An Extensive Literature Review on Network Management Security
VerifiedAdded on 2023/04/21
|12
|3743
|245
Literature Review
AI Summary
This literature review provides a comprehensive overview of network management security, emphasizing the importance of protecting computer networks from unauthorized access and potential risks. It discusses the evolution of network management from telephone network analogies to modern complex systems, highlighting the critical role of security measures in managing software and hardware components. Key topics include access control, application security, data loss prevention, firewalls, email security, behavioral analytics, and intrusion prevention systems. The review also covers network management models such as the ISO network management model, which includes performance, configuration, security, accounting, and fault management. Protocols like CMIP and SNMP are examined, along with discussions on encryption, digital signatures, and physical versus information security. Furthermore, it delves into security attacks, authentication, access controls, stream and block ciphers, and cryptanalysis, providing a holistic view of the current landscape and future directions in network management security. Desklib offers this and many other solved assignments to aid students in their studies.

Running head: NETWORK MANAGEMENT SECURITY
LITERATURE REVIEW ON NETWORK MANAGEMENT
SECURITY
Name of the Student
Name of the University
Author Note
LITERATURE REVIEW ON NETWORK MANAGEMENT
SECURITY
Name of the Student
Name of the University
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1NETWORK MANAGEMENT SECURITY
Introduction
The main purpose of this paper is to prepare a literature review on network management
security. Network management is referred to the concept of organizing the computer networks. While
organization the system within network there are a variety of hardware and software products
available that helps in providing proper administrator management for a network. With the help of
security the user can protect the network system from unauthorized access. In this paper the main
focus is on network management security and the ways it can be implemented. In order to protect the
network from risks it becomes essential to develop network security. In order to create a network
security access control can be implemented within the network. This will provide proper security
towards the network. Apart from these other types of network management security control includes
application security, data loss prevention, implementing firewalls, implementing email security,
behavioral analytics and intrusion prevention system. With proper network management system the IT
managers will be able to manage their systems properly. It is important to understand the need for
network management security. The main aim of having proper network management is to manage the
software within the system and to provide proper security towards the network.
Literature review
Network management was developed with telephone analogy because of the reliability
offered by the telephone network. With time the technology has evolved a lot and the telephone
network is modified to a public switched telephone network. The main aim of having network
management is managing the software and hardware components properly. Organizing the managers,
agents, clients and servers for proper management of the network. In addition to this it becomes
important to implement proper security measures for managing the network. There are several
protocols available for managing the network this includes Simple Network Management protocol.
However managing network involves proper security measures to protect the network proper getting
hacked. In order to manage the security it is important to have proper integrity mechanisms that will
provide e clear view about the network. With a strong password and defining access control the access
Introduction
The main purpose of this paper is to prepare a literature review on network management
security. Network management is referred to the concept of organizing the computer networks. While
organization the system within network there are a variety of hardware and software products
available that helps in providing proper administrator management for a network. With the help of
security the user can protect the network system from unauthorized access. In this paper the main
focus is on network management security and the ways it can be implemented. In order to protect the
network from risks it becomes essential to develop network security. In order to create a network
security access control can be implemented within the network. This will provide proper security
towards the network. Apart from these other types of network management security control includes
application security, data loss prevention, implementing firewalls, implementing email security,
behavioral analytics and intrusion prevention system. With proper network management system the IT
managers will be able to manage their systems properly. It is important to understand the need for
network management security. The main aim of having proper network management is to manage the
software within the system and to provide proper security towards the network.
Literature review
Network management was developed with telephone analogy because of the reliability
offered by the telephone network. With time the technology has evolved a lot and the telephone
network is modified to a public switched telephone network. The main aim of having network
management is managing the software and hardware components properly. Organizing the managers,
agents, clients and servers for proper management of the network. In addition to this it becomes
important to implement proper security measures for managing the network. There are several
protocols available for managing the network this includes Simple Network Management protocol.
However managing network involves proper security measures to protect the network proper getting
hacked. In order to manage the security it is important to have proper integrity mechanisms that will
provide e clear view about the network. With a strong password and defining access control the access

2NETWORK MANAGEMENT SECURITY
ratio can be made limited. Implementing encryption within the network will help to maintain
confidentially and will limit the users. As after the network gets encrypted only the authorized person
will be able to access the network. This will improve privacy and will be beneficial for the network.
