Data Communication and Security: Strategies for Network Defense
Verified
Added on 2023/06/12
|6
|1023
|378
AI Summary
This report explores various strategies for defending a communication channel or network, including firewalls and antivirus software. The advantages and disadvantages of each approach are discussed, along with additional strategies for protecting against unauthorized users and threats to system integrity.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
1DATA COMMUNICATION AND SECURITY DATA COMMUNICATION AND SECURITY Name of the Student Name of the University Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2DATA COMMUNICATION AND SECURITY Table of Contents Introduction................................................................................................................................3 Strategy of defence.....................................................................................................................3 Advantage..................................................................................................................................3 Disadvantage..............................................................................................................................4 Conclusion..................................................................................................................................4 References..................................................................................................................................5
3DATA COMMUNICATION AND SECURITY Introduction In recent times, the technology is enhancing at a rapid speed, and the threats which are involved in the concept are also increasing. The need for a proper strategy to defend the system and the network should be one of the highest priority. The main aim of the report is to take into consideration different approach, which can be implemented within a system, which would be protecting the system. On the other hand, the advantage and the disadvantage related to the strategy are also discussed. Strategy of defence There can be different types of policy, which is related to the security which can protect a communication channel or a network. The different approaches are stated below: Firewall: the concept of firewall provides a defence that supports the idea of the traditional router. This concept has to capability to add much tighter and very many complicated rules for the communication between the different networks segments and zones. There are different types of firewall, which can be sued according to the requirement of the system. Antivirus: The concept of antivirus directly allow the defence concept, which can be applied to the communication channel, which would be directly preventing intruders from getting the access to the channel. Few of the strategy which can be incorporated in a communication channel with regards to unauthorized users are stated below: Strategy 1: Authorize a authenticate the network users Strategy 2:Deployment of VLANs for the concept of traffic separation
4DATA COMMUNICATION AND SECURITY Strategy 3: Use of stateful firewall technology at the level of port for the fine-grained security Strategy 4: Place encryption throughout the network to ensure the privacy of the system Strategy 5: Detection of threats to the integrity of the system and directly remediate them Strategy 6: Inclusion of endpoint security in the aspect of the policy based enforcement Advantage Firewall:The main benefit of the firewall is to block the evil packets from being getting into the network. The central aspect, which can be included in the concept, is not to stop the packages but the main point is to stop the packages. One of the best example, which can be related to the idea, is the network-based firewall such as the router, which can directly protect multiple system at one single time. There are many other options, which can be related to the process, which can preserve the system such as the system firewall. The system firewall is preinstalled into the system, which can help the network to be secured from intruders (Yang & Fung, 2016). Antivirus:The main advantage, which can be achieved from the antivirus, is the protection against different types of virus, spyware, worms, rootkits and key loggers. This can be very much beneficial in the process of protecting the system of the user as well as the network, which is used for communication. In most of the system, the antivirus is preinstalled which can protect the system from different types of activities, which are conducted over the concept of the internet (Genge, Haller & Kiss, 2017). Disadvantage Firewall:The packet filtering can be considered as a software firewall, which can directly degrade the system’s performance. This is due to the factor that it is demanding the task to
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
5DATA COMMUNICATION AND SECURITY examine every packet of the data, which is entering into the channel. This concept can also lend user with a false sense of security encouraging them not to maintain security at the machine level. If the concept of the network fails, it can directly fail or prove to be disastrous for the system. Antivirus:The concept of antivirus slows down the system of the user. The installation process, which is involved into the concept, can take lots of memory space which would not be utilised appropriately. In most of the cases the user has to update the antivirus, which is used by them. They commonly involve lots of activity and false breakups, which can hamper the functionality of the normal system (Pathan, 2016). Conclusion The report can conclude on a note that the overall strategy which are defined in the report has some positive impact as well as some negative impact. Moreover, it can be stated that the primary aim of the aspect should be to include the overall security of the network.
6DATA COMMUNICATION AND SECURITY References Pathan, A. S. K. (Ed.). (2016). Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press. Genge, B., Haller, P., & Kiss, I. (2017). Cyber-security-aware network design of industrial control systems.IEEE Systems Journal,11(3), 1373-1384. Yan, F., Jian-Wen, Y., & Lin, C. (2015, June). Computer Network Security and Technology Research.InMeasuringTechnologyandMechatronicsAutomation(ICMTMA),2015 Seventh International Conference on(pp. 293-296). IEEE. Yang, W., & Fung, C. (2016, June). A survey on security in network functions virtualization. InNetSoft Conference and Workshops (NetSoft), 2016 IEEE(pp. 15-19). IEEE.