In: Computer Science
Briefly describe at least six (6) ways to harden a network, including servers and workstations, and the network configuration (architecture); then explain in detail the first two steps you would take toward achieving a secure network.
Six ways to harden anetwork:--
1 Use a layered defense. Employ multiple complementary approaches to security enforcement at various points in the network, therefore removing single points of security failure.
2. Incorporate people and processes in network security planning. Employing effective processes, such as security policies, security awareness training and policy enforcement, makes your program stronger. Having the people who use the network (employees, partners and even customers) understand and adhere to these security policies is critical.
3. Clearly define security zones and user roles. Use firewall, filter and access control capabilities to enforce network access policies between these zones using the least privileged concept. Require strong passwords to prevent guessing and/or machine cracking attacks, as well as other strong forms of authentication.
4. Maintain the integrity of your network, servers and clients. The operating system of every network device and element management system should be hardened against attack by disabling unused services. Patches should be applied as soon as they become available, and system software should be regularly tested for viruses, worms and spyware.
5. Control device network admission through endpoint compliance. Account for all user device types -- wired and wireless. Don't forget devices such as smart phones and handhelds, which can store significant intellectual property and are easier for employees to misplace or have stolen.
6. Protect the network management information. Ensure that virtual LANs (VLAN) and other security mechanisms (IPsec, SNMPv3, SSH, TLS) are used to protect network devices and element management systems so only authorized personnel have access. Establish a backup process for device configurations, and implement a change management process for tracking.
Network Architecture:----
Network architecture refers to the way network devices and services are structured to serve the connectivity needs of client devices.
Step 1: Run a network security audit
A network security audit is a process where the organization investigates their network security policies and verifies the network asses for potential deficiencies, which if ignored, may lead to a security breach. The network audits are mostly conducted by a third-party auditor who visits the organization periodically and submits their comprehensive report post-audit.
Step 2: Restrict user access privileges
Insider threats are increasing every year, and one of the reasons is mismanagement of user access to the network. A study shows that over 70% of the insider attacks are not reported. The best solution to restrict privileges is to follow the ‘principle of least privilege.’