Encryption requires a private and public key that will be used at the type of encryption and
decryption. At the time of encryption public key is used, whereas in the time of decryption the user
needs to have a proper private key for decrypting the messages shared over the network. A digital
signature is used for maintaining the documents electronically. One document provided with a digital
signature needs to be encrypted in that way itself. The paper will also describe the recent changes
made within the network security management concept in order to provide a better future for people
involved in this stage.
Network management becomes a complex system with the increase in the size of the network.
Thus it becomes important to have proper control and monitoring over the network system. The
control includes autonomous systems and proper computer network. According to the author
Garofalakis et al. (2016), network management is included in the deployment process. It ensures
proper integration of the network and also helps device monitoring, configuration, evaluation, poll
and control over the network. The reason for implementing proper network management is to address
the requirements of the network that includes the availability of the proper network resources,
development based on real time, providing quality of service within a fixed cost. With the help of
proper performance the user has the capability of increasing the operational performance of the
network. However the networks are heterogeneous in nature and each device maintained within the
network can be used as a form of exchanging data and for communication purpose.
According to the author Chen et al. (2013), there are all total five areas which are described
by network management. This all areas are defined under the ISO network management model. The
five areas include performance management, configuration management, and security management,
accounting management and fault management. Performance management includes determining the
different components of the network that helps in determining the performance of a network. The
objective is to measure, analyze, report and control the utilization of the network. In order to manage
ratio can be made limited. Implementing encryption within the network will help to maintain
confidentially and will limit the users. As after the network gets encrypted only the authorized person
will be able to access the network. This will improve privacy and will be beneficial for the network.
Encryption requires a private and public key that will be used at the type of encryption and
decryption. At the time of encryption public key is used, whereas in the time of decryption the user
needs to have a proper private key for decrypting the messages shared over the network. A digital
signature is used for maintaining the documents electronically. One document provided with a digital
signature needs to be encrypted in that way itself. The paper will also describe the recent changes
made within the network security management concept in order to provide a better future for people
involved in this stage.
Network management becomes a complex system with the increase in the size of the network.
Thus it becomes important to have proper control and monitoring over the network system. The
control includes autonomous systems and proper computer network. According to the author
Garofalakis et al. (2016), network management is included in the deployment process. It ensures
proper integration of the network and also helps device monitoring, configuration, evaluation, poll
and control over the network. The reason for implementing proper network management is to address
the requirements of the network that includes the availability of the proper network resources,
development based on real time, providing quality of service within a fixed cost. With the help of
proper performance the user has the capability of increasing the operational performance of the
network. However the networks are heterogeneous in nature and each device maintained within the
network can be used as a form of exchanging data and for communication purpose.
According to the author Chen et al. (2013), there are all total five areas which are described
by network management. This all areas are defined under the ISO network management model. The
five areas include performance management, configuration management, and security management,
accounting management and fault management. Performance management includes determining the
different components of the network that helps in determining the performance of a network. The
objective is to measure, analyze, report and control the utilization of the network. In order to manage
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3NETWORK MANAGEMENT SECURITY
the performance of the network RFC2570 Internet-Standard Network Management Framework was
introduced. Whereas the function of the fault manager is to detect the fault within a network and
address these faults by providing a proper solution. Configuration management aim is to allow the
network managers to track the activity performed by each device. This includes tracking down the
activities taking place within the hardware and software. The other area of network management is
accounting management that includes usage charging, allocation of resources, privileges and usage
quotas. The security management area is the last part of network management model and hence
requires an access control over the resources used in the network as per the security policy.
There are several protocols available in order to protect the information flow within the network
management. The network management standard includes a CMIP protocol that is known as the
Common management information protocol. The protocol followed by the network management
includes OSI based management protocol whereas the management of object oriented is much more
complex to handle and needs a large memory space compared to others (Han and Lei 2012). CMIP
has become the telecommunication management network in order to provide for telecom service
providers. Apart from these the other network management standard used is Simple Network
Management protocol.
A set of interconnected devices or computers are said to form a network. While working with a
network it becomes very important to have proper security measures that will protect the network
from risks. Thus security ensures proper protection towards the data stored and shared over the
network. Basically the security provided towards the network are divided into two parts Physical
security and information security. Physical security ensures security towards some component from
physical actions which possess the capability of damaging the organization. The physical security has
the capability to destroy the file stored within the network and also can lead to terrorist attacks.
Physical security is further divided into providing proper security towards the hardware and software
components and providing security towards employees.
In order to maintain proper protection from information system it becomes important to maintain
the integrity, availability and confidentiality towards the data shared over the networks. This ensures
the performance of the network RFC2570 Internet-Standard Network Management Framework was
introduced. Whereas the function of the fault manager is to detect the fault within a network and
address these faults by providing a proper solution. Configuration management aim is to allow the
network managers to track the activity performed by each device. This includes tracking down the
activities taking place within the hardware and software. The other area of network management is
accounting management that includes usage charging, allocation of resources, privileges and usage
quotas. The security management area is the last part of network management model and hence
requires an access control over the resources used in the network as per the security policy.
There are several protocols available in order to protect the information flow within the network
management. The network management standard includes a CMIP protocol that is known as the
Common management information protocol. The protocol followed by the network management
includes OSI based management protocol whereas the management of object oriented is much more
complex to handle and needs a large memory space compared to others (Han and Lei 2012). CMIP
has become the telecommunication management network in order to provide for telecom service
providers. Apart from these the other network management standard used is Simple Network
Management protocol.
A set of interconnected devices or computers are said to form a network. While working with a
network it becomes very important to have proper security measures that will protect the network
from risks. Thus security ensures proper protection towards the data stored and shared over the
network. Basically the security provided towards the network are divided into two parts Physical
security and information security. Physical security ensures security towards some component from
physical actions which possess the capability of damaging the organization. The physical security has
the capability to destroy the file stored within the network and also can lead to terrorist attacks.
Physical security is further divided into providing proper security towards the hardware and software
components and providing security towards employees.
In order to maintain proper protection from information system it becomes important to maintain
the integrity, availability and confidentiality towards the data shared over the networks. This ensures
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4NETWORK MANAGEMENT SECURITY
security towards Cloud, Application, Internet, Mobile and Network. Whereas the information security
provides protection towards more components, this includes: ensuring security at endpoints ,
providing security towards the application maintained within the network, maintaining security with
the help of implementing cloud server , providing proper security measures towards the internet
accessed over the network, maintaining each computer with proper protection and security within the
networks.
Network System and its Security
The OSI of the Network security structure architecture is divided into 5 major categories that
include authentication this ensures that the entity which is communicating is the claimed one, access
Control helps in preventing resources from unauthorized access, data confidentiality ensures
protection the data from unauthorized users and ensures that only the entity, that is, the sender and
receiver intended to, should understand the contents of the messages, data integrity assures that the
contents of the messages are not altered or damaged without any alert or detection (Kahate 2013) and
the last feature is non-repudiation that ensures protection against refusal by one of communicating
parties present.
Security Attacks – Classification
Passive Attacks: Eavesdropping on, and keeping a check on, out sending to, get hold of the
contents of the message, or supervise all the traffic flows occurring.
Active Attacks: this includes altering of the data stream with the help of concealment of a
particular entity as another entity. It helps in doing over the former messages. Altering data
stream also helps in modifying messages for passage Refusal of the service
Mechanism is maintaining Security: The mechanism which is designed for detection,
prevention, or recovering from any security attack. A single mechanism will not support all
the functions needed. However, a particular element is available that underlies almost all of
security towards Cloud, Application, Internet, Mobile and Network. Whereas the information security
provides protection towards more components, this includes: ensuring security at endpoints ,
providing security towards the application maintained within the network, maintaining security with
the help of implementing cloud server , providing proper security measures towards the internet
accessed over the network, maintaining each computer with proper protection and security within the
networks.
Network System and its Security
The OSI of the Network security structure architecture is divided into 5 major categories that
include authentication this ensures that the entity which is communicating is the claimed one, access
Control helps in preventing resources from unauthorized access, data confidentiality ensures
protection the data from unauthorized users and ensures that only the entity, that is, the sender and
receiver intended to, should understand the contents of the messages, data integrity assures that the
contents of the messages are not altered or damaged without any alert or detection (Kahate 2013) and
the last feature is non-repudiation that ensures protection against refusal by one of communicating
parties present.
Security Attacks – Classification
Passive Attacks: Eavesdropping on, and keeping a check on, out sending to, get hold of the
contents of the message, or supervise all the traffic flows occurring.
Active Attacks: this includes altering of the data stream with the help of concealment of a
particular entity as another entity. It helps in doing over the former messages. Altering data
stream also helps in modifying messages for passage Refusal of the service
Mechanism is maintaining Security: The mechanism which is designed for detection,
prevention, or recovering from any security attack. A single mechanism will not support all
the functions needed. However, a particular element is available that underlies almost all of

5NETWORK MANAGEMENT SECURITY
the mechanisms behind maintaining security in the system which is Cryptographic techniques
(Pathan 2016).
Providing authentication and access controls
Authentication enacts the sender's identity and/or the information's receiver. Any
check on the integrity of the information, whether it is meaningless when the sender’s
or receiver’s identity is not well established. This helps in processing the validation of
the identity that is claimed.
Authorization enacts as what can be done after the user has been identified himself It
is also called access control Process of granting the users their access rights
Authorization basically obey a procedure of authentication
Access control also limits the information flow from the system resources only to the
network system or to the authorized users.
Importance of Stream Ciphers: Stream Cipher logistics and algorithms computes the plaintext to
yield ciphertext. It is called substitution cipher (Peltier 2016). The stream of plaintext is taken as input
by the cipher and the ciphertext is produced as an output.
Block Ciphers: Unlike Stream ciphers, Block Ciphers encrypt and decrypt all the information in affix
size of blocks. It passes plaintext or data blocks to generate ciphertext in a block through its
algorithm. Block Cipher must produce ciphertext of almost equivalent size (with respect to the
number of blocks).
Redundancy - a cipher that produces ciphertext (in blocks) which is significantly larger from the
information, protecting it because of practical value.
Breaking Ciphers and its terms
the mechanisms behind maintaining security in the system which is Cryptographic techniques
(Pathan 2016).
Providing authentication and access controls
Authentication enacts the sender's identity and/or the information's receiver. Any
check on the integrity of the information, whether it is meaningless when the sender’s
or receiver’s identity is not well established. This helps in processing the validation of
the identity that is claimed.
Authorization enacts as what can be done after the user has been identified himself It
is also called access control Process of granting the users their access rights
Authorization basically obey a procedure of authentication
Access control also limits the information flow from the system resources only to the
network system or to the authorized users.
Importance of Stream Ciphers: Stream Cipher logistics and algorithms computes the plaintext to
yield ciphertext. It is called substitution cipher (Peltier 2016). The stream of plaintext is taken as input
by the cipher and the ciphertext is produced as an output.
Block Ciphers: Unlike Stream ciphers, Block Ciphers encrypt and decrypt all the information in affix
size of blocks. It passes plaintext or data blocks to generate ciphertext in a block through its
algorithm. Block Cipher must produce ciphertext of almost equivalent size (with respect to the
number of blocks).
Redundancy - a cipher that produces ciphertext (in blocks) which is significantly larger from the
information, protecting it because of practical value.
Breaking Ciphers and its terms
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6NETWORK MANAGEMENT SECURITY
Cryptology – it involves making of ciphers (termed as cryptography) and then
breaking them ( known as cryptanalysis)
Cryptanalysis: The process of breaking down of ciphers is known as cryptanalysis.
This method needs skills that are of a high or expert level and deceptive logic.
Cryptanalysis relies on the ultra-fast super computer’s use very quickly.
Brute Force: It is a method which tries to break a cipher in every possible way by
applying a different combination of keys. It calls for an extremely large number of
resources and assistance of computers.
There are 3 stages in cryptanalysis problem, with respect to what information does the hacker
has:-
Cipher-text only Attack: The hacker can only access the cipher-text that is intercepted without any
information of the plaintext messages’ contents. The hacker may use statistical logic in this case in
breaking the cipher. That means the alphabets "e" and "t" are the maximum used letters in a typical
text; 13 percent and 9 percent respectively and the occurrence of 2-letter and 3-letter such as "in" and
"ing” are common (Rahman and Al-Shaer 2013).
