This article provides an overview of network security, its importance, and the various types of firewalls. It also discusses the implementation of network security systems and provides study material and solved assignments on network security.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
TITLE: NETWORK SECURITY Network Security
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Abstract Network securityis the safety that is implemented to the systems to prevent them from unauthorized access and risks. IT and Networking experts must ensure that there networks are very secured from any external attack. In our daily life's, computers or phones uses network to make transactions, communicate sensitive information, among other issues. Therefore a very secured network should be ensured to prevent any data lose or breach in any case. If malicious hackers will gain access then it will lead to great loses in a business. Security measures in computer networks should be take to first priority among other securities (Peixiao, Chopra, Wing, Ganti, Corde, & Patil 2019). Introduction Firewall can be placed in your network with all the updated vulnerabilities and still wrongly configured. This problem will create so many troubles. The configurations will cause the conflicts in your settings within the network system. This will lead to poor performance in the network within a company and also it will create some holes which external attackers can use it to gain access to the networking due to conflicts within the firewall itself hence creating vulnerabilities. Networking and IT experts must ensure that the configurations of the firewall will taken serious and it is done professional way. Missed Security Patches is problem caused by poor management of the network firewall software. Attackers always check the possible vulnerabilities and this might be their gateway. IT and Network experts should always be careful and alert of the firewall tools since it can cause significant problems. The vendors can assist fix some problems experienced on the software. Management schedules must be set so as to allow careful monitoring and updating the network firewalls no matter the situation whether there is attack or not (Yu, Qi, & Li, 2019). Circuit-Level Gateways is more advanced application gateway and it works at the session layer of the OSI Model. The significance of this gateway is it acts as the virtual connections between the internal users and the remote host. It achieve it by creating connection between itself and the remote host. It also secures and hides the IP addresses of the end users on the packets by removing and adding its own IP address hence preventing the exposure of the IP addresses of the internal users from the outside world. This secures so many threads that would have been received if the IP address is exposed. Firewall is a type of network security system which monitors and controls network traffic flowing in and out of network according to the network protocols. It acts as a wall barrier between the internal network and the internet. Firewall can be in form of software or hardware appliances. Hardware-based act as DHCP server from that network. In most cases experts prefer software-based firewalls because it secures data from the internet threads. Routers uses software-based firewalls since the data being transferred from one network to another must pass internet hence it can also performs routing protocols. Firewalls are mainly used in private networks to prevent any trouble of unauthorized access which maybe through internet. All the messages moving in and out of intranet network must me examined and security measures checked by the firewalls. Secured firewall configurations consist of both hardware and software devices. It is very important type of security measures in the computer network (Peixiao, Chopra, Wing, Ganti, Corde, & Patil 2019).
Network security system threads and requirements Network security is the safety that is implemented to the systems to prevent them from unauthorized access and risks. IT and Networking experts must ensure that there networks are very secured from any external attack. In our daily life's, computers or phones uses network to make transactions, communicate sensitive information, among other issues. Therefore a very secured network should be ensured to prevent any data lose or breach in any case. If malicious hackers will gain access then it will lead to great loses in a business. Security measures in computer networks should be take to first priority among other securities (Yu, Qi, & Li, 2019). Software tools such as antivirus can be used to detect and remove any malicious software in the computer systems. Sometimes we might download software in one way or another with or without knowledge. Therefore, antivirus will help us remove such malicious software build by hackers to still personal information. This has really help a lot because while busy in computer then you can mistakenly click download to anything on the screen. Modern antivirus nowadays do much more than only protection from viruses but also from worms, Trojan-horses, spyware, among other malicious programs .Caution must be taken to ensure computer data are save (Alm, 2019). Intrusion detection systems are more advanced system software. Their main function is to monitor and analyze malicious activities taking place in network then gives out the details about such information by reporting them. They are also able to send any alerts to the experts about any malicious activities taking place in the network. It can also do the resetting of connections in the network to save IP address blockage in case there is no one to respond to such alerts. It can also clean up unwanted transport and layers in network, prevent TCP sequencing, and also correct cyclic redundancy check errors (Wnuk, Kościelny, Syfert, & Ciepiela, 2019, March).
