The assignment discusses the significance of network security for business processes, establishing a secure system using software and hardware devices, managing access, identifying potential risks, and implementing DMZ to improve web testing. It also explores the need for security infrastructure and addresses various threats.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Network Security
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents INTRODUCTION...........................................................................................................................3 TASKS.............................................................................................................................................3 a). Identify the potential risks and threats in the network security.............................................3 b). Determine the key security requirement on application, user and infrastructure...................4 c). Identify all the key features and components of the security infrastructure plan to address all above identified items.............................................................................................................5 d). Security infrastructure that build and enhance the trust in the public to use the facility and also reflect that provided the services..........................................................................................7 CONCLUSION................................................................................................................................8 REFERENCES................................................................................................................................9
INTRODUCTION Network security is based on activities that designed to protect the integrity and usability of network and their data. It also includes the software and hardware technologies An effective network security is managed the entire network and access in proper manner. This report will discuss about the different potential risk and threats generated in network security. It will identify theneed and requirement of security in the network by using infrastructureor applications. Furthermore, This assignment will discuss about the key features and components that improve the security infrastructure and also plan to address the identified items etc. At last, this report will describe the security infrastructurethat help for build and protected against the threats. TASKS a). Identify the potential risks and threats in the network security. A threat and risk are important component that affect the entire processing of network system. It is discovered the incident to harm the entire system of organization. On the other hand, Risk is created in the network system that potential damage and loss the functionality of system. For Example- Risk also includes the financial loss as a result's loss of privacy legal implications and disruptions etc (Berry, 2017). There are all the threats and risk created in the institution so that it is required for network manager to handle and identify the risk. Afterwards, it will be provided the best facilities to the public. There are different type of threat and risk generated in the entire network system. Threats:-Malicious-This threat can be affected the entire infrastructure of network system. It includes worm, spyware and trojan etc. These are the important threats which based on the coded form that damage the connection between the network, privacy loss etc. this type of activities performed to create more risk (Network Security, 2018). It is used the antivirus to measure the system and risk in the entire network system.Denial of service-It is based on the attack which intended to close the entire system and network. This attack is very powerful to slow down the performance of network. It making to unavailable the intended user. This threat is measured by the using the over provisioning brute to defence against the harmful software.
Data breaches-A data breach is happen when the sensitive, confidential and secure data stolen by the theft. An unauthorized person is attempt to harm the personal information of organization that secured in the network system. It also involves the intellectual property and personal information. Risks:-Hackers-This is the most common network security risk that created in the network system. It is essential for organization to maintain their security aspects in proper manner. Hacker mainly access the information through the network system therefore, it will hack the entire functionality and processing of system (Iskandar, Virma and Ahmar, 2018).Viruses-It is a type of malicious software that affect the entire functionality of system and it also executed to replicate inside the network system. Virus is basically the code that copied the multiple in the programs. In this way, it will change the entire processing and working of network system. Equipment Failure-Equipment failure is occurred in the network system where any devices cannot working properly manner. In this way, all the task of software and hardwaresystemhasbeenstopped.Thesecuritymeasuretocheckregularand maintenance the physical equipment in proper manner. b). Determine the key security requirement on application, user and infrastructure. Network security is essential for institution to handle and manage their operations and functions in proper manner. It is important for registration institution for providing the better services to the public so that it is needed for institution to build the cloud based network infrastructure that mange the entire functionality (Jøsangand and et.al., 2018). There are different requirements needed for the security in the infrastructure, application and users.Heterogeneous system support-It cannot be used the cloud management solution on the network system but also used the latest hardware, software and virtualisation that support to the data centre which existing in the infrastructure. This online registration system is beneficial for public to manage for information with the help of data centre's.ServiceManagement-The administrator is used thesimpletool or platformthat providing the best services to meet the goals and objective. A quality of services and application applicable to arrange all the facilities in proper manner. End user also
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
consumer through the service provider. Network infrastructure is mainly based on the system to use the best hardware that provided the safety and security in the entire infrastructure in effective manner.Supporttheproxyauthentication-Itisgiventhesegmentationinthenetwork infrastructure because it provides the facility to separate mange the functionality of website and application (Lopez and et.al., 2018). The proxy authentication requires for supporting the security and privacy. In this way, unauthorised person cannot easily access the information and data.Encryption on storage-The institution is used the encryption algorithm to manage the level of database. It becomes store the standard requirement of password by using encryption. It is beneficial to secure in the form of code. Each and every sensitive data secure on the disk. Encryption must be used the appropriate strength which is based on the standard because the data that store on the disk can be sensitive. Key management and control-The Business application should have support the key control and management system. Key is used in encryption process that should be unique for every network.Black box key is generic in the application to secure the storage and data effectively and efficiently. c). Identify all the key features and components of the security infrastructure plan to address all above identified items. Network security infrastructure is important for business to provide the privacy and safety to the customers.According to network engineer, It is required to identify the criteria to balance the between the strong layer of defence. They also against towards the functionality of hardware on the network system (Kumar and et.al., 2017). Network infrastructure is an essential to secure and monitor all the activities of network system such as routers, cables, hubs etc. On the other hand, the software also applicable in the network infrastructure to manage the internet connection. There are some important features and components applicable in the security infrastructure plan. Performance management-It is the important part of network system that manage the entire performance and efficiency of network infrastructure. Security is main concern about the business process that help for secure the data and information in proper manner. There are
