logo

Network Security

17 Pages3645 Words241 Views
   

Added on  2023-04-03

About This Document

This article provides an overview of network security, its importance, and the various types of firewalls. It also discusses the implementation of network security systems and provides study material and solved assignments on network security.

Network Security

   Added on 2023-04-03

ShareRelated Documents
TITLE: NETWORK SECURITY
Network Security
Network Security_1
Abstract
Network security is the safety that is implemented to the systems to prevent them from
unauthorized access and risks. IT and Networking experts must ensure that there networks are very
secured from any external attack. In our daily life's, computers or phones uses network to make
transactions, communicate sensitive information, among other issues. Therefore a very secured
network should be ensured to prevent any data lose or breach in any case. If malicious hackers will
gain access then it will lead to great loses in a business. Security measures in computer networks
should be take to first priority among other securities (Peixiao, Chopra, Wing, Ganti, Corde, & Patil
2019).
Introduction
Firewall can be placed in your network with all the updated vulnerabilities and still wrongly
configured. This problem will create so many troubles. The configurations will cause the conflicts
in your settings within the network system. This will lead to poor performance in the network
within a company and also it will create some holes which external attackers can use it to gain
access to the networking due to conflicts within the firewall itself hence creating vulnerabilities.
Networking and IT experts must ensure that the configurations of the firewall will taken serious and
it is done professional way. Missed Security Patches is problem caused by poor management of the
network firewall software. Attackers always check the possible vulnerabilities and this might be
their gateway. IT and Network experts should always be careful and alert of the firewall tools since
it can cause significant problems. The vendors can assist fix some problems experienced on the
software. Management schedules must be set so as to allow careful monitoring and updating the
network firewalls no matter the situation whether there is attack or not (Yu, Qi, & Li, 2019).
Circuit-Level Gateways is more advanced application gateway and it works at the session layer of
the OSI Model. The significance of this gateway is it acts as the virtual connections between the
internal users and the remote host. It achieve it by creating connection between itself and the remote
host. It also secures and hides the IP addresses of the end users on the packets by removing and
adding its own IP address hence preventing the exposure of the IP addresses of the internal users
from the outside world. This secures so many threads that would have been received if the IP
address is exposed. Firewall is a type of network security system which monitors and controls
network traffic flowing in and out of network according to the network protocols. It acts as a wall
barrier between the internal network and the internet. Firewall can be in form of software or
hardware appliances. Hardware-based act as DHCP server from that network. In most cases experts
prefer software-based firewalls because it secures data from the internet threads. Routers uses
software-based firewalls since the data being transferred from one network to another must pass
internet hence it can also performs routing protocols. Firewalls are mainly used in private networks
to prevent any trouble of unauthorized access which maybe through internet. All the messages
moving in and out of intranet network must me examined and security measures checked by the
firewalls. Secured firewall configurations consist of both hardware and software devices. It is very
important type of security measures in the computer network (Peixiao, Chopra, Wing, Ganti, Corde,
& Patil 2019).
Network Security_2
Network security system threads and requirements
Network security is the safety that is implemented to the systems to prevent them from
unauthorized access and risks. IT and Networking experts must ensure that there networks are very
secured from any external attack. In our daily life's, computers or phones uses network to make
transactions, communicate sensitive information, among other issues. Therefore a very secured
network should be ensured to prevent any data lose or breach in any case. If malicious hackers will
gain access then it will lead to great loses in a business. Security measures in computer networks
should be take to first priority among other securities (Yu, Qi, & Li, 2019).
Software tools such as antivirus can be used to detect and remove any malicious software in the
computer systems. Sometimes we might download software in one way or another with or without
knowledge. Therefore, antivirus will help us remove such malicious software build by hackers to
still personal information. This has really help a lot because while busy in computer then you can
mistakenly click download to anything on the screen. Modern antivirus nowadays do much more
than only protection from viruses but also from worms, Trojan-horses, spyware, among other
malicious programs .Caution must be taken to ensure computer data are save (Alm, 2019).
Intrusion detection systems are more advanced system software. Their main function is to monitor
and analyze malicious activities taking place in network then gives out the details about such
information by reporting them. They are also able to send any alerts to the experts about any
malicious activities taking place in the network. It can also do the resetting of connections in the
network to save IP address blockage in case there is no one to respond to such alerts. It can also
clean up unwanted transport and layers in network, prevent TCP sequencing, and also correct cyclic
redundancy check errors (Wnuk, Kościelny, Syfert, & Ciepiela, 2019, March).
Network Security_3
Firewalls configurations from attacks
Firewall is a type of network security system which monitors and controls network traffic flowing
in and out of network according to the network protocols. It acts as a wall barrier between the
internal network and the internet. Firewall can be in form of software or hardware appliances.
Hardware-based act as DHCP server from that network. In most cases experts prefer software-based
firewalls because it secures data from the internet threads. Routers uses software-based firewalls
since the data being transferred from one network to another must pass internet hence it can also
performs routing protocols (Alm, 2019).
Firewalls are mainly used in private networks to prevent any trouble of unauthorized access which
maybe through internet. All the messages moving in and out of intranet network must me examined
and security measures checked by the firewalls. Secured firewall configurations consist of both
hardware and software devices. It is very important type of security measures in the computer
network (Wnuk, Kościelny, Syfert, & Ciepiela, 2019, March).
Network Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Infrastructure Component 2022 Report
|10
|2182
|17

Firewalls
|17
|1394
|368

Network Infrastructure Component Report 2022
|14
|2934
|16

Security Presentation and Guidebook - IT Security
|10
|1587
|18

TCP/IP Networking | Assignment
|17
|616
|33

IT Network Security
|68
|3007
|50