Firewalls configurations from attacks Firewall is a type of network security system which monitors and controls network traffic flowing in and out of network according to the network protocols. It acts as a wall barrier between the internal network and the internet. Firewall can be in form of software or hardware appliances. Hardware-based act as DHCP server from that network. In most cases experts prefer software-based firewalls because it secures data from the internet threads. Routers uses software-based firewalls since the data being transferred from one network to another must pass internet hence it can also performs routing protocols (Alm, 2019). Firewalls are mainly used in private networks to prevent any trouble of unauthorized access which maybe through internet. All the messages moving in and out of intranet network must me examined and security measures checked by the firewalls. Secured firewall configurations consist of both hardware and software devices. It is very important type of security measures in the computer network (Wnuk, Kościelny, Syfert, & Ciepiela, 2019, March).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Types of Firewalls 1) Packet Filters Packet Filters works in network layer of OSI model. It uses set of rules where it will have to decide whether to forward or discard messages through the network. For instance, it can make a decision of blocking or disallow all the data transfer from specific IP address or all traffic from UDP protocol. In other scenarios it may make default decisions of allowing all or discarding all of the packets in the network (Peixiao, Chopra, Wing, Ganti, Corde, & Patil 2019). Security threats to Packet Filters: a) IP address spoofing: In this situation, the malicious attackers sends a packet to the intranet network using the same IP address as the internal users IP address. Firewalls can overcome this by not allowing any packet from outside the internal network to be received by internal users from internet(Alm, 2019).
b) Source routing attack: In this kind of attack, the attacker specifies the route to send the packet with the hope of tricking the firewall to allow packet transfer. Firewall will overcome this situation by just discarding all the packets which tries to use source routing options (Peixiao, Chopra, Wing, Ganti, Corde, & Patil 2019). 2) Stateful Inspection Firewalls It is also referred to as 'Dynamic Packet Filters'. It is always keep it self to active connections and this will allow them to decide which packet to allow for the transfer. Due to this state of functioning, it adapts itself current information exchange in the network and starts to work according to the network function. This is the modern way not like the previous versions of hardcore and stateless filters (Yu, Qi, & Li, 2019).
3) Circuit-Level Gateways This is more advanced application gateway and it works at the session layer of the OSI Model. The significance of this gateway is it acts as the virtual connections between the internal users and the remote host. It achieve it by creating connection between itself and the remote host. It also secures and hides the IP addresses of the end users on the packets by removing and adding its own IP address hence preventing the exposure of the IP addresses of the internal users from the outside world. This secures so many threads that would have been received if the IP address is exposed (Wnuk, Kościelny, Syfert, & Ciepiela, 2019, March). 4) Missed Security Patches This problem is caused by poor management of the network firewall software. Attackers always check the possible vulnerabilities and this might be their gateway. IT and Network experts should always be careful and alert of the firewall tools since it can cause significant problems. The vendors can assist fix some problems experienced on the software. Management schedules must be set so as to allow careful monitoring and updating the network firewalls no matter the situation whether there is attack or not (Peixiao, Chopra, Wing, Ganti, Corde, & Patil 2019).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
5) Configuration Mistakes Firewall can be placed in your network with all the updated vulnerabilities and still wrongly configured. This problem will create so many troubles. The configurations will cause the conflicts in your settings within the network system. This will lead to poor performance in the network within a company and also it will create some holes which external attackers can use it to gain access to the networking due to conflicts within the firewall itself hence creating vulnerabilities. Networking and IT experts must ensure that the configurations of the firewall will taken serious and it is done professional way (Alm, 2019).
