Protecting Your Network Essay

2298 words - 10 pages

Protecting Your Network
UMUC
CSEC 610
April 16, 2015
David Gianna

Introduction

According to Beaver (2010), to have a secure operating systems and applications, you need to have a secure network. Devices such as routers, firewalls, and even generic hosts (including servers and workstations) must be assessed as part of the ethical hacking process. There are thousands of possible network vulnerabilities, equally as many tools, and even more testing techniques. You probably don’t have the time or resources available to test your network infrastructure systems for all possible vulnerabilities, using every tool and method imaginable. Instead, you need to focus on tests that will produce ...view middle of the document...

* A hacker can set up backdoors into your network.
* A hacker can attack specific hosts by exploiting local vulnerabilities across the network.
Before assessing your network infrastructure security, remember to do the following:
* Test your systems from the outside in, the inside out, and the inside in (that is, between network segments and demilitarized zones [DMZs]).
* Obtain permission from partner networks to check for vulnerabilities on their ends that can affect your network’s security, such as open ports, lack of firewall, or a misconfigured router.
Because of the proliferation of technology use, it has become necessary that the Security Administrator, along with Management, develop a Security Policy to help create a secure environment in which to conduct business. This policy must be based on a system that is static enough to form a strong foundation to build security upon, but also flexible enough that it allows rapid growth and speedy response to keep pace with the new advances, problems, and issues that arise in the ever changing landscape of the IT field.
Understanding what the system is getting secured from is essential to the Security Administrator. He must recognize the threats and which of the three main categories that the threats fit into. Network attacks occur outside of the system and differ greatly from Intrusions, which are user controlled attacks that happen inside the system causing damage internally. Malicious Code, or Malware, is automated attacks that, once released, act independently.
There are many tools available to the Security Administrator to help in securing a work environment. Purchasing hardware and software additions and upgrades can make all the difference in the level of security. Antivirus software helps to protect the system against the naïve user who might jeopardize the system while software firewalls protect by controlling the data flow between computers before the user comes in contact with it. A router serves as a hardware firewall controlling data between the computer connected to it and the Internet. Having a reviewable security policy in place helps the Security Administrator when dealing with the user community on the system. By putting a policy in place, this allows the SA to define the allocation of IT resources, by setting up rules which determine access levels.
Descriptive Summary
With the ever expanding use of technology in the workplace, the role of the Security Administrator (SA) becomes more and more diverse and critical, but what could be the SA’s most important job is monitoring the integrity of the many different interfaces between users, personal computers (PC) and servers. In this world of hi-tech information sharing, where all of a business’s data can be stored on a device the size of a stick of gum, it is paramount for the SA to control the flow and access to this information by whatever means necessary. And there are many means available for the SA...

Other Papers Like Protecting Your Network

Network Security and Management Essay

3952 words - 16 pages business owner who doesn’t want to deal with a complicated system. Most of the “work” is taken care of by the internet provider company who also provides tech services from their office or comes to your home or office. They also provide the hardware for internet access, and network access, as well as the first firewall of protection from the internet. The homeowner/small business owner is really only responsible for their own data storage and

Case Study on Ping Sweeps

720 words - 3 pages , it scans the port to find the service it is running. Once it finds the service the port is running, it gives the intruder power and knowledge about your system. It basically gives him/her an edge in taking over your machine. Protecting ourselves can be very easy. Number one rule to remember at all times is to always assume vulnerability. No one machine on a network is completely safe from an intruder. The best way to protect yourself is to never

Week 7 Project Paper

3453 words - 14 pages used) in order to mask IP addresses. Whether you are a single family home network, or a large corporation, a proxy is a great tool for protecting your IP address identity from being used by intruders. A forward proxy will send HTTP requests from the user’s browser and act like a gateway on the user’s behalf. The forward proxy will disguise the users IP address by utilizing its own. Anyone looking from the outside will see the IP address of the

Network Management

3884 words - 16 pages large amount of data which is being exchanged over the network which needs to be properly protected so it doesn’t get taken by attackers. Firewall is software that keeps dangerous things from the internet away from the network. If there was no firewall everything that is on the network would be exposed to other people who are able to get into your network. Anti-virus software is also used when it comes to getting rid of computer viruses that may