different devices such as router, switches etc. these are important concept that applicable in the infrastructure to store all the data in effective manner. High capacity load balancing-Wireless network is planned for managing the capacity in effective because there are demand in the wireless and wired infrastructure of network system. It is relatively incorporated to handle the load of high capacity in effective ways (Miloslavskaya, 2018). In case, the access point is overloaded so that network system is automatically shifted to another access. It depending on the capacity of loads. This will be feature to manage the business operations and function effectively and efficiently. Network access control-when the many users can be do the registration with the help of mobile devices that help for maintain the network access control. It is an essential for provide the security so that it easily registered the online form and also secure the IP address of device. It is main component in the network system to control the specific role of public (White, Fisch and Pooch, 2017). Network access control allows registering themselves to network system. It is the best feature that enhance the experience of public. Web content and system filtering-It is an essential for network security to ensure that each and every people aware about the application in order to detect the threats. It is used the feature of network application filtering to protect against the threats. It also protects the people from the malicious content available on the application. This feature is provide the facility to identify and filter the information in proper manner. Scalability-Scalability is important component in the network infrastructure that help for increasing the popularity of wireless device. It will continue process to increase the capacity and speed in proper manner. It also expands in the term of development and also cover to build the new network. Proper security means firewall-It is an essential for building an air tight network infrastructure which required for firewall device that help for control the entire functionality. It is beneficial for reduce the complexity to use features such as antivirus, spam filtering and deep packet inspections etc.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
d).Security infrastructure that build and enhance the trust in the public to use the facility and also reflect that provided the services. Security infrastructure is main part of online registration system that provide the facility to secure their personal information in effective ways. According to non technical, network engineer is added more feature in the network infrastructure to store the information on their database system. In this way, user can easily access the registration form with the help of internet connection (Mohammed, Omar and Nguyen,2018). It always trying to provide the scalability, flexibility and application filtering services where people can used the network system. There are different types of facilities provided to the user so that they performed different task on the basis of their requirement. Apply the registration form. Check the status of registration renew the business registration Maintain the communication between the officer and entities. These are different types of facilities provided to the customer which is beneficial for identifying any type of information in proper manner. On the other hand, In terms of technical perspectives where this instituting will use the hybrid cloud infrastructure environment that help for people to provide the facility regarding the clear system visibility (Reybok and et.al., 2018). It also replicated with the selected Internet service provider those who will provide both services such as interment connection and mobile connectivity.Inthisway,thisinstitutionalwaysmaintainthedirectconnectiontothe organization on the process of application. Security infrastructure is maintained their service on time to time which is necessary to identify all the threats and risk on the system that affect the performance and efficiency. Security infrastructure is the automation process to control and manage in effective ways. There are different types of threats available that harm the entire processing of system that's why, it is needed to use the legitimate process to determine that which is beneficial for business process.Securityinfrastructureisbasicallytheadvanced technology to perform different task to manage the overall performance and efficiency (Vaidya and et.al., 2018). In this way, people will be access the information about the financial details, renewals and management structure or audited etc. This will provide the many advantages for user to choose the online option for the purpose of registration, check status and verify the
certificates etc. In this way, it will be identified that security infrastructure is necessary in both technical and non technical ways. CONCLUSION As per discussion, it concluded thatNetwork security is important for business process to provide the security and safety in proper manner. It can be established the entire system by using software and hardware devices. An effective network security is managed the entire network and access in proper manner. It is discussed about the various potential risk and threats generated in network security. It also determines the need and requirement of security in the network by using infrastructure or applications. It summarized that the key features and components that improve the security infrastructure and also plan to address the identified items etc. this report describe the security infrastructure build and protected against the threats.
REFERENCES Books and journals: Berry, M., 2017. Network Security: Top Five Fundamentals.Retrieved December,2. Iskandar, A., Virma, E. and Ahmar, A.S., 2018. Implementing DMZ in Improving Network Security of Web Testing in STMIK AKBA.International Journal of Engineering & Technology,7(2.3), pp.99-104. Jøsang, A. and et.al.,2018.Network security. U.S. Patent 9,954,853. Kumar, R. and et.al., 2017. Interface to Network Security Functions (I2NSF): Problem Statement and Use Cases.Interface. Lopez, D. and et.al., 2018.Framework for interface to network security functions(No. RFC 8329). Miloslavskaya, N., 2018. Network Security Intelligence Center as a combination of SIC and NOC.Procedia Computer Science,145, pp.354-358. Mohammed,D.,Omar,M.andNguyen,V.,2018.WirelessSensorNetworkSecurity: Approaches to Detecting and Avoiding Wormhole Attacks.Journal of Research in Business, Economics and Management,10(2), pp.1860-1864. Reybok, R. and et.al., 2018.Techniques for sharing network security event information. U.S. Patent Application 10/032,020. Vaidya, S.M and et.al., 2018.Framework for coordination between endpoint security and network security services. U.S. Patent Application 10/075,470. White, G.B., Fisch, E.A. and Pooch, U.W., 2017.Computer system and network security. CRC press. Online: NetworkSecurity,2018.[online]Available through:<https://www.cisco.com/c/en/us/products/security/what-is-network- security.html>