Question

In: Computer Science

WAN Technology b. Listing and explanation on all security techniques covered in this course (6 marks)...

WAN Technology

b. Listing and explanation on all security techniques covered in this course

c. Discussion on how each of them is associated to the network security goals.

Solutions

Expert Solution

b) Security strategies should not be based on current or future products or technology. They need to be based on the functional needs and risks of the organization. The toughest part of developing a WAN security strategy is determining what needs to be secured, and from whom. Security is not free. Every time the security level is tightened, the organization pays in terms of increased complexity of access, increased response time, and reduced communication. As stated, security is a balance of value, risk, and practicality. Before developing a strategy, it is important to understand something about the concept of risk. When addressing the issue of security risks, it is helpful to remember that risk consists of both objective data and subjective feelings based on personal psychology. Because quantitative data may be difficult to determine, individual experience and comfort levels often take the dominant role. During development of a security policy, continually consider that reducing the risk of a security breach comes at a cost, and that cost may be a higher level of risk in some other part of the organization not being considered, like competitiveness.

Key and Card Systems. The simplest key systems require users to insert a key in a lock to turn on the computer. However, with such systems, intruders can pick the locks or duplicate the keys. To minimize this threat, security personnel should keep keys in a secure cabinet where they can be checked out and their use can be monitored

Biometrics. Biometric devices use an individual's unique physical attributes for identification; this provides the highest level of security. These devices can identify an individual based Previous screen on characteristics that cannot be duplicated, including fingerprint, handprint, voice quality, or pattern of capillary blood vessels in the retina of the eye. Biometric systems are often expensive and probably will never reach the same low cost per workstation that a password provides.

Storage Controls Users should create several backup copies of sensitive files on a regular basis to provide a reliable source of archived data for restoration in the event of a network disaster. Creating backup copies of data will also help to prevent the spread of worms and viruses.

Encryption Simply defined, encryption transforms information through a rigorous but generally available process called an algorithm by using a unique and secret code or key. There are two types of encryption: link encryption and end-to-end encryption. Link encryption protects all data traversing a communication link between two nodes in a network. The two nodes must share a common encryption key.

c)

Elements of Network Security

To avoid financial and reputational loss, it is important that organizations are focused on network security. Here are the four basic elements of network security to keep in mind:

1. Network Access Control (NAC)

NAC basically allows the admin to understand and control who can and cannot access the

network. NAC identifies what users and devices are allowed on the network. This helps the admin to remain aware of which devices are blocked. Behavioral analytic tools to identify abnormal behavior on a network are a modern tool that can help network administrators monitor their networks for anomalous traffic. Once the behavioral analytic tool is applied, it then sends notifications to the user as soon any abnormal activity is found.

According to Quadrant Knowledge Solutions, the global NAC Market is expected to develop significantly in the next five to six years. Rising from a market size of $997.3 million in 2017 to $5.37 billion by 2023.

2. Firewall Security

A firewall is a network security device that monitors outgoing and incoming network traffic, forming a type of barrier between an untrusted and trusted network. Firewall security decides whether to block or allow specific traffic in the network or not. It is one of the first lines of defense. There are different types of firewall security such as stateful firewall, application-aware firewall, packet filtering firewall, deep packet inspection firewall, and proxy firewall.

According to Stratistics MRC, the Global Network Security Firewall Market value was $3.15 billion in the year 2017. Whereas, it is expected to rise to $9.41 billion by the year 2026 at a growing CAGR of 12.9%. The increasing demand for firewall security, the rapid developments in a digital transformation in the telecommunication sector, and the vulnerability growth in SS7 also contribute to the overall market growth.

3. Intrusion Prevention System or IPS

IPS or Intrusion Prevention System is a threat prevention technology that examines, identifies, and prevents unusual network traffic from exploiting vulnerabilities, such as malicious inputs, target supplication or service to gain control or interrupt a machine or application. The Intrusion Prevention System is positioned right behind the firewall security which provides a complementary layer of analysis. This acts as a direct communication path between the destination and the source. IPS actively analyzes and takes automated actions on all the traffic flows which enter the network. Such actions include:

  • Resetting the overall connection
  • Blocking unscrupulous traffic from the source address

4. SIEM or Security Information and Event Management

SIEM is an approach towards security management which combines Security Event Management and Security Information Management into one composite security management system. SIEM gathers the relevant and required data from multiple sources to help identify deviations and take appropriate actions.

For example, when a potential issue or threat is detected, SIEM directly logs all additional information and generates an alert so that the security controls stop the activity’s progress on an immediate basis.


