Discuss about the Safeguard The System From The Security.
Network security is a set of procedures and policies that are used prevent unauthorised access, modification of data or denial of service. Network security assures that data is accessed only by valid users it is important as many type of institutions and organisations are involved with it. The main concept of network security arises from authentication that is designed to allow the access rights [1]. Thus report covers the main concern about network security the major methods that are used to secure the network. The threat that exists in the network of a system is addressed. The count measures are also discussed to safeguard the system from the security.
There are various methods used to secure the network and stop the threats to enter or spread in the network. This is done by managing the threat by keep the software’s updated to protect the network from all the existing threats [2]. There are following ways used to network access security.
Network security is breached due to various threats that exist due to malicious activities. The threats or attacks can be either active or passive [7]. Active attack is actually caused when intruder intentionally perform certain activities to destroy the normal operations. The hackers try to modify the data and make changes in normal operation. The passive attack is where the hackers just monitor the path over the network without making any changes.
The threat that exists in a system is due to viruses that spoils the normal operation of network. Data modification is one of the threats that are performed by third part user to violet the confidentiality of data. Denial of service is another threat that says that valid users are not able to access the information or make the resources unavailable [8]. The DNS spoofing is the other threat in which the domain name system is introduced in the cache server that returns incorrect result. The man in the middle attack is a threat that is caused by a third party where they silently read the data or alter the communication between certain parties. Phishing is another threat on the network in which the hacker tries to access the password as well as sensitive data. These threats spoil the trust as well as confidentiality of data [9]. These threats spoil the goodwill of an organisation as they leak the sensitive information by spoiling the confidentiality and integrity of data.
The motive of these threats is to keep the network busy by increasing the traffic of the network. The major threats that exist are due to old security measures that allow hackers to steal, utilize the information without any permission. The other such threats are weak access control that is due to poor authentication and authorization. The rights to access the resources need to be checked so that credentials or privileges are not affected [10]. The external threats that exist on the network include viruses, worm, spywares and Trojans. They enter the system from side doors and damage and steal the data by performing various activities on the network. One of the main threats that spoils the confidentiality of data is eavesdropping that allow unauthorised monitoring to people unknowingly. These threats focus on accessing the confidentiality data of an organisation so that it can be misused or steeled.
Preventive Controls are designed so that flaws do not occur at the first place only. These steps are taken before any loss or problem occurs to prevent security violations and stop the incident from occurring at all. Examples are blocking certain codes, firewalls, Security guards, using locks, using encryption and so on.
Detective Control is used to discover the unwanted activities and report them. It happens after the bug has already taken place as prevention control failed, it is important to detect so that it does not future effect the performance [10]. But it is difficult as one can’t identify when an incident will occur.
There are various threats that spoil the confidentiality, integrity and security of network. Thus there are series of count measures that are undertaken to maintain the security level. Some of the countermeasures like access control, authentication, integrity of data, availability and nonrepudiation of data. Access control makes sure that admin ensures the access to functions by giving permission to only authenticated user. The purpose of authentication is to make sure that only user with valid identity can send and receive data over the network [11]. Other than that confidentiality of data is maintained by providing the encryption, access control as well cryptography.
Security Policy- A security related policy has been designed to deal with all the attacks. These policies are designed to take proper steps by making user that all the security incidents are handled properly [12]. Apart from various countermeasures are designed to protect the network against all security risks.
Thus all the vulnerabilities are eliminated by removing the entire security hole in the network. The patches need to be removed from the network by applying proper security updates. Thus the count measures are used to make sure that all the sensitive information is protected [13]. The authentication mechanism should be done in such a way that it allows only authenticated data to be transmitted and blocking all the users. To avoid the chances of loss of confidentiality and integrity of the network a proper access control should be delivered to the end user. A proper control regarding who can read, write and modify the information need to be accessed [14]. If the rights are provide in a proper manner than misuse of information will not occur. The defining the rights of information only valid users could read the relevant portion of the database.
Conclusion
It can be concluded that network security is an important to protect the files and directories by providing proper access control it also make sure that network is safe from all the hackers and unauthorised users. This report covers the all the major threats that exist in the system to spoil the integrity and confidentiality of information. The threats and its count measures have been discussed in this report.
Perlman, Radia, Charlie Kaufman, and Mike Speciner. Network security: private communication in a public world. Pearson Education India, 2016.
Beberlein, L. T., G. Dias, K. N. Levitt, B. Mukherjee, and J. Wood. “Network attacks and an Ethernet-based network security monitor.” (2017).
Chen, Gaojie, Yu Gong, Pei Xiao, and Jonathon A. Chambers. “Physical layer network security in the full-duplex relay system.” IEEE transactions on information forensics and security 10, no. 3 pp-574-583, 2015.
Knapp, Eric D., and Joel Thomas Langill. Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems. Syngress, 2014.
Ayyagari, Arun, Timothy M. Aldrich, David E. Corman, Gregory M. Gutt, and David A. Whelan. “Context aware network security monitoring for threat detection.” U.S. Patent 9,215,244, issued December 15, 2015.
Perlman, Radia, Charlie Kaufman, and Mike Speciner. Network security: private communication in a public world. Pearson Education India, 2016.
Lin, Derek. “Anomaly detection system for enterprise network security.” U.S. Patent 9,112,895, issued August 18, 2015.
Borders, Kevin R. “Method, system and computer program product for detecting at least one of security threats and undesirable computer files.” U.S. Patent 9,055,093, issued June 9, 2015.
Talooki, Vahid Nazari, Riccardo Bassoli, Daniel E. Lucani, Jonathan Rodriguez, Frank HP Fitzek, Hugo Marques, and Rahim Tafazolli. “Security concerns and countermeasures in network coding based communication systems: A survey.” Computer Networks 83, pp- 422-445, 2015.
White, Gregory B., Eric A. Fisch, and Udo W. Pooch. Computer system and network security. CRC press, 2017.
Sharma, Rajesh K., and Danda B. Rawat. “Advances on security threats and countermeasures for cognitive radio networks: A survey.” IEEE Communications Surveys & Tutorials 17, no. 2, pp- 1023-1043, 2015.
Shu, Zhaogang, Jiafu Wan, Di Li, Jiaxiang Lin, Athanasios V. Vasilakos, and Muhammad Imran. “Security in software-defined networking: Threats and countermeasures.” Mobile Networks and Applications 21, no. 5 pp-764-776, 2016.
Chen, Min, Yongfeng Qian, Shiwen Mao, Wan Tang, and Ximin Yang. “Software-defined mobile networks security.” Mobile Networks and Applications 21, no. 5, pp-729-743, 2016.
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.