Comprehensive Analysis of Network Security Policies and Strategies

Verified

Added on  2023/06/03

|5
|1239
|194
Report
AI Summary
This report provides an overview of network security policies and their importance in protecting network integrity. It discusses four articles related to network security, covering topics such as acceptable use policies, cyber-attack prevention, and security measures like firewalls and intrusion detection systems (IDS). The report highlights the significance of securing confidential information, implementing access control lists, and using VPN policies for remote access protection. It also explores the role of cryptography and encryption techniques in ensuring data security during transmission. The conclusion emphasizes the need for well-defined security configurations and strategies to enhance network capacity and protect against internal and external threats. Desklib provides access to this report and many other study resources.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Network security
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1 | P a g e
Introduction
Network security policy is used to protect the integrity of a network by making sure
that risk associated with the system is mitigated. This policy ensures that computer and
network are secured from the misuse. In this report, four articles related to network security
policy is discussed. The security policy component makes use of acceptable use policy as it
defined the list of things that are allowed to be performed by the user. These policies make
sure that information and people are protected. The policy set the rules so that security could
be enhanced.
1. Perlman, R., Kaufman, C. and Speciner, M., 2016. Network security: private
communication in a public world. Pearson Education India.
The title of the article disused is “Network security in the public world” written by Perlman,
Speciner and kaunman. In the views of author it is found that network security is one of the
important components in the field of communication and networking. The importance of
network security for an organisation as well as customers is discussed. It states that all the
confidential information should be secured and should be accessed only by the authorised and
valid user. It is true that cyber-attacks and criminal activities are increasing day by day. Thus
cyber-attacks are analysed in this article and effective solutions are offered. In the article the
analytic method that is used is qualitative and the data is collected through both primary as
well as secondary source. Some of the advanced technology that are discussed in the article to
improve security is firewalls, antiviruses, building cloud atmosphere ad risk protection
through big data. The paper covered the threats that are faced on computer networks and the
methods to prevent it. The author suggested that security plans should be designed so that in
case of failure system could be recovered easily.
2. Shahbazi, M and McAfee LLC, 2014. Network security: System and method for
enforcing a security policy on mobile devices using dynamically generated security
profiles. U.S. Patent 8,635,661.
The title of this paper is Network Security: System and method for enforcing a security
policy on mobile devices using dynamically generated security profiles that was written
by Shahbazi and McAfee in year 2014. The purpose of this article is to know about the
challenges and finding the ways through which risk and threats could be reduced. Security is
Document Page
2 | P a g e
a common challenge that many organisations are suffering. The author explained the concern
of network security policy, it is as set of rules that defines the way through regarding
computer network access and also lays out the architecture so that security of an organisation
is maintained. Network security policy makes sure that malicious users are kept out of the
system and risk is minimised. The first steps that need to be taken are, understanding the
importance of information and then designing ways through which protection can be offered.
The policies are elaborated by defining set of instructions so that security of network is
maintained. It helps in protecting the network from all the threats both internal as well as
external. Network security policies are rules that help in modifying the access control. The
author stated that access control list should be designed so that only valid users are able to
access the information. It is important that every organisation enforce actions so that security
could be boosted. The VPN policy is used so that data can be protected when It travel through
the untrusted network. The remote access of network can be protected by using VPN so that
security patches could be identified.
3. Safa, N.S., Von Solms, R. and Furnell, S., 2016. Information security policy
compliance model in organizations. Computers & Security, 56, pp.70-82.
The article that is selected is “Information security policy” written by safa, solms and furnell
in year 2016. The objective of this article is to state the importance of network security. It
was found that all the organisations rely on the network for storing their data. Thus, it is
important to make sure that network is secure and integrity and confidentiality is maintained.
The author suggested that an IDS approach could be used so that network remains secure
from all the cyber-attacks and malware activities. The data is captured by using both primary
and secondary data source. The suggestion that was made by the author was making use of
intrusion prevention system, so that bugs can be detected and they future do not penetrate in
the system. Apart from that firewalls should be installed as it blocks the viruses to enter the
system and read some files silently. Cryptography is also a way through which network
channels and data can remain secure. Author stated that data should be encrypted in a chipper
text form. So that even if the information is leaked it is not read by any unauthorised user.
Thus, the article covers various methods through which security could be improved.
Document Page
3 | P a g e
4. Pisharody, S., Natarajan, J., Chowdhary, A., Alshalan, A. and Huang, D., 2017. Brew:
A security policy analysis framework for distributed SDN-based cloud environments.
IEEE Transactions on Dependable and Secure Computing.
The paper is written by Pisharody, Natarajan, Chowdhary, Alshalan and Huang in year 2017
The aim of this paper is to list down the importance of network security and the ways through
which communication system could be improved. The author suggested making use of
cryptography and encryption technique. As compared to other research paper it was found
that cryptograph is one of the best ways. It makes sure that even the information is leaked it is
not accessed, as the information is decoded into a form that is not readable. Thus, security is
important as data is transferred from one location to other through network channels. The
author made use of qualitative data as information is collected by the means of website,
journals and books. The benefit of this paper is it explains the significance of networks
security but researcher did not provide more steps and methods to resolve issue of security.
Cryptography is an advanced technology that is used to keep all the private data of customers
safe.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4 | P a g e
Conclusion
The network policy defines the requirement that is needed by third party to make the
agreement or connection on the network. The policy also covers the access control list
regarding who are allowed to access the network. Some of the security ports are discussed so
that all the wired and wireless data ports are connected securely. The author has defined
minimal security configuration standards for servers so that production of network capacity
could be enhanced. The main objective of this report is to describe various kinds of policies
and strategies for the security of network devices.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]