Sunday, April 21, 2019

Network Security Research Paper Example | Topics and Well Written Essays - 3750 words

Network surety - Research Paper ExampleSecondly, internal and somatogenic security get out discuss human threats, physical access to server rooms and servers, sensors and sprinklers etc. Moreover, protecting accidently shutting down system result in any case be discussed. After evaluating vulnerabilities associated with these trio domains, controls will be proposed and justified accordingly. Furthermore, incorporation of Scilly University network architecture will also be utilized for better insights. 2 Research Methodology and Literature Review We will utilize Scilly University in our research as a basis of our discussions. Moreover, we will focus on qualitative research on information security, tools, assessments and statistical data in around cases. It has been concluded by some experts that the stratum 2012 is considered to be the worst year in terms of estimator network security breaches (Schirick, 2012). Likewise, the year that has not even passed the half year mark, s ome of the foremost companies were sufferers of network security breaches resulting in ample losses (Schirick, 2012). However, the news buzz totally highlights Sony and Citibank to be victims of network security breaches, as these companies atomic number 18 commonplace among the public. The other sides of the picture highlights organizations of all sizes are affected by the consequences of network security breaches. Likewise, it gutter be concluded that network security risks are continuously evolving, modifying and growing at a rapid pace. Organizations usually install a firewall and even intrusion detection systems that triggers alerts of any suspicious activity, as these two components only covers the technical domain and not the human and physical domain. The current network scenario is utilizing a Virtual private Connection that is connecting one or more sites. However, the VPN connection is also entitled to allow internet business on the same dedicated line from the In ternet Service Provider. Moreover, the current network only utilizes a single firewall that is located at the main campus of the university. It concludes that the rest of the two remote sites are only protected via a simple Network address translation function that is incorporated in a digital subscriber line modem. Moreover, there are no advanced security appliances such as Intrusion detection systems for analyzing and monitor any suspicious activity that may possibly become a threat to the Universitys computer network. Moreover, there is no patch management for updating security patches in the workstations connected to the network. There are no indications of hardening servers for instance, email server, application server, centralized server and database server must be hard-bitten and needs physical protection as well. The network security vulnerabilities will be accessed in three categories i.e. logical security, internal security and external security. As far as logical secu rity is concerned, we can see that the fig 1.1 demonstrates a firewall, Microsoft Internet Security and Acceleration (ISA) server and a domain restraint with Microsoft Active Directory. The three categories for network vulnerabilities are categorized as below 2.1 Logical Vulnerabilities The current logical controls for protecting information assets within the network are Microsoft Active directory, ISA server and a Firewall. The Microsoft active directory is not primarily a security control, as

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.