Designing and implementation of network security systems Network security is the safety that is implemented to the systems to prevent them from unauthorized access and risks. IT and Networking experts must ensure that there networks are very secured from any external attack. In our daily life's, computers or phones uses network to make transactions, communicate sensitive information, among other issues. Therefore a very secured network should be ensured to prevent any data lose or breach in any case. If malicious hackers will gain access then it will lead to great loses in a business. Security measures in computer networks should be take to first priority among other securities (Yu, Qi, & Li, 2019). Designing of network security system Intrusion detection systems are more advanced system software. Their main function is to monitor and analyze malicious activities taking place in network then gives out the details about such information by reporting them. They are also able to send any alerts to the experts about any malicious activities taking place in the network. It can also do the resetting of connections in the network to save IP address blockage in case there is no one to respond to such alerts. It can also clean up unwanted transport and layers in network, prevent TCP sequencing, and also correct cyclic redundancy check errors. A virtual private network (VPN) is programming that guarantee safety and encryption of connection in a very less secured network. A VPN functions in a public internet while it strictly maintain the privacy through procedures. VPN encrypts the data from the sender and also decrypt to the receiver, the network tunnel which the data is transferred cannot in anyway tamper the data because encryption is very secured and they are not vulnerable. Also the network addresses can also be presented by VPN (Peixiao, Chopra, Wing, Ganti, Corde, & Patil 2019). Firewall is a type of network security system which monitors and controls network traffic flowing in and out of network according to the network protocols. It acts as a wall barrier between the internal network and the internet. Firewall can be in form of software or hardware appliances. Hardware-based act as DHCP server from that network. In most cases experts prefer software-based firewalls because it secures data from the internet threads. Routers uses software-based firewalls since the data being transferred from one network to another must pass internet hence it can also performs routing protocols (Alm, 2019). Software tools such as antivirus can be used to detect and remove any malicious software in the computer systems. Sometimes we might download software in one way or another with or without knowledge. Therefore, antivirus will help us remove such malicious software build by hackers to still personal information. This has really help a lot because while busy in computer then you can mistakenly click download to anything on the screen. Modern antivirus nowadays do much more than only protection from viruses but also from worms, Trojan-horses, spyware, among other malicious programs .Caution must be taken to ensure computer data are save (Laborde, Bulusu, Wazan, Barrère, & Benzekri, 2019, April). Intrusion detection systems are more advanced system software. Their main function is to monitor and analyze malicious activities taking place in network then gives out the details about such information by reporting them. They are also able to send any alerts to the experts about any malicious activities taking place in the network. It can also do the resetting of connections in the
network to save IP address blockage in case there is no one to respond to such alerts. It can also clean up unwanted transport and layers in network, prevent TCP sequencing, and also correct cyclic redundancy check errors (Shah, SHAH, & Shah, 2019).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Implementation of network design IP address spoofing. In this situation, the malicious attackers sends a packet to the intranet network using the same IP address as the internal users IP address. Firewalls can overcome this by not allowing any packet from outside the internal network to be received by internal users from internet. Source routing attack is a kind of attack where the attacker specifies the route to send the packet with the hope of tricking the firewall to allow packet transfer. Firewall will overcome this situation by just discarding all the packets which tries to use source routing options. Stateful Inspection Firewalls also referred to as 'Dynamic Packet Filters'. It is always keep it self to active connections and this will allow them to decide which packet to allow for the transfer. Due to this state of functioning, it adapts itself current information exchange in the network and starts to work according to the network function. This is the modern way not like the previous versions of hardcore and stateless filters (Wnuk, Kościelny, Syfert, & Ciepiela, 2019, March). Firewall can be placed in your network with all the updated vulnerabilities and still wrongly configured. This problem will create so many troubles. The configurations will cause the conflicts in your settings within the network system. This will lead to poor performance in the network within a company and also it will create some holes which external attackers can use it to gain access to the networking due to conflicts within the firewall itself hence creating vulnerabilities. Networking and IT experts must ensure that the configurations of the firewall will taken serious and it is done professional way. Missed Security Patches is problem caused by poor management of the network firewall software. Attackers always check the possible vulnerabilities and this might be their gateway. IT and Network experts should always be careful and alert of the firewall tools since it can cause significant problems. The vendors can assist fix some problems experienced on the software. Management schedules must be set so as to allow careful monitoring and updating the network firewalls no matter the situation whether there is attack or not. Circuit-Level Gateways is more advanced application gateway and it works at the session layer of the OSI Model. The significance of this gateway is it acts as the virtual connections between the internal users and the remote host. It achieve it by creating connection between itself and the remote host. It also secures and hides the IP addresses of the end users on the packets by removing and adding its own IP address hence preventing the exposure of the IP addresses of the internal users from the outside world. This secures so many threads that would have been received if the IP address is exposed (Laborde, Bulusu, Wazan, Barrère, & Benzekri, 2019, April).
Implementation of Virtual Private Network (VPN) A virtual private network (VPN) is programming that guarantee safety and encryption of connection in a very less secured network. A VPN functions in a public internet while it strictly maintain the privacy through procedures. VPN encrypts the data from the sender and also decrypt to the receiver, the network tunnel which the data is transferred cannot in anyway tamper the data because encryption is very secured and they are not vulnerable. Also the network addresses can also be presented by VPN (Shah, SHAH, & Shah, 2019).. 1) Remote access VPN Remote access VPN clients have an access of organization's network through VPN gateway servers. The gateway servers will only need the authenticated devices in order to allow access of the internal network for the resources such as intranets, printers, file serves and scanners among others. It requires IP Security (IPsec) or Secure Sockets Layer(SSL) for connection security (Wnuk, Kościelny, Syfert, & Ciepiela, 2019, March).
