Network Security Essay

1016 words - 5 pages

Network security
Network Security

Installing firewall or anti-virus software on enterprise workstations can help prevent some of the security problems the Internet can cause; but not everything. By understanding the different Open Systems Interconnect (OSI) levels and security threats involved with each one of them, it is easier to plan a strategy to combat security problems.
Purpose and Scope
To cover all areas I have listed the network security measures that are associated with each level of the Open Systems Interconnect (OSI).
Physical layer
This layer is responsible for moving raw bits from one node to another: electrical impulse, light or radio signals. This layer ...view middle of the document...

Making changes to the network topology easy using these Apcon's IntellaPatch switches.
Security being top priority in networks, tools like IntellaPatch Physical Layer switches provide access control for both small and large networks. In large environments or multi-floor building environments where wiring termination points are scattered among various buildings or floors, managing and monitoring those facilities can be a tedious and cumbersome job. This is key for environments like manufacturing where there are multiple work shifts.

Data Link layer
At this layer data packets are encoded and decoded into bits. This layer ensures that everything sent was physically received. This layer encompasses switch security topics such as ARP attacks and MAC flooding. Simple configuration changes to the network switch can help protect enterprise applications from Data layer attacks. At my workplace only authorized users can have access to layer 2 software. The IT department has full control and determines when changes are made and who is authorized to do these changes. Other measures are taken like Shutting down unused ports in the VLAN and limiting the number of allowed MAC addresses by using port security mechanism.
Network and Transport layers
These layers handle the routing or forwarding of data. These layers are where the most common security precautions take place – this layer is where routers and firewalls are implemented. Examples of threats that occur at this level are unauthorized retrieval of endpoint identity and unauthorized access to internal systems. The company utilizes Network Address Translation, Access Control lists, and firewall technologies to mitigate these risks.
Session
This layer sets up, coordinates and terminates conversations, exchanges and dialogs between the applications at each end. This layer also sets up remote communication. At these layers the IT manager's ability to mitigate application security risks begins to diminish as developers take a bigger role in protecting applications. One way to ensure security on this layer is by testing application integrity, proper routing transaction, capability to handle messages under stress and the capability to handle...

Other Essays Like Network Security

Computer Network & Information Security Essay

1478 words - 6 pages do not realize the dangers at hand. This is why users need to learn how to keep their personal computer safe. To achieve a good level of security, there are many important elements that must be taken into account: authentication, access control, data integrity, content protection, etc. Information security can be obtained using methods such as cryptography and network protocols. Computer security is the process of detecting unauthorized use

Tgt2 Apps in Network Security Challenge

1035 words - 5 pages A. Integrity of Network Security Introduction New security policy created for e-mail will ensure e-mails are used for business purpose and limits personal usage of e-mails. Policy also permits Softsearch to monitor employee’s e-mails if required. Controls implemented by e-mail policy will help prevent confidentiality breach. However, e-mail policy does not govern attachments within e-mails. Policy should be enhanced to include e-mail

Recommendations for Wireless Network Security Policy

921 words - 4 pages RECOMMENDATIONS FOR WIRELESS NETWORK SECURITY POLICY Introduction One of the newer technologies being increasingly used in today's business is that of wireless networks. While this technology has the advantages of providing greater user mobility and temporary access, it does have the disadvantage of an intrinsic lack of security. SECURITY THREATS There are a number of types of attack that wireless LANs are vulnerable to, based on

Network Security

1161 words - 5 pages find solutions to mitigate these threats by eliminating vulnerabilities of their system in order to reduce risk of their information and information system. Information security addresses the three following components: confidentiality, integrity and availability, which are the main goal for business toward protecting their information and information system. Confidentiality is basically to ensure no confidential data, such as customers’ data or

