Network Security Case Study

Length: 4 pages Sources: 5 Subject: Education - Computers Type: Case Study Paper: #61685576 Related Topics: Computer Network, Private Security, Information Security, Computer Security
Excerpt from Case Study :

Network Security for a Medium Sized Company:

Network security is an important component for all companies including small and medium sized firms because very few businesses can operate without a network of computers. The network of computers facilitates improved communication in order for the company to improve its profitability or productivity. However, the improved communication between computers is also associated with some inherent risks such as malware and unauthorized access. The risk and impact of these threats can be lessened through a good network security policy that is properly implemented and well managed. A good network security policy is essential for a medium sized company since the size of the firm does not prevent it from being targeted by cyber-criminals. The development of a good security policy is the first step towards establishing and managing network security. Some of the important considerations to make for the security policy include network security fundamentals, security issues, and security threats.

Overview of Network Security:

For a long period of time, small, medium-sized, and large companies have been struggling with security threats from the hacking community or cyber criminals. The ability of these companies to deal with the threats is affected by the rapid evolution of security technology and the increased complexity of security threats. However, companies need to ensure computer and network security in order to protect its assets, gain a competitive advantage, and comply with fiduciary responsibilities and regulatory requirements (Canavan, 2001). This is primarily because network security focuses on safeguarding information regarding company assets.

Network security is established in the company in order to deal with security threats, issues, and vulnerabilities. Security threats are things that can interrupt the functioning, operation, availability, and integrity of a system or network while security issues or vulnerabilities are inherent weaknesses in design, arrangement, and implementation of a system or network. The three main sources of security vulnerabilities or issues are poor system or network design, poor implementation, and poor management of the network or system....

...

Network security threats can also be defined as situations or events with the capability of causing harm to a networked system. Some of the most common sources of such events or circumstances include unauthorized access, worms, denial of service, impersonation, and viruses (Wijayatunga, n.d.). Therefore, a good network security policy ensures there is proper design and implementation of the network or system as well as proper management. Notably, network security refers to measures taken to safeguard data or information during transmission. The most common security services include authorization, data integrity, authentication, data confidentiality, access control, DoS mitigation, and auditing or logging.

Detailed Network Security Recommendations:

As evident in this analysis network security is an important element for this medium sized company because of the significance of security measures in protecting the company's information. As previously mentioned, these are various security measures that the firm can adopt and implement to ensure the protection of its data or information. These measures include cryptography, which is the key to securing information on a network. This measure can be used as a technique for providing privacy, ensure data integrity, and authenticate identities of the various communicating parties. Cryptography involves various initiatives such as encryption, symmetric key cryptography, and asymmetric key cryptography. Encryption is the procedure that entails transforming plaintext to ciphertext through the use of a cryptographic key while symmetric key cryptography uses a single, private key for encryption and decryption of information. In contrast, asymmetric key cryptography involves using separate public and private key pairs for encryption and decryption of information.

The second major aspect of network security for this medium sized company is a firewall, which is a security gateway or a filtering tool that enforces network security policy and safeguards a network against external attacks (Stewart, 2013, p.44). The filtering process allows the network to permit the transmission of necessary information or deny what is not needed. The process is based on filtering rules where each rule consists of a pattern of concern and the response the firewall will produce in case an incoming element is in line with the pattern. Consequently, firewalls follow a philosophy or position of security that is known as allow by exception or deny by default. If a packet in the network or system matches an allow rule, the packet is allowed to…

Sources Used in Documents:

References:

Canavan, J.E. (2001). Fundamentals of Network Security. Retrieved June 28, 2014, from http://f3.tiera.ru/other/DVD-005/Canavan_J.E._Fundamentals_of_network_security_(2001)(en)(218s).pdf

Cheesley, R. (2010, July 29). White Paper: Network Security for Small and Medium Sized

Businesses. Retrieved June 28, 2014, from http://www.viryatechnologies.com/what-we-are-up-to/white-papers/white-paper-network-security-for-small-and-medium-sized-businesses.html

Stewart, J.M. (2013). Network security, firewalls, and VPNs (2nd ed.). Burlington, MA: Jones & Bartlett Learning.
"VPN Fundamentals." (n.d.). Chapter 2. Retrieved June 28, 2014, from http://www.buildinglinuxvpns.net/chapter2.pdf
from https://www.pacnog.org/pacnog10/track3/Security-Part-1.pdf


Cite this Document:

"Network Security" (2014, June 28) Retrieved January 26, 2022, from
https://www.paperdue.com/essay/network-security-190153

"Network Security" 28 June 2014. Web.26 January. 2022. <
https://www.paperdue.com/essay/network-security-190153>

"Network Security", 28 June 2014, Accessed.26 January. 2022,
https://www.paperdue.com/essay/network-security-190153

Related Documents
Network Security
Words: 3307 Length: 10 Pages Topic: Education - Computers Paper #: 52013252

Network Security: Past, Present and Future The work of Curtin (2007) states that a network is defined as "any set of interlinking lines resembling a net, a network of roads -- an interconnected system, a network of alliances." Quite simply a computer network is a system of computers that are interconnected. There are seven layers of communication types identified by the International Standards Organization (ISO) Open Systems Interconnect (OSI) Reference Model

Network Security
Words: 3486 Length: 8 Pages Topic: Education - Computers Paper #: 73619750

Network Security History and Evolution of Network Security: The term 'Network Security' refers to the concept of the creation of a 'secure platform' based upon which the user of the computer or of a program within the computer are allowed to perform only those specific tasks that are allowed within the parameters dictated by the security network of the computer, and banned from performing those that are not allowed. The tasks include

Network Security the Practice of
Words: 1551 Length: 5 Pages Topic: Education - Computers Paper #: 28134129

Conclusion The purpose of this discussion was to examine the network security measures that are available. The research found that the proper configuration provides the first line of defense as it relates to securing a network. In addition, firewalls serve an essential role in securing networks against outside intrusions. The research also indicates that anti-virus software, encryption software and biometrics allow organizations to secure networks in a more comprehensive manner. There are

Network Security: Opening to the
Words: 575 Length: 2 Pages Topic: Education - Computers Paper #: 93537392

The main lesson learned from viewing the tutorials and programs is the ease and flexibility of configuring each specific session to the unique needs of an audience. Feasibly these technologies could be used for creating highly unique and tailored learning experiences for students who were learning through online universities only for example. The ability to tailor all forms of digital content, from music and video to drawing boards and

Network Security As an Issues for Business Data Communication
Words: 1631 Length: 5 Pages Topic: Education - Computers Paper #: 19332576

Network Security: An Issue for Business Data Communication Computer security and the protection of data has been an issue since the early 1980s when computers became standard office equipment. Company sensitive information is stored on computers. Protecting the access to and integrity of this information has been a key concern for managers and computer specialists alike. The issues in data security have not changed, however the advent of the Internet has

Network Security Ping Sweeps Port Scans
Words: 694 Length: 2 Pages Topic: Education - Computers Paper #: 46594217

Networks are continually vulnerable to threats, which is why it is important to understand the ramifications of ping sweeps and port scans. While ping sweeps and port scans are not attacks in and of themselves, they are probing activities. Ping sweeps are automated processes that show the malicious user which computers on a network are active, whereas port scans identify the potential points of entry into a network from which