Procedure Guide: Implementing Network Security for Organizations

Verified

Added on  2023/06/10

|4
|677
|338
Report
AI Summary
This report provides a comprehensive procedure guide for implementing Windows network security in organizations. It begins by emphasizing the critical need for robust security measures in the current interconnected environment, considering the shift to cloud-based services, on-premises computation, and mobile workforces. The guide outlines essential steps, including enhancing visibility of network traffic to monitor and evaluate data flow, implementing encryption and decryption to protect data and detect malware, segmenting content delivery to optimize security analysis, and deploying both inline and out-of-band security measures to address real-time threats and potential vulnerabilities. The guide emphasizes the importance of a multi-faceted approach to detect malware activities and intrusions. The report also discusses the use of Microsoft technologies such as firewalls and intrusion detection systems. References to Karygiannis & Owens (2012) and Zhang & Lee (2015) support the outlined security procedures.
Document Page
Running Head: APPLICATION SECURITY 1
APPLICATION SECURITY
Student Name
Institution Affiliation
Facilitator
Course
Date
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
APPLICATION SECURITY 2
In this era of Internet of Things, ensuring that the organizations network traffic is always
secure, whether on premises or cloud based has become a critical part of data protection
strategies. This ensures that an organization data is safe from landing into unauthorized hands
where it can be used to deter the organization. Implementing both secure wired and wireless
environment within an organization set up, there are some steps necessary
Microsoft has come up with a number of security technologies to make it easy when it
comes to protecting an institutions network. These technologies include, firewall, intrusion
detection systems, partitioned LANs, traffic isolation, access control, Azure security center and
Multi-tier topology (Karygiannis & Owens, 2012).
Critical considerations
The current networked world has been shifting constantly and the devices it connects also
change from time to time. The combination of cloud based services, on-premises computation
and the mobile workforce armed with the expanding diversity of connectivity devices calls for
advanced security systems in network and which are flexible as well as agile to be in a position
to detect malware activities and intrusions (Karygiannis & Owens, 2012).
Steps to Implementing Network Security
Organizations must deploy rigid cyber defense systems, systems which must be able to
focus on the Meta environment surrounding the organization technology as well as the specific
vulnerabilities. The following areas must be considered before implementing windows network
security (Karygiannis & Owens, 2012).
Visibility of Traffic
Document Page
APPLICATION SECURITY 3
With the virtualization of destinations and origins, the network traffic has grown
complicated. The gap between virtual and physical environments implies that it is no more viable
to say certain physical systems are secure, simply because both the application and the data
served by virtual devices can exist over various physical systems. Security systems therefore are
supposed to be in a position to identify, monitor and evaluate traffic, not considering source and
destinations (Zhang & Lee, 2015).
Encryption and decryption
The interception techniques available today have made it trivial for intruders to listen to
network traffic and therefore making encryption very important than ever before. However, the
same encryption protecting data in transit has made it hard to detect malwares hidden in
encrypted data. Cybersecurity systems to be implemented should therefore be in a position to
decrypt traffic in order to evaluate it while up keeping data confidentiality and security (Zhang &
Lee, 2015).
Segment Content Delivery
All content in an organization does not require same threat analysis. The security
professionals are therefore supposed to direct different security issues to the systems which are
designed to handle such the best. For instance, YouTube videos are evaluated differently from
mail chats. Network traffic has to be segmented to allow best utilization of security analysis and
bandwidth (Zhang & Lee, 2015).
Inline and Out of Band Security
Inline network is a real time security monitoring standards, but the advanced persistent
threats (APTs) have the ability of infiltrating the computing resources and become active after
Document Page
APPLICATION SECURITY 4
certain period of time. Out of Band Security need to be implemented to allow the analysis of
threats that already penetrated the network and probing vulnerabilities with a potential of
launching attacks (Zhang & Lee, 2015).
References
Karygiannis, T., & Owens, L. (2012). Wireless network security. NIST special publication, 800,
48.
Zhang, Y., & Lee, W. (2015, August). Intrusion detection in wireless ad-hoc networks.
In Proceedings of the 6th annual international conference on Mobile computing and
networking(pp. 275-283). ACM.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]