitoring is a process of tracking an important firewall metrics which plays a crucial role in ensuring efficient performance in the firewall. Though, firewall being a critical component securing the network, it has the following limitations; firewall cannot enforce the user’s password policy, it cannot prevent the users from making poor decisions, cannot protect the user when his/her security policy is too lax, cannot protect from some viruses and new threats, cannot protect from malicious insiders and protect against the administrator who does not correctly set it up. The modern firewall has two administrative interfaces: the CLI and the GUI. The CLIs need the knowledge to command and install email and web traffic, for instance, by using the IPTables CLI to allow secure inbound shell (SSH). Managing firewalls using a GUI is more user friendly in configuring. Some are configured directly through a direct interface on the host.

The management of firewalls needs a detailed understanding of data networking elements, which includes routers and switches. The firewall design should consider the firewall effective and efficient and should have a security barrier between the two networks (traffic coming in and out of the gate of one system) to accept or deny connections as per rules and regulations. (Al-Ashaer & Hamed, 2004) the following are best firewall management that will benefit all networks;

  1. Check the effect of firewall policy change- a virtual sandbox can test the policy change. Done through finding all routable paths and considering the NATing account, and finally evaluating the ACL on each device along the path to spot if the devices allow or drop the packet.
  2. Clear up and optimize the firewall rule base. It’s a fundamental activity having a positive impact on amplifying firewall protection, boosting operational efficiency, and enhancing performance.
  3. Update frequent firewall security audits. Firewall security audits are mandatory in ensuring compliance with the administrative security regulations and any external regulators that apply.
  4. Update firewall software regularly. Upgrading keeps the software updated, thus not leaving loopholes, which could be a source of compromising securities.
  5. Monitor the accessibility of users and control the who modify and configure the software firewall.

Network security is securing the network against unauthorized access, misuse, malfunction, improper disclosure, and protecting underlying networking infrastructure. Network security involves; access control, firewalls, Virtual Private Networks(VPN), wireless security, and behavioural analytics. (Choudary, 2020). Three basic network security concepts to inform are confidentiality, integrity, and availability. Concerning concepts who use the information, authentication, authorization, and non-repudiation. (Anderson, 1985)

 

 

 

 

 

REFERENCES

Soliman, H. S., & Omari, M. (2004). The new design strategy of dynamic security implementation. In IEEE Global Telecommunications Conference Workshops, 2004. Globe Com Workshops in 2004. (pp. 442-446). IEEE.

Al-Akhras, M. A. (2006, April). Wireless Network Security Implementation in Universities.       In 2006 2nd International Conference on Information & Communication Technologies (Vol. 2, pp. 3192-3197). IEEE.

Chomsiri, T., He, X., & Nanda, P. (2012, November). Limitation of the listed-rule firewall and the design of a tree-rule firewall. International Conference on Internet and Distributed Computing Systems (pp. 275-287). Springer, Berlin, Heidelberg.

Al-Shaer, E. S., & Hamed, H. H. (2004). Modelling and management of firewall policies. IEEE Transactions on network and service management1(1), 2-10.

Anderson, J. P. (1985, April). A unification of computer and network security concepts. In 1985 IEEE Symposium on Security and Privacy (pp. 77-77). IEEE.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask