NETWORK SECURITY
STUDENT NAME
COURSE NAME
COURSE CODE
INSTRUCTURE
Developing security strategies to protect the entire complex network having a limited effect can ease use and performance. Cyberspace securing systems have to be designed and implemented. Practical strategies employed to ensure cybersecurity include;
- Developing a secure cyber ecosystem– this strategy surveys the future of having a healthy and robust cyber ecosystem to prevent cyber-attacks, find solutions in case of an attack, and decrease inconvenience in case of an attack. A robust cyber ecosystem has automation, authentication, and interoperability, which present monitoring techniques where software systems used to notify security weaknesses. Types of attack can be; malware, attrition, hacking, improper usage, and social tactics.
- Protecting crucial data infrastructure- critical information infrastructure forms the backbone of institutions, both private and public, thus impacting its national and economic security. Government has to work with the private sector to prevent and coordinate in mitigating against cyber-attacks.
- Creation of an assured framework-the national framework; the Cybersecurity Assurance Framework is developed to cater to the federal security requirements. The body accommodates critical infrastructure, which aids the government to enable and endorse actions.
- Strengthening the regulatory framework- a working 24/7-hour mechanism has to be endorsed to curb the cyber threats through the National Critical Information Infrastructure Protection Center (NCIIPC)
- Developing mechanisms for Information Technology security-primary instruments used to ensure IT security include end-to-end measures, data encryption, link-oriented measures, and association-oriented measures. (Soliman &Omari, 2004)
Firewall monitoring is a process of tracking an important firewall metrics which plays a crucial role in ensuring efficient performance in the firewall. Though, firewall being a critical component securing the network, it has the following limitations; firewall cannot enforce the user’s password policy, it cannot prevent the users from making poor decisions, cannot protect the user when his/her security policy is too lax, cannot protect from some viruses and new threats, cannot protect from malicious insiders and protect against the administrator who does not correctly set it up. The modern firewall has two administrative interfaces: the CLI and the GUI. The CLIs need the knowledge to command and install email and web traffic, for instance, by using the IPTables CLI to allow secure inbound shell (SSH). Managing firewalls using a GUI is more user friendly in configuring. Some are configured directly through a direct interface on the host.
The management of firewalls needs a detailed understanding of data networking elements, which includes routers and switches. The firewall design should consider the firewall effective and efficient and should have a security barrier between the two networks (traffic coming in and out of the gate of one system) to accept or deny connections as per rules and regulations. (Al-Ashaer & Hamed, 2004) the following are best firewall management that will benefit all networks;
- Check the effect of firewall policy change- a virtual sandbox can test the policy change. Done through finding all routable paths and considering the NATing account, and finally evaluating the ACL on each device along the path to spot if the devices allow or drop the packet.
- Clear up and optimize the firewall rule base. It’s a fundamental activity having a positive impact on amplifying firewall protection, boosting operational efficiency, and enhancing performance.
- Update frequent firewall security audits. Firewall security audits are mandatory in ensuring compliance with the administrative security regulations and any external regulators that apply.
- Update firewall software regularly. Upgrading keeps the software updated, thus not leaving loopholes, which could be a source of compromising securities.
- Monitor the accessibility of users and control the who modify and configure the software firewall.
Network security is securing the network against unauthorized access, misuse, malfunction, improper disclosure, and protecting underlying networking infrastructure. Network security involves; access control, firewalls, Virtual Private Networks(VPN), wireless security, and behavioural analytics. (Choudary, 2020). Three basic network security concepts to inform are confidentiality, integrity, and availability. Concerning concepts who use the information, authentication, authorization, and non-repudiation. (Anderson, 1985)
REFERENCES
Soliman, H. S., & Omari, M. (2004). The new design strategy of dynamic security implementation. In IEEE Global Telecommunications Conference Workshops, 2004. Globe Com Workshops in 2004. (pp. 442-446). IEEE.
Al-Akhras, M. A. (2006, April). Wireless Network Security Implementation in Universities. In 2006 2nd International Conference on Information & Communication Technologies (Vol. 2, pp. 3192-3197). IEEE.
Chomsiri, T., He, X., & Nanda, P. (2012, November). Limitation of the listed-rule firewall and the design of a tree-rule firewall. International Conference on Internet and Distributed Computing Systems (pp. 275-287). Springer, Berlin, Heidelberg.
Al-Shaer, E. S., & Hamed, H. H. (2004). Modelling and management of firewall policies. IEEE Transactions on network and service management, 1(1), 2-10.
Anderson, J. P. (1985, April). A unification of computer and network security concepts. In 1985 IEEE Symposium on Security and Privacy (pp. 77-77). IEEE.