Report on Data Communication and Security: Defense Strategies

Verified

Added on  2023/06/12

|6
|1023
|378
Report
AI Summary
This report discusses defense strategies in data communication and security, focusing on the use of firewalls and antivirus software. It outlines various approaches such as authorizing network users, deploying VLANs for traffic separation, using stateful firewall technology, implementing encryption, and detecting/remediating threats. The report highlights the advantages of firewalls in blocking malicious packets and antivirus software in protecting against viruses and spyware. However, it also addresses disadvantages such as performance degradation due to packet filtering and system slowdowns caused by antivirus software. The conclusion emphasizes the importance of balancing the positive and negative impacts of these strategies to ensure overall network security.
Document Page
1DATA COMMUNICATION AND SECURITY
DATA COMMUNICATION AND SECURITY
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2DATA COMMUNICATION AND SECURITY
Table of Contents
Introduction................................................................................................................................3
Strategy of defence.....................................................................................................................3
Advantage..................................................................................................................................3
Disadvantage..............................................................................................................................4
Conclusion..................................................................................................................................4
References..................................................................................................................................5
Document Page
3DATA COMMUNICATION AND SECURITY
Introduction
In recent times, the technology is enhancing at a rapid speed, and the threats which
are involved in the concept are also increasing. The need for a proper strategy to defend the
system and the network should be one of the highest priority. The main aim of the report is to
take into consideration different approach, which can be implemented within a system, which
would be protecting the system. On the other hand, the advantage and the disadvantage
related to the strategy are also discussed.
Strategy of defence
There can be different types of policy, which is related to the security which can protect a
communication channel or a network. The different approaches are stated below:
Firewall: the concept of firewall provides a defence that supports the idea of the
traditional router. This concept has to capability to add much tighter and very many
complicated rules for the communication between the different networks segments
and zones. There are different types of firewall, which can be sued according to the
requirement of the system.
Antivirus: The concept of antivirus directly allow the defence concept, which can be
applied to the communication channel, which would be directly preventing intruders
from getting the access to the channel.
Few of the strategy which can be incorporated in a communication channel with regards to
unauthorized users are stated below:
Strategy 1: Authorize a authenticate the network users
Strategy 2:Deployment of VLANs for the concept of traffic separation
Document Page
4DATA COMMUNICATION AND SECURITY
Strategy 3: Use of stateful firewall technology at the level of port for the fine-grained
security
Strategy 4: Place encryption throughout the network to ensure the privacy of the system
Strategy 5: Detection of threats to the integrity of the system and directly remediate them
Strategy 6: Inclusion of endpoint security in the aspect of the policy based enforcement
Advantage
Firewall: The main benefit of the firewall is to block the evil packets from being getting into
the network. The central aspect, which can be included in the concept, is not to stop the
packages but the main point is to stop the packages. One of the best example, which can be
related to the idea, is the network-based firewall such as the router, which can directly protect
multiple system at one single time. There are many other options, which can be related to the
process, which can preserve the system such as the system firewall. The system firewall is
preinstalled into the system, which can help the network to be secured from intruders (Yang
& Fung, 2016).
Antivirus: The main advantage, which can be achieved from the antivirus, is the protection
against different types of virus, spyware, worms, rootkits and key loggers. This can be very
much beneficial in the process of protecting the system of the user as well as the network,
which is used for communication. In most of the system, the antivirus is preinstalled which
can protect the system from different types of activities, which are conducted over the
concept of the internet (Genge, Haller & Kiss, 2017).
Disadvantage
Firewall: The packet filtering can be considered as a software firewall, which can directly
degrade the system’s performance. This is due to the factor that it is demanding the task to
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5DATA COMMUNICATION AND SECURITY
examine every packet of the data, which is entering into the channel. This concept can also
lend user with a false sense of security encouraging them not to maintain security at the
machine level. If the concept of the network fails, it can directly fail or prove to be disastrous
for the system.
Antivirus: The concept of antivirus slows down the system of the user. The installation
process, which is involved into the concept, can take lots of memory space which would not
be utilised appropriately. In most of the cases the user has to update the antivirus, which is
used by them. They commonly involve lots of activity and false breakups, which can hamper
the functionality of the normal system (Pathan, 2016).
Conclusion
The report can conclude on a note that the overall strategy which are defined in the
report has some positive impact as well as some negative impact. Moreover, it can be stated
that the primary aim of the aspect should be to include the overall security of the network.
Document Page
6DATA COMMUNICATION AND SECURITY
References
Pathan, A. S. K. (Ed.). (2016). Security of self-organizing networks: MANET, WSN, WMN,
VANET. CRC press.
Genge, B., Haller, P., & Kiss, I. (2017). Cyber-security-aware network design of industrial
control systems. IEEE Systems Journal, 11(3), 1373-1384.
Yan, F., Jian-Wen, Y., & Lin, C. (2015, June). Computer Network Security and Technology
Research. In Measuring Technology and Mechatronics Automation (ICMTMA), 2015
Seventh International Conference on (pp. 293-296). IEEE.
Yang, W., & Fung, C. (2016, June). A survey on security in network functions virtualization.
In NetSoft Conference and Workshops (NetSoft), 2016 IEEE (pp. 15-19). IEEE.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]