Question

In: Computer Science

Briefly describe at least six (6) ways to harden a network, including servers and workstations, and...

Briefly describe at least six (6) ways to harden a network, including servers and workstations, and the network configuration (architecture); then explain in detail the first two steps you would take toward achieving a secure network.

Solutions

Expert Solution

Six ways to harden anetwork:--

1 Use a layered defense. Employ multiple complementary approaches to security enforcement at various points in the network, therefore removing single points of security failure.

2. Incorporate people and processes in network security planning. Employing effective processes, such as security policies, security awareness training and policy enforcement, makes your program stronger. Having the people who use the network (employees, partners and even customers) understand and adhere to these security policies is critical.

3. Clearly define security zones and user roles. Use firewall, filter and access control capabilities to enforce network access policies between these zones using the least privileged concept. Require strong passwords to prevent guessing and/or machine cracking attacks, as well as other strong forms of authentication.

4. Maintain the integrity of your network, servers and clients. The operating system of every network device and element management system should be hardened against attack by disabling unused services. Patches should be applied as soon as they become available, and system software should be regularly tested for viruses, worms and spyware.

5. Control device network admission through endpoint compliance. Account for all user device types -- wired and wireless. Don't forget devices such as smart phones and handhelds, which can store significant intellectual property and are easier for employees to misplace or have stolen.

6. Protect the network management information. Ensure that virtual LANs (VLAN) and other security mechanisms (IPsec, SNMPv3, SSH, TLS) are used to protect network devices and element management systems so only authorized personnel have access. Establish a backup process for device configurations, and implement a change management process for tracking.

Network Architecture:----

Network architecture refers to the way network devices and services are structured to serve the connectivity needs of client devices.

  • Network devices typically include switches and routers.
  • Types of services include DHCP and DNS.
  • Client devices comprise end-user devices, servers, and
    smart things.

Step 1: Run a network security audit

A network security audit is a process where the organization investigates their network security policies and verifies the network asses for potential deficiencies, which if ignored, may lead to a security breach. The network audits are mostly conducted by a third-party auditor who visits the organization periodically and submits their comprehensive report post-audit.

Step 2: Restrict user access privileges

Insider threats are increasing every year, and one of the reasons is mismanagement of user access to the network. A study shows that over 70% of the insider attacks are not reported. The best solution to restrict privileges is to follow the ‘principle of least privilege.’


Related Solutions

Sun Microsystems is a leading supplier of computer-related products, including servers, workstations, storage devices, and network...
Sun Microsystems is a leading supplier of computer-related products, including servers, workstations, storage devices, and network switches. In 2009, Sun Microsystems was acquired by Oracle Corporation. In the letter to stockholders as part of the 2001 annual report, President and CEO Scott G. McNealy offered the following remarks: Fiscal 2001 was clearly a mixed bag for Sun, the industry, and the economy as a whole. Still, we finished with revenue growth of 16 percent—and that's significant. We believe it's a...
Sun Microsystems is a leading supplier of computer-related products, including servers, workstations, storage devices, and network...
Sun Microsystems is a leading supplier of computer-related products, including servers, workstations, storage devices, and network switches. In 2009, Sun Microsystems was acquired by Oracle Corporation. In the letter to stockholders as part of the 2001 annual report, President and CEO Scott G. McNealy offered the following remarks: Fiscal 2001 was clearly a mixed bag for Sun, the industry, and the economy as a whole. Still, we finished with revenue growth of 16 percent—and that's significant. We believe it's a...
A small company network have multiple servers (including a web server, a log server, DNS servers,...
A small company network have multiple servers (including a web server, a log server, DNS servers, a file server for inventory information and customer orders, but no email server) , two firewalls, DMZ, and PCs. The company sales products online. a). Suppose that you are a system administrator. What types of network connections will you allow to be established with the servers in the DMZ from the Internet? b). What are the points of entry for attackers? c). How do...
Briefly explain the six (6) main taxation and superannuation obligations of an Australian company, including taxes...
Briefly explain the six (6) main taxation and superannuation obligations of an Australian company, including taxes that are paid through the Australian Tax Office.
Write at least six differences between the Network Policy Server (NPS) and the Network Access Server...
Write at least six differences between the Network Policy Server (NPS) and the Network Access Server (NAS).
Define and describe the complex network theory including its history.
Define and describe the complex network theory including its history.
Briefly describe six characteristics of a quality control officer.
Briefly describe six characteristics of a quality control officer.
Briefly describe the six procedures performed during fieldwork
Briefly describe the six procedures performed during fieldwork
Briefly describe the six-step life cycle of animal viruses.
Briefly describe the six-step life cycle of animal viruses.
Briefly describe the characteristics of cross-functional business processes. Also, briefly describe at least three business benefits...
Briefly describe the characteristics of cross-functional business processes. Also, briefly describe at least three business benefits of cross-functional business processes.  
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT