Monday, May 13, 2019

Computer Network Security Case Study Example | Topics and Well Written Essays - 1250 words

Computer electronic ne twork hostage - Case Study ExampleIn order to defend digital learning, organizations argon keen to implement technical controls such as firewalls, Intrusion Detection Systems, honeypots and Demilitarized zones. These controls are considered as logical and provide aegis measures on the logical layer. However, often the important aspect i.e. information security heed is not addressed to the optimal level. A typical information security plan is led by an information security manager who establishes a steering committee for discussing security aspects counseling not only on the IT department but every department within the enterprise. Some of the watchfulness controls that are implemented by the information security manager are IT governance, Risk management, monitoring gravestone Process Indicators (KPI) and Key Goal Indicators (KGI). KPI demonstrates the current state of security within an organization and KGI demonstrates the level of security to be a chieved. As per the current scenario, critical data must be protected by implementing Firewalls to unassailable the network from external logical threats and Virtual Private Network go forth be implemented for securing the data transmission on the Wide Area Network. 2 Detailed Network Security Recommendations 2.1 Fundamentals of Firewall and VPN Network security appliances are implemented for providing three fundamental functions i.e. prevention, detection, and correction. Some of the most commonly adopted security appliances are Firewalls and Intrusion Detection Systems. Firewall is defined as a piece of software or computer hardware device that ? filters the information coming through the Internet connection into a private network or a computer system. Firewall enforces an access control policy between two or more networks with two key functions to block unwanted traf?c, and to permit wanted traf?c (Firewall.2007). Similarly, as per network dictionary, Intrusion detection syst em is defined as Intrusion detection system (IDS) is a type of security management system for computers and networks. An IDS gathers and analyzes information from various areas within a computer or a network to commit possible security breaches, which include both intrusions and misuse. 2.2 Recommendation for Firewall and VPN Remote access VPN provide emulation of a workstation to a remote user. It can extend every application related to data, video or voice communication. Remote access VPN can provide highly customizable and secure remote access to employees anywhere anytime with any matched device (Vachon & Graziani,). They can access the network resources and data access with any compatible device. The remote access VPN portrays a realistic user experience as the user access his experience system. The access is more flexible and easy because it can be operated by any compatible cipher device. Remote access VPN supports a wide variety of connectivity options and platforms, f ulfilling the user requirements efficiently. 2.3 Recommended Solution for the Enterprise-A recommended solution for the enterprise will be a hardware-based firewall that is also called as Adaptive Security appliance ASA 5500 from Cisco. The Cisco ASA 5500 Series Security Appliances personalize the security for specific network requirements such as securing credit card transactions.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.