Related Solutions

QUESTION 6: Case Study II [10 Marks] Intellectual Property Rights and Computer Technology “Over the course...
QUESTION 6: Case Study II [10 Marks] Intellectual Property Rights and Computer Technology “Over the course of less than a decade, Facebook has morphed from a small, niche networking site for mostly Ivy League college students into a publicly traded company with a market worth of $148 billion in 2014 (up from $59 billion in 2013). Facebook boasts that it is free to join and always will be, so where’s the money coming from to service 1 billion worldwide subscribers?...
Recommend appropriate data analytic techniques for security prevention at IMC. [5 marks]
Recommend appropriate data analytic techniques for security prevention at IMC. [5 marks]
Consider all the things we have covered in the last and fast 8 weeks in Course...
Consider all the things we have covered in the last and fast 8 weeks in Course Code: BE-205 Course Title: Principles of Microeconomics. In a 500+ WORD post, List and explain three items/concepts/theories that you have picked up/developed in Microeconomics that you can now apply in the workplace or your personal life.
Firewalls & Network Security course FIREWALL BASICS a long and comprehensive explanation by typing please 1.WHAT...
Firewalls & Network Security course FIREWALL BASICS a long and comprehensive explanation by typing please 1.WHAT ARE FIREWALL ENHANCEMENTS? 2.WHAT CONSTITUTES GOOD FIREWALL RULES? Enumeration ENUMERATE WINDOWS OS TARGETS AND SERVICES?
In chapter 6, Bond Valuations techniques are introduced A bond is a debt security, like ‘IOU.’...
In chapter 6, Bond Valuations techniques are introduced A bond is a debt security, like ‘IOU.’ The bond issuers borrow from the Bond Investors. The issuers agree to repay the principal amount of the loan on the maturity date. Thus, a bond represents loans from the holder to the issuer. In this assignment, you are to discuss the following with numerical examples: 1..What does it mean when a bond sells at a premium or when it sells at a discount?...
In chapter 6, Bond Valuations techniques are introduced A bond is a debt security, like ‘IOU.’...
In chapter 6, Bond Valuations techniques are introduced A bond is a debt security, like ‘IOU.’ The bond issuers borrow from the Bond Investors. The issuers agree to repay the principal amount of the loan on the maturity date. Thus, a bond represents loans from the holder to the issuer. In this assignment, you are to discuss the following with numerical examples: What are the determinants of the shape of the yield curve What does it mean when a bond...
In chapter 6, Bond Valuations techniques are introduced A bond is a debt security, like ‘IOU.’...
In chapter 6, Bond Valuations techniques are introduced A bond is a debt security, like ‘IOU.’ The bond issuers borrow from the Bond Investors. The issuers agree to repay the principal amount of the loan on the maturity date. Thus, a bond represents loans from the holder to the issuer. In this assignment, you are to discuss the following with numerical examples: 1 Explain the concept of Coupon bond yields and its pricing behavior 2 Discuss the ‘Term Structure of...
In chapter 6, Bond Valuations techniques are introduced A bond is a debt security, like ‘IOU.’...
In chapter 6, Bond Valuations techniques are introduced A bond is a debt security, like ‘IOU.’ The bond issuers borrow from the Bond Investors. The issuers agree to repay the principal amount of the loan on the maturity date. Thus, a bond represents loans from the holder to the issuer. In this assignment, you are to discuss the following with numerical examples: What are the features of a zero-coupon bond? Explain the concept of Zero Coupon bond yields and its...
In chapter 6, Bond Valuations techniques are introduced A bond is a debt security, like ‘IOU.’...
In chapter 6, Bond Valuations techniques are introduced A bond is a debt security, like ‘IOU.’ The bond issuers borrow from the Bond Investors. The issuers agree to repay the principal amount of the loan on the maturity date. Thus, a bond represents loans from the holder to the issuer. In this assignment, you are to discuss the following with numerical examples: 1 Explain the concept of Coupon bond yields and its pricing behavior 2 Discuss the ‘Term Structure of...
uide to marks: 20 marks – 12 for a, 2 for b, 6 for c Tully...
uide to marks: 20 marks – 12 for a, 2 for b, 6 for c Tully Tyres sells cheap imported tyres. The manager believes its profits are in decline. You have just been hired as an analyst by the manager of Tully Tyres to investigate the expected profit over the next 12 months based on current data. •Monthly demand varies from 100 to 200 tyres – probabilities shown in the partial section of the spreadsheet below, but you have to...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT