StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Security - Research Paper Example

Cite this document
Summary
This essay talks about network security. The idea behind the development of the internet was to create a system that would make it possible for deferent computers in universities and laboratories to be linked. The internet was therefore a tool used based on a trust-all operating environment…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.5% of users find it useful
Network Security
Read Text Preview

Extract of sample "Network Security"

 Introduction The idea behind the development of the internet was to create a system that would make it possible for deferent computers in universities and research laboratories to be linked. As a private property of the US Defense Department in the 1980’s, the designers did not have the idea of internet security and confidentiality. Attempts to make the internet safer were initiated years later through the introduction of other features such as the IP version 6 (Shaw, 2006). The internet was therefore a tool used based on a trust-all operating environment due to absence of security threats at the time. This perception of the internet changed after it was commercialized as it has attracted both genuine users and others who pose deferent categories of risks top the network. Consequently, internet security has become one of the most researched aspects of information technology as developers and hackers attempt to find weaknesses in the systems developed by the other. For any given organization, network security involves the introduction of polices that would protect the available network to ensure unauthorized persons do not access or use the organizational information. Although a number of authors insist the role of network security is to project computers and networks, Canavan (2001) asserts the importance of network security to focus on the organizational information and the ability to access the information as the main concern of network security. Consequently, Canavan (2001) notes information security should firstly guarantee confidentiality to ensure protected information is not accessed by unauthorized persons by way of interception, replicating or copying. Secondly, the security of information (therefore the network) should ensure the integrity of data is upheld to improve confidence in the accuracy of the information curried by a specific network. Thirdly, the established security should ensure the information is available when needed by the authorized persons by making it easy to retrieve. Lastly, authentication is also necessary for network security since it enables the determination of end users who have the authority to access given information. Even as it is essential that network security guarantees authentication, availability, integrity and confidentiality is important to note that “network security is not absolute” (Canavan 2001, p.10). Network security should be perceived as a continuum that moves from very unsecure to very secure which makes it possible for organizations to rank their network security based on comparison with other security systems to determine whether is secure or less secure. The security level of any network also depends on the organizational needs where some might deem information highly valuable therefore requiring that only authorized users gain access while others would allow outsiders to access information but ensure protection against attempts to modify the available information. At the same time there are organizations that demand all the organizational information on computers and networks remain private by instituting authentication for both the sender and receiver of such information (Jia and Zhou, 2005). The extent to which organizational network security ensures protection will therefore depend on the security policy adopted as it is what will determine the type of access required. Technology used in development of a secure network depends on three models that include obscurity, perimeter defence, and defence in depth approach. For security by obscurity, network security depends on the ability of the system in place to keep the network undetected by unauthorized persons. The main basis for this model is that one cannot attack a network that is not known to be in existence. Consequently security by obscurity depends on applications which ensure an organizational network is hidden or is not advertised to unauthorized persons therefore improving the level of security. However, this method of ensuring the network is secure faced a major challenge especially in the long run as there is still chances one might detect it after sometime therefore making it vulnerable to attacks (Canavan, 2001). The second model of network security involves the creation of perimeter defence which depends on the ability of the organization to strengthen other related systems and border routers. Additionally, an organization might choose to hide it network by way of creating a firewall that separate the network carrying important organizational data from other networks that are not trusted. While this method ensures the peripheral networks are secure, the rest of systems depending on the network are left unprotected from network that are not trusted with the assumption being securing the perimeter defences ensures unauthorized persons will not access the internal systems within the organizational network. This method of ensuring network security has a number of shortcomings where for instance it does not cover the security of data from access done within an organization but by unauthorized persons. This means anyone within the organization might gain access to vital information which might result in attacks on the system from internal sources. Secondly, an attacker successfully overcomes the defences on perimeter networks, internal network systems are left vulnerable which makes them easy to access (Canavan, 2001). To ensure organizational data is better secure, it is advisable to use defence in depth model since the method focuses on all the systems used by an organization. Defence in depth approach to network security depends on hardening and monitoring each system to make sure each system has an internal mechanism for protection against any attack. This method combines securing of internal system with that of perimeter systems since securing organizational data does not depend on securing the perimeter systems alone. This approach creates a higher level of network security as in case of security breach on perimeter network that might result from for instance use of unsecured modem by the administrator the internal systems are able to initiate defence mechanisms. Any attempt to hack into such a system will be communicated to the administrator as networks on the system have the ability to detect unauthorized activities. The defence in depth approach is also most likely to detect unauthorized activity from within the organization as all activities are monitored (Canavan, 2001). Future Trends in Network Security The adoption of cloud computing has been gaining prominence in the recent past owing to continued reduction in cost of adopting the technology. Consequently, network security will in future extend data protection efforts to this field of information technology. Cloud computing offers a range of benefits to users but provides an avenue for new security risks as computers are co-located in remote facility among unknown and potentially malicious servers therefore increasing the risks of access to information by unauthorized persons compared physical storage facilities (Hashizume, Rosado, Fernández-Medina and Fernandez, 2013). The increased risk associated with cloud computing and shift to virtualization is evident in incidences such as the Microsoft Sidekick where many users of the facility lost some valuable data due to catastrophic system failure (Calloway, 2012). This is because information stored using cloud computing are largely unprotected therefore increasing chances that they can be unsecure and in some cases unrecoverable. There are several levels of risk associated with cloud computing and therefore pose challenges for future successful use of the technology. Firstly, cloud computing increases the risk of network security by providing a new ground for cybercriminals to manipulate connections to the cloud. Secondly, there are potential attacks that can target the cloud itself (Hashizume, Rosado, Fernández-Medina and Fernandez, 2013). The threat related to clouding computer services related to continued development of wireless networks. Wireless networks have brought an end to the more traditional static endpoints characterized by access to information via use of a PC. Most of the available network security options were also developed to reflect this trend where PC were connected with cables and therefore not portable during the time of usage. In recent years both software and hardware developers have shifted their interests to devices such as smart phones which targeted various markets for business for instance Blackberry from RIM and for entertainment such as Apple iPhone. Many of the network security threats that had been associated with PC will now shift to the mobile phone sector as more people use smart phones to access their emails, web browsers in addition to increased business transactions done via the phones. A number of business organizations have introduced platforms such as Black Lab Mobile and Upaid Systems where clients can purchase goods and services using their phones. Consequently, the shift from dumb phones to smart phones have increased the incentive for unauthorized persons to attempt to gain information about people whose devices are used for financial and other business functions (Portokalidis, Homburg, Anagnostakis and Bos, 2010). The threat on Smartphones was for instance highlighted in a study by McAfee Company which proved that data from Apple iOS can be accessed remotely with the aim of stealing valuable data on email and messages. This study by McAfee also indicated the operating system would also fail to indicate the attack was underway (Kizza, 2013). Legal Frameworks in Network Security At the national level, there are a number of regulatory measures taken to improve the level of security for the data made available to different government and private organizations. laws governing network security are generally put in place to ensure those with legal rights to access certain user information have put in place mechanisms that distinguishes between authorized and unauthorized users as well as the ability to block access by those not authorized. Network security laws generally apply to the laws governing access to private information and have general application in cybercrime. The legal requirement ensures organizations secure user information from both external and internal unauthorized persons as part of compliance with regulatory policies. Within the organization, network security involves introduction of policies regulating the use of information through introduction of audit measures for information such as login, logout, system objects, remote access, actions undertaken by administrators and system events all which should also carry information such as, ID of the user plus date and time of access, action performed and whether it was successful or failed. Regulation of employee access to a given network should also include specifications about the access of internal system from locations outside the premises with stringent authentication measures imposed on such access. Additionally, the network security policy should include specification on locations where security programs will protect the network from malicious codes like viruses, backdoors and root kits. These are some of the necessary aspects of internal regulation to ensure protection of information from access by unauthorized employee (Singh, 2011). Regulatory efforts by the government cover access and use of information by both employees of an organization and outsiders. Although there is no law in the USA that directly addresses, network security, this is an area that is well covered by legislations in different sectors including business, health, insurance and national security. These regulations target the security of both the private and public systems from unauthorized entry and are based on the initial Computer Fraud and Abuse Act of 1986 that introduced the general laws on computer related crimes within the US. Among the most recent federal legal policies on network security is the Federal Information Security Act (FISMA) of 2002 whose role is to provide the framework for protecting federal computer systems. FISMA creates a secure environment for federal systems by making it mandatory for government agencies make an account of all the major computer systems with the purpose of identifying and provision of the necessary security. Network protection on private systems does not follow any federal law excepting when dealing with federal contractors. This does not mean private information has been excluded from federal protection as there are legal requirements covering the organizations handling personal information to ensure confidentiality of such information is maintained. Firms dealing in the financial sector must observe federal requirements for organizations registered with the Security and Exchange Commission and covers information regarding the access and use of financial reports. Protection by federal law covers certain private systems when information processing is via electronic means (Moteff, 2004). Apart from the laws governing the use of information within the Security and Exchange Commission, there is also the Gramm-Leach-Bliley Act which forces financial institutions to undertake security measures that protect the confidentiality of non-public personal information given by customers. The Gramm-Leach-Bliley Act empowers various federal regulatory agencies such as the Comptroller of the Currency and the Federal Deposit Insurance Corporation to involve all stakeholders in developing regulations that meet requirements of the law (Moteff, 2004). There are also regulatory measures to ensure organizations protect networks from being infiltrated by unauthorized persons. An important law in the health care sector is the Health Insurance Portability and Accountability Act of 1996 which allows the Secretary of Health and Human Services to develop principles enforcing integrity and confidentiality of client health information, measures against potential threats and to ensure officers meet the terms specified under the act. After the 9/11 attacks the US government adopted the USA Patriot Act of 2001 followed by the amendment of the law into USA PATRIOT Improvement and Reauthorization Act whose goal is to protect networks within the country from being used for terrorism reasons (Whitman and Mattord, 2011). Global Implications of Network Security The increased focus on network security has a global implication on access and usage of information within computer systems. Globalization has made access to information easy as people are able to communicate and engage with others around the world. This linkage increases the level of threat for those connected by the World Wide Web as hackers can now access information of people all over the world. The need for a secure network is even higher as people increasingly conduct important business through the internet. Many people find it easy to communicate through the internet due to the provision of real-time communication avenues such as live stream of live proceedings. Apart from the communication aspect of doing business there are other functions such as online purchases of goods and services. Unauthorized access to online information from a single location in the world is therefore a potential threat to the whole world since one can access personal private information about items such as credit cards (Bayuk and Schutze, 2009). Even as the threat on information multiplies due to globalization, there is need for organizations to coordinate efforts on network security for them to be successful in creating secure avenues for communication. There is already a basis for such global partnerships especially based on the set standards like the Internet Protocol (IP) which is important in tracking global footprints (Bayuk and Schutze, 2009). This collaboration become necessary especially when dealing with cyber attacks as it provides the necessary grounds to deal with network security challenges involving cross-currier problems. Conclusion Based on the above study in the field of network security, it is important that organizations guarantee the security of information under it authority to ensure authenticity, availability, integrity and confidentiality such data. Technological approaches that include obscurity, perimeter defence and defence in depth to improve network security have been highlighted with their strengths and areas of weakness pointed out. Further future challenges around network security has also been assessed with interest being on the increased use of wireless networks. The introduction of wireless networks has led to the development of devices such as Smartphones and other technological innovations such as cloud computing which increases security threats to organizational or personal information. The global implications of these developments have also been covered with emphasis being on the need for organizations to work together in dealing with various security challenges on their networks. References Bayuk, J. L., & Schutzer, D. (2009). Enterprise information security and privacy. London: Artech House. Calloway, T. J. (2012). Cloud computing, clickwrap agreements, and limitation on liability clauses: A perfect storm. Duke Law & Technology Review, 11, 163. Canavan, J. E. (2001). Fundamentals of network security. London: Artech House. Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(1), 1-13. Jia, W., & Zhou, W. (2005). Distributed network systems: from concepts to implementations (Vol. 15). New York: Springer. Kizza, J. M. (2013). Guide to Computer Network Security. New York: Springer. Moteff, J. (2004). Computer Security: A Summary of Selected Federal Laws, Executive Orders and Presidential Directives. Washington, D. C: Congressional Research Service. Portokalidis, G., Homburg, P., Anagnostakis, K., & Bos, H. (2010, December). Paranoid Android: versatile protection for smartphones. In Proceedings of the 26th Annual Computer Security Applications Conference (pp. 347-356). ACM. Shaw, W.T. (2006). Cybersecurity for SCADA systems. Tulsa, Oklahoma: Pennwell books. Singh, B. (2011). Network Security and Management. New Delhi: PHI Learning Pvt. Ltd. Whitman, M., & Mattord, H. (2011). Principles of information security. Stamford, CT: Cengage Learning. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Security Research Paper Example | Topics and Well Written Essays - 2500 words - 3”, n.d.)
Retrieved from https://studentshare.org/information-technology/1652626-network-security
(Network Security Research Paper Example | Topics and Well Written Essays - 2500 Words - 3)
https://studentshare.org/information-technology/1652626-network-security.
“Network Security Research Paper Example | Topics and Well Written Essays - 2500 Words - 3”, n.d. https://studentshare.org/information-technology/1652626-network-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Security

