In: Computer Science
WAN Technology
b. Listing and explanation on all security techniques
covered in this course
c. Discussion on how each of them is associated to the network
security goals.
b) Security strategies should not be based on current or future products or technology. They need to be based on the functional needs and risks of the organization. The toughest part of developing a WAN security strategy is determining what needs to be secured, and from whom. Security is not free. Every time the security level is tightened, the organization pays in terms of increased complexity of access, increased response time, and reduced communication. As stated, security is a balance of value, risk, and practicality. Before developing a strategy, it is important to understand something about the concept of risk. When addressing the issue of security risks, it is helpful to remember that risk consists of both objective data and subjective feelings based on personal psychology. Because quantitative data may be difficult to determine, individual experience and comfort levels often take the dominant role. During development of a security policy, continually consider that reducing the risk of a security breach comes at a cost, and that cost may be a higher level of risk in some other part of the organization not being considered, like competitiveness.
Key and Card Systems. The simplest key systems require users to insert a key in a lock to turn on the computer. However, with such systems, intruders can pick the locks or duplicate the keys. To minimize this threat, security personnel should keep keys in a secure cabinet where they can be checked out and their use can be monitored
Biometrics. Biometric devices use an individual's unique physical attributes for identification; this provides the highest level of security. These devices can identify an individual based Previous screen on characteristics that cannot be duplicated, including fingerprint, handprint, voice quality, or pattern of capillary blood vessels in the retina of the eye. Biometric systems are often expensive and probably will never reach the same low cost per workstation that a password provides.
Storage Controls Users should create several backup copies of sensitive files on a regular basis to provide a reliable source of archived data for restoration in the event of a network disaster. Creating backup copies of data will also help to prevent the spread of worms and viruses.
Encryption Simply defined, encryption transforms information through a rigorous but generally available process called an algorithm by using a unique and secret code or key. There are two types of encryption: link encryption and end-to-end encryption. Link encryption protects all data traversing a communication link between two nodes in a network. The two nodes must share a common encryption key.
c)
Elements of Network Security
To avoid financial and reputational loss, it is important that organizations are focused on network security. Here are the four basic elements of network security to keep in mind:
1. Network Access Control (NAC)
NAC basically allows the admin to understand and control who can and cannot access the
network. NAC identifies what users and devices are allowed on the network. This helps the admin to remain aware of which devices are blocked. Behavioral analytic tools to identify abnormal behavior on a network are a modern tool that can help network administrators monitor their networks for anomalous traffic. Once the behavioral analytic tool is applied, it then sends notifications to the user as soon any abnormal activity is found.
According to Quadrant Knowledge Solutions, the global NAC Market is expected to develop significantly in the next five to six years. Rising from a market size of $997.3 million in 2017 to $5.37 billion by 2023.
2. Firewall Security
A firewall is a network security device that monitors outgoing and incoming network traffic, forming a type of barrier between an untrusted and trusted network. Firewall security decides whether to block or allow specific traffic in the network or not. It is one of the first lines of defense. There are different types of firewall security such as stateful firewall, application-aware firewall, packet filtering firewall, deep packet inspection firewall, and proxy firewall.
According to Stratistics MRC, the Global Network Security Firewall Market value was $3.15 billion in the year 2017. Whereas, it is expected to rise to $9.41 billion by the year 2026 at a growing CAGR of 12.9%. The increasing demand for firewall security, the rapid developments in a digital transformation in the telecommunication sector, and the vulnerability growth in SS7 also contribute to the overall market growth.
3. Intrusion Prevention System or IPS
IPS or Intrusion Prevention System is a threat prevention technology that examines, identifies, and prevents unusual network traffic from exploiting vulnerabilities, such as malicious inputs, target supplication or service to gain control or interrupt a machine or application. The Intrusion Prevention System is positioned right behind the firewall security which provides a complementary layer of analysis. This acts as a direct communication path between the destination and the source. IPS actively analyzes and takes automated actions on all the traffic flows which enter the network. Such actions include:
4. SIEM or Security Information and Event Management
SIEM is an approach towards security management which combines Security Event Management and Security Information Management into one composite security management system. SIEM gathers the relevant and required data from multiple sources to help identify deviations and take appropriate actions.
For example, when a potential issue or threat is detected, SIEM directly logs all additional information and generates an alert so that the security controls stop the activity’s progress on an immediate basis.