StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Telecommunications & Network Security, Application Security, and Operations Security - Assignment Example

Summary
This paper "Telecommunications & Network Security, Application Security, and Operations Security" focuses on the telecommunication and network security domain concern the security of data and voice communications through a remote access network, local area network and wide area network.  …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.7% of users find it useful
Telecommunications & Network Security, Application Security, and Operations Security
Read Text Preview

Extract of sample "Telecommunications & Network Security, Application Security, and Operations Security"

 Telecommunications & Network Security, Application Security, and Operations Security The telecommunication and network security domain concern the security of data and voice communications through remote access network, local area network and wide area network. Telecommunication and networking use various devices, mechanisms, protocols and software that integrate and interrelate with each other. Networking is one of the most difficult topics in the computer field as it involves many components (Traynor, McDaniel & Porta 2008). The main focus is in understanding the important networking models. Open Systems Interconnect and TCP/IP models are important as they follow a layered approach to networking. The models follow security mechanisms for intranet, internet and extranet in terms of routers, firewalls, protection systems and intrusion detection. Open System Interconnection (OSI) This is a reference model of how messages are to be transmitted in a telecommunication network between two or points. Its function is to guide program implementers so that their products work well with others. It defines layers of functions that take place at the end of each communication. It was developed in 1983 by representatives from major telecommunication and computer companies. The main idea behind OSI is that the process of communication between two points can be into layers. Each will have its own cumulative function. OSI divides the communication process into seven layers namely; application, presentation, session, transport, network, data-link and the physical layer. The first four get used when a message passes to or from a user. The last three layers get used when it passes through the host computer. Transmission Control Protocol/Internet Protocol (TCP/IP) This is the main protocol or communication language of the internet. It is a two layer program. The upper layer, Transmission Control Protocol, controls the assembling of a file into small packets transmitted over the internet. The lower layer, Internet Protocol, manages the address part of each packet in an attempt to get to its destination. TCP/IP utilizes the client/server mode of communication. It is a point-to-point communication with each message from one point to another point or the host computer. APPLICATION SECURITY This is the use of hardware, software and procedural methods to guard/prevent applications from external threat. Security is becoming an important concern in software designing as applications continues being accessible over networks. Security measures put in applications minimizes the chances of unauthorized codes from accessing, stealing, or deleting sensitive data from other applications (Thuraisingham 2005). Action put in place to ensure application of security is called countermeasures. A basic countermeasure is the application firewall software that limits execution of files by other programs. A router prevents the IP of an individual computer from being visible on the internet. Other important countermeasures include; anti-virus programs, conventional firewalls, encryption programs, spyware detection and biometric authentication systems. Application security gets enhanced by defining enterprise assets and identifying the role of each application. Identifying potential threats and documentation of adverse events can also enhance application security (Thuraisingham 2005). Some good application security software includes; DbProtect This is a data security platform designed to uncover identification and access control issues, database configuration mistakes, toxic combination of settings, missing patches, denial of service, data leakage and modification of data in data stores. It enables companies and organizations to secure their databases and data stores. AppDetectivePRO This is a big data scanner and database that rapidly uncovers configuration mistakes, missing patches, data leakage, unauthorized modification of data and denial-of-service for data in data stores. The application has a simple setup that discovers, assesses and reports on risks and security of databases in the working environment. This application can be a good addition to other existing toolkits with its aim being big data stores and relational databases. HP Fortify Real-Time Analyzer This analyzer is effective in preventing known vulnerabilities attacks and reporting updates of new vulnerabilities. The analyzer automatically collects data on attacks and monitors other applications. It integrates well with other remediation and security tools. Users can configure the software in different ways in response to detected attacks. OPERATIONS SECURITY (OPSEC) Operation security involves the process of identification, control and protection of unclassified data, which could be used for inconvenience when known by the competitors. Various situations of an adversary or competitive environment use this process. Contractors and governments use OPSE in the developments and acquisition of new equipment. Warfighters, intelligence collectors and private enterprise use it to supplement traditional security measures. This is done to protect exploitable information. It is a risk management tool that enables commanders and managers view activities in the perspective of an adversary (Rittinghouse 2003). The OPSEC involves five interdependent stages. It starts by identifying the critical information. This information regards to what is to be protected and if the whole process will get embedded within an acquisition program. The second element in the process involves analysis of the threat. It involves identification of how the adversary will collect information. The third phase involves the state of vulnerabilities that surround the operation. The activity to be investigated gets monitored on how it works. The manager then evaluates the risks in the activity or operation. The final stage is where the manager chooses various countermeasures or solutions to reduce risks to levels that are acceptable. Various systems can be used to gather information in security operations (Rittinghouse 2003). Configuration Assurance Server (CAS) This software verifies network related security issues and policies. It identifies pinpoints, security gaps and disfigured nodes that are responsible for blocking valid connectivity. It checks and reports compliance with regulatory requirements and the internal IT. Network Compliance Manager (NCM) It is responsible for tracking, regulating and configuring software changes on different routers. It tracks compliance with information technology, corporate governance and best practices in technology. Cisco security monitoring, analysis and response system It identifies and mitigates security vulnerabilities. It identifies attacks on the Cisco network through topology, configuration and behavior of the environment. References Rittinghouse, J. W., & Hancock, B. (2003). Cybersecurity operations handbook. Amsterdam: Elsevier Digital Press. Thuraisingham, B. M. (2005). Database and applications security: integrating information security and data management. Boca Raton, FL: Auerbach Publications. Traynor, P., McDaniel, P., & Porta, T. F. (2008). Security for telecommunications networks. New York: Springer. Read More
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us