2) Site-to-site VPN Site-to-site VPN utilizes a gateway device to connect an entire network in one location to a network in another location. The connection is more of direct connection. End-node devices in the remote location do not need VPN clients because the gateway handles the connection (Yu, Qi, & Li, 2019). 3) Hardware VPN Hardware VPN has so many great advantages as compared with the software-based VPN. Security is also enhanced where it gives balance the data loads of the clients. Hardware VPN is relatively expensive but very advantageous over the software Hardware VPN. The data security of the businesses and organizations are guaranteed despite the big price (Peixiao, Chopra, Wing, Ganti, Corde, & Patil 2019).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4) Dynamic multipoint virtual private network (DMVPN) Dynamic multipoint virtual private network (DMVPN) is security VPN feature where the data transfer between the sites is exchanged directly without the need of passing the traffic in the headquarters VPN servers or routers. A DMVPN normally build a mesh VPN service which runs on VPN routers and the firewall concentrators. The data here is very secured and no doubts about it (Laborde, Bulusu, Wazan, Barrère, & Benzekri, 2019, April). 5) VPN Reconnect VPN Reconnect is a feature that is only available in Windows 7 and Windows server 2008 R2 which allows the VPN connections open even after a brief interruption of the internet services. In a scenario where the end user computer loose connection to a network, then this feature will be useful in that situation (Wnuk, Kościelny, Syfert, & Ciepiela, 2019, March).
Terminal Access Controller Access-Control System plus(TACACS+) Terminal Access Controller Access-Control System plus(TACACS+) is the feature that forwards the username and the passwords to the central security servers. It is the most significant features in all the security systems. TACACS+ uses the TCP as the communication protocol between remote client and the security server. It encrypt the data link for security purpose on the remote database. It also supports PAP, CHAP, and MS-CHAP authentication and also it is useful for both LAN and WAN security (Laborde, Bulusu, Wazan, Barrère, & Benzekri, 2019, April). Remote Authentication Dial-in User Service (RADIUS) RADIUS has a feature of only encrypting the password in the access-request packet from the client to the server. Other information will be left for the third part such as username, accounting and authorized services. It combines both authentication and authorization features to accept packets and make it difficult to decouple (Wnuk, Kościelny, Syfert, & Ciepiela, 2019, March).
Conclusion Network security is the safety that is implemented to the systems to prevent them from unauthorized access and risks. IT and Networking experts must ensure that there networks are very secured from any external attack. In our daily life's, computers or phones uses network to make transactions, communicate sensitive information, among other issues. Therefore a very secured network should be ensured to prevent any data lose or breach in any case. If malicious hackers will gain access then it will lead to great loses in a business. Security measures in computer networks should be take to first priority among other securities. Firewalls are mainly used in private networks to prevent any trouble of unauthorized access which maybe through internet. All the messages moving in and out of intranet network must me examined and security measures checked by the firewalls. Secured firewall configurations consist of both hardware and software devices. It is very important type of security measures in the computer network (Shah, SHAH, & Shah, 2019)..
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Reference 1. Shah, S., SHAH, K. R., & Shah, J. N. (2019). U.S. Patent Application No. 16/135,218. 2. Alm, A. (2019). Internet of Things mesh network: Using the Thread networking protocol. 3. Peixiao, L. I. N., Chopra, A., Wing, D. G., Ganti, V., Corde, C., & Patil, A. (2019). U.S. Patent Application No. 16/112,648. 4. Laborde, R., Bulusu, S. T., Wazan, A. S., Barrère, F., & Benzekri, A. (2019, April). Logic-based methodology to help security architects in eliciting high-level network security requirements. In Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing (pp. 1610-1619). ACM. 5. Yu, H., Qi, H., & Li, K. (2019). WECAN: an Efficient West-East Control Associated Network for Large-Scale SDN Systems. Mobile Networks and Applications, 1-11. 6. Wnuk, P., Kościelny, J. M., Syfert, M., & Ciepiela, P. (2019, March). The Issue of Adaptation of Diagnostic System to Protect Industrial Control Systems Against Cyber Threads. In Conference on Automation (pp. 258-267). Springer, Cham.