Network Security

   


 
Network security entails a multitude of technologies, processes, and devices. This domain refers to a set of configuration and rules designed to protect the confidentiality, accessibility, and integrity of computer data and networks using hardware and software technologies (LaBounty, 2020). Most organizations require network security solutions to protect them from ever-growing cyber threats. Hackers are always trying to exploit and find vulnerabilities in various areas such as devices, users, data, applications, and locations. Thus many network security management tools address individual exploits and threats and regulatory non-compliance. In network security management, many layers safeguard an organization's data since attacks can happen at any network security layer. Therefore, organizations employ computer gurus to model hardware, software, and policies designed to address all network layers. Furthermore, network security has three different controls mainly, technical, physical, and administrative.

    Physical network security entails controls designed to prevent unauthorized personnel from accessing physical network components such as cabling cupboards and routers. In the organization, IT specialists use controlled access on areas such as biometric authentication and locks. Additionally, technical network security protects data that organizations store on their networks or data in transit across, into, or out of the organizational network. In this layer, the protection is twofold as it aims to protect data and systems from malicious employees and unauthorized personnel. Administrative network security entails processes and policies that control user behavior, such as authentication, their level of access, and how the IT department implement changes to the infrastructure. Similarly, there are different types of network security through which organizations can secure their network. Under network access control (NAC), organizations can ensure that malicious attackers do not infiltrate their network by installing comprehensive access control policies.

    Furthermore, organizations can use NAC at the granular level. For instance, management could grant administrators full access to the network but limit access to important folders or prevent their devices from joining the organizational network. Antivirus and Antimalware software offers protection from various malicious software such as ransomware, viruses, phishing, trojans, and worms. Social engineering refers to the use of deception to manipulate people into giving personal information that may be used for malicious intent. Phishing is a social engineering attack utilized to access user data, such as login credentials and credit card numbers. This malice occurs when an attacker masquerades as a trusted entity and compels a victim to open an instant message, an email, or a text message. The NAC software regularly scans and tracks files upon entry to the organizational network. The other network security is firewall protection, where firewalls serve as a barrier between trusted internal networks and untrusted external networks. Finally, virtual private networks establish a connection to the network from another site or endpoint. For instance, home-based employees can connect to the organizational network over a VPN. Moreover, data between the two points will require encryption, and the user will have to authenticate to enable communication between the network and their device. Other network security types are application security, data loss prevention, behavioral analytics, email security, network segmentation, and security information and event management.

    Correspondingly, network security faces various attacks such as passive and active. In passive attacks, an intruder may intercept data traveling through the network. In contrast, in active attacks, an intruder may initiate commands to damage the network's normal flow of operations to access data via the network. Some of the passive attacks are wiretapping, encryption, traffic analysis, and a port scanner, while active attacks are DNS spoofing, heap overflow, and phishing. Therefore, organizations need to reduce their susceptibility to attacks by employing the principles of secure network design. Some of the principles are mediated access, compartmentalization, defense in depth, accountability, and traceability (Learncisco, 2020). Similarly, students may also equip themselves with network security fundamentals to identify information security attacks and implement security controls. Ergo, efficient and effective network security is vital in protecting proprietary information.


References

 LaBounty, C. (2020). What is Network Security and Why is it important? Retrieved from herzing.edu: https://www.herzing.edu/what-network-security-and-why-it-important

Learncisco. (2020). Principles of Secure Network Design. Retrieved from learncisco.net: https://www.learncisco.net/courses/iins/common-security-threats/security-architecture-design-guidelines

 

 

Comments

Popular Post

Web/Mobile App Critique

Traveling Through a Network

Programming Language