Principles of Information-Systems Security

923 words - 4 pages protect against weak access-control policies within the organization. The first step of protecting against Credit-card information through a vulnerable wireless connection within the organization would be to first protect your wireless broadband from cyber-attacks, which don’t involve any costly measures. One must always remember to lock down the wireless network. By default the password for your panel is often a standard one set-up by the

Ethical Hacking

879 words - 4 pages As the internet is growing there has been a higher demand for network security. With the higher demand comes a new form of job known as ethical hacking. An ethical hacker is a person that conducts penetration testing on networks to test the integrity of a network for any given business or corporation (White hat (computer security)). With this technique, corporations and businesses will have the assurance they need for protecting their personal

Preventing Security Breaches

542 words - 3 pages operating system from 1998 is a recipe for disaster. Secure Your Network During late 2014, the State Department revealed that hackers had breached its unclassified email system. While the government claims that no sensitive information was lost, we have to wonder: why wasn’t this “unclassified” network encrypted with the same strength as its other networks? Securing networks by password protecting them and encrypting them is another easy way to

Issc340 Final Paper

3359 words - 14 pages today’s information technologies, network security administrators are having to develop and learn new ways to protect their networks. There are new threats being dispersed over the internet and networks daily. The fight against intruders, viruses, Trojans, etc., while it may seem that network protection is protecting the network, never can be considered over due to new threats that are created daily. While most people new to information security

Network Design Final Project Template

5384 words - 22 pages Axia College Material Appendix B Network Design Final Project Template Use this template to complete the final project and compile the pieces completed in Weeks Two through Nine. Remove this page and use the next page as the first page of your project. NETWORK 1 NETWORK DESIGN Randy Elliott IT 230 Duuna Richardson August 11th, 2008 NETWORK 2 WAN DESIGN The design of a WAN (Wide Area Network) is needed for the

Richman Investments

963 words - 4 pages make sure all the information you are sending and receiving from your CPU to our network is encrypted so no one may steal our “Internal Use Only” information (Kim & Soloman, 2012). This brief may have bored you a little or was too much information to handle at one time. The bottom line is Richman Investments is setting the standard in protecting all of our client’s information. That is why we will continue to do information security on at

technical paper

2818 words - 12 pages implementing an Intrusion Prevention System (IPS) configured to execute a DDoS security policy. IPS scans the network traffic stream in order to find threats using known exploits and attack vectors. IPS does not detect specific files, but rather specific methods that can be used to get malicious files onto your network. This allows IPS to protect against both known and unknown threats, even before antivirus signatures can be created for them. This report

Related Essays

Tft2 Task 4 Essay

778 words - 4 pages Recommendation for information security Modification The review of the Service Level Agreement in the network “shows that better measures for Information technology have not been addressed, rather some added recommendation have been listed which provide the better protection to Finn man data and intellectual property. Thus various mechanisms for protecting the data have been suggested lik ITIL, Best management practices A.. Recommended

Cause And Effect Of Network Hacking

1042 words - 5 pages modern cities. Computer shop network hacking happens when a hacker exploits a security breach in a network or computer and is able to access the information through the internet. As long as he is not detected or the computer shuts down, he will be able to hack the computer as long as it is online. It doesn’t matter if you have a broadband connection or a dial up, internet hackers can access your home or computer shop security if you

You Decide Week 5 Essay

764 words - 4 pages YouDecide week 5 There are many approaches to securing your organization and the network that runs your business. First of all, you want to maintain security in your building, its perimeter needs to be secured. Gating and lock systems are the primary methods for establishing a secure building. Buildings have multiple entries so basically IT professionals have to take the viewpoint of an attacker when arranging a site for physical

Final Paper

3922 words - 16 pages , protecting the information on the network. Software is another means of accomplishing network security. An anti-virus program identifies and segregates malicious software on a computer before it damages the network protocols. Anti-spyware and anti-adware applications similarly protect the users based on computer-to-computer communication and online activity. Security measures based on software are required to be updated quite frequently, so we must