Information Technology/Network Security Threats

1465 words - 6 pages Protecting systems against various systems threats such as passwords and cracking tools with brute force or attacks into the system by gaining authentication for access rights including a password, policy, to educate the users. SECURITY CONSIDERATIONS IN THE INFORMATION SYSTEM DEVELOPMENT LIFE CYCLE. Each information security environments unique, unless modified to adapt to meet the organization’s needs. The System Development Life Cycle

Netw420 Cisco Network Management System

661 words - 3 pages Cisco Network Management System NETW-420 Enterprise Network Mgmt Professor Introduction Cisco uses the International Organization for Standardization network management model which defines five functional areas of Network management. The model consists of Fault Management, Configuration Management, Performance Management, Security Management, and Accounting Management. In this paper we will cover the models five functional areas

Assignment Information Use Paper

671 words - 3 pages is data network, I will start off with data network, and my duties are determine what the organization needs in a network and computer system before it is set up. Also install all network hardware and software that need upgrade and repairs before the every one comes in. also I maintain the network and computer system security and ensure that all system is operating correctly. I collect data in order to evaluate the network or system performance

Security Manager’s Role and Responsibilities

1100 words - 5 pages a security manager for the Hospital security manager, network security manager for an information technology company, and a private security manager. Each of these individuals’ roles is crucial to protecting the security needs of their particular organization in their respective fields. Hospital Security Manager The hospital risk manager main task is to stop situations that may cause lost or liability to the hospital. The main

Wireless Network: Is it right for you?

358 words - 2 pages equipped with a wireless network card though.But be advised that although security is not a huge concern among people with wired networks, it must be with a wireless one. In a wireless network, someone could just park their car outside your home or office and start using your network if you don't have proper security measures in place. To prevent this, put a password on your network and then you are all set.

Deterring Network Attacks

961 words - 4 pages Deterring Network Attacks Brandon Curtis Post University Network Security is vital in today’s age of evolving technology, weather the security is for a wired or wireless network. No matter the size or type of network, security should be taken seriously at all times. Any data sent over a network that is not safe, unless the network is secure and encrypted and secured by all necessary means. A recent data breach occurred

Ntc 411 Week 5 Individual Assignment

1045 words - 5 pages As utilization of network, technology evolves so does security issues surrounding it. The growing demand of E-commerce on the internet continues to set infinite risks of being attacked. Security is paramount for safe and secure E-commerce sites. As properly installed and maintained firewall continue providing security, it is not adequate to provide defense against intrusion. For adequate defense against intrusion, Additional security appliances

Related Papers

Network Security Essay

1925 words - 8 pages reason alone that supporters of international law believe that a comprehensive treaty of cyber security would prove to be more beneficial and open than would the use of military force. In their opinion this would lead to a more open and trusting internet for communication and commerce. O’Connell defines two terms in her article that in essence classifies theses types of threats. First there’s computer network exploitation (CNE) which centers on

Network Security Essay

1252 words - 6 pages AIU ENG 107 INDIVIDUAL PROJECT 5 DARRIUS HUGHLEY 12-2-2012 Intro Even though there are some downfalls with having too strong of a firewall or polices; is not being able to access certain websites, databases, and not being able to access the internet or intranet at all that you normally access. The major downfall of having the proper network security is the cost of it. Examples of expenses are but not limited to software, sonic walls

Network Management And Security Essay

2244 words - 9 pages (Name) (Instructors’ name) (Course) (Date) Network Management and Security A telecommunication Management Network, commonly known as TMN, is an infrastructure that provides interfaces for connection between several types of operating systems and telecommunications equipment, so as to manage the telecommunication service and network. This is from Glenn Warnock and Nathoo Amin (215). Also, it enables the functioning of the management

Computer And Network Security Essay

1798 words - 8 pages following is prohibited: * Causing a security breach to either [Company Name] or other network resources, including, but not limited to, accessing data, servers, or accounts to which you are not authorized; circumventing user authentication on any device; or sniffing network traffic. * Use of the Internet or [Company Name] network that violates the [Name of appropriate policy], [Company Name] policies, or local laws. * Intentionally