Network Security Plan

The paper "Network Security Plan" establishes the loopholes different hackers can try to use to access the organization's network.... Response teams in case of any intrusion will include people like the Network Security companies or the information technology department within an organization.... These threats can lead to organizations losing their credibility on maintaining the security of their clients' data.... The physical security will involve securing network cables and servers from intruders....
9 Pages (2250 words) Case Study

Best Practices for Network Security

Best Practices for Network Security.... Name University Best Practices for Network Security With a lack of security policy and the ability of the system can be affected.... Quoting Gary Mileisfeky, “These two servers were like putty to the hackers - one SQL Injection attack and thousands of consumer records were grabbed, sold and used for siphoning money from the credit cards”(12 Best Practices for Online security).... It is now possible for you to purchase lists of Social security numbers, forenames, addresses, telephone information, bank account archives and credit cards on the black marketplace....
4 Pages (1000 words) Research Paper

Data and Network Security

This paper ''Data and Network Security'' tells that The company is known as 'Enterprise Training Solutions' is involved in the primary activity of providing training services and is based in Leeds, England as well as in Edinburgh, Scotland.... This point signifies the fact that there are no notable security measures at least for the ground floor.... The fact that a large share of 'Enterprise training solutions' offices are located on the ground floor adds to the threat of a potential security breach....
11 Pages (2750 words) Essay

How Sony PlayStation Network Was Targeted

Hackers gained the unauthorized access of customers' data by accessing the Sony's PlayStation network servers.... million Sony… On April 19, Sony detected strange activity on the network system, and noticed the unauthorized access of the company's servers on next day....
3 Pages (750 words) Essay

Network Security Architecture

These two approaches, however, entail some basic differences which majorly impact deployment costs, management and security.... These two approaches, however, entail some basic differences which majorly impact deployment costs, management and security.... The security edge in the Centralized approach is the WLAN switch.... In Distributed Architecture, on the other hand, security is extended to the client devices where strong encryption occurs at both the APs and client devices along with authentication....
1 Pages (250 words) Research Paper

Network Security, the Heartbleed Bug

It is a broadly used application of the Transport Layer security (TLS) protocol.... It was labeled Heartbleed because it affects an extension file to the SSL (Secure Sockets Layer) and improper This essay focuses on the increased concern over the effects of the heartbleed bug on the internet security (Codenomicon, 2014).... The SSL/TLS covers privacy and communication security for applications found in the Internet such as the web, instant messaging (IM), email and virtual private networks (VPNs)....
4 Pages (1000 words) Essay

Questions in Network Security

When combined, key distributions and performance are facilitated without any security sacrifices.... They both designed to serve the purpose of ensuring communications security over any computer network.... eb ServersCA Name/ ClassAsymmetric Algorithm/Key lengthSymmetric Algorithm/Key lengthHash AlgorithmYour Rating of security(1-5)FidelityEntrust Certification Authority-L1E2048-bit _RSA-SHA23.... Conclusion security in internet connection and sending of information over the network is every individual's, company's or organization's interests....
1 Pages (250 words) Coursework

Twohands Corporation Network Security Policy

The paper "Twohands Corporation Network Security Policy" states that The security framework in place is subjected to all the users in the system to ensure proper running of the corporation's operations and keeping the potential threats and risks at a bare minimum.... hellip; In general, network audits and monitoring should be carried out regularly to help maintain the operation assurances of the security plans.... This can be successfully carried out by using automated tools, internal control audits, and the development of security checklists and/or by penetration testing (Whitman & Mattord, 2012)....
6 Pages (1500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us