Known-plaintext Attack: This procedure is knowing in advance the contents of the ciphertext
message relies on breaking of the code. Like the hacker can know the entity of the contents of the
messages i.e. the sender and the receiver. The hacker can also have the pairing of the plaintext-cipher
and very easily break the code.
Network security ensures providing efficient ways to ensure security towards the network and
data including hardware and software technologies from the expected threats. The common threats
that are faced by a network include worms, spyware, zero hour attack, Trojan horses, denial of service
attacks, identity theft and data interception (Soomro, Shah and Ahmed 2016). In order to protect the
Cryptology – it involves making of ciphers (termed as cryptography) and then
breaking them ( known as cryptanalysis)
Cryptanalysis: The process of breaking down of ciphers is known as cryptanalysis.
This method needs skills that are of a high or expert level and deceptive logic.
Cryptanalysis relies on the ultra-fast super computer’s use very quickly.
Brute Force: It is a method which tries to break a cipher in every possible way by
applying a different combination of keys. It calls for an extremely large number of
resources and assistance of computers.
There are 3 stages in cryptanalysis problem, with respect to what information does the hacker
has:-
Cipher-text only Attack: The hacker can only access the cipher-text that is intercepted without any
information of the plaintext messages’ contents. The hacker may use statistical logic in this case in
breaking the cipher. That means the alphabets "e" and "t" are the maximum used letters in a typical
text; 13 percent and 9 percent respectively and the occurrence of 2-letter and 3-letter such as "in" and
"ing” are common (Rahman and Al-Shaer 2013).
Known-plaintext Attack: This procedure is knowing in advance the contents of the ciphertext
message relies on breaking of the code. Like the hacker can know the entity of the contents of the
messages i.e. the sender and the receiver. The hacker can also have the pairing of the plaintext-cipher
and very easily break the code.
Network security ensures providing efficient ways to ensure security towards the network and
data including hardware and software technologies from the expected threats. The common threats
that are faced by a network include worms, spyware, zero hour attack, Trojan horses, denial of service
attacks, identity theft and data interception (Soomro, Shah and Ahmed 2016). In order to protect the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7NETWORK MANAGEMENT SECURITY
network from attacks it becomes important to ensure multiple network security. The steps to protect
the network from attacks includes:
Analysis: in this stage all the requirements and threats underlying in the network are detected that
possess some threat. This is all collected and then analyzed accordingly in order to have a proper
examination of the existing system. The analysis phase is one of the important phases as it detects the
possible threats.
Implementation: after the system is being analyzed and detected with the possible threats, the
network is ready to implement a network system that will provide proper authentication towards the
system.
Testing: after the implementation n of the security system, it becomes important to test each series
based on their performance.
Modify: once the testing is done it becomes important to to reveal the problems and modify the
system in order to increase efficiency.
Analyze
Implement
Test
Modify
network from attacks it becomes important to ensure multiple network security. The steps to protect
the network from attacks includes:
Analysis: in this stage all the requirements and threats underlying in the network are detected that
possess some threat. This is all collected and then analyzed accordingly in order to have a proper
examination of the existing system. The analysis phase is one of the important phases as it detects the
possible threats.
Implementation: after the system is being analyzed and detected with the possible threats, the
network is ready to implement a network system that will provide proper authentication towards the
system.
Testing: after the implementation n of the security system, it becomes important to test each series
based on their performance.
Modify: once the testing is done it becomes important to to reveal the problems and modify the
system in order to increase efficiency.
Analyze
Implement
Test
Modify

8NETWORK MANAGEMENT SECURITY
Network security techniques:
In order to have a clear view on network security working it becomes important to test it
through techniques that will provide clear results about the network security maintained within an
organization.
Scanning of the network: this process is done at a faster rate than others. It is used to scan the
functioning of the network based on the number of hosts accessing the networks. The technique for
scanning the network is not that costly and offers better results than other techniques.
Vulnerability scanning: this technique is used for identifying the vulnerability that is likely to affect
the network security and threat the system. Once the network is identified with the vulnerability that
the system provides an option to remove this vulnerability (Subramanian 2010), these are easy to
access and run once implemented within the network.
Penetration testing: this is used to detect the vulnerabilities that are beyond the surface level. This
requires more time than another process as it requires the involvement of each host available on the
network. Each host is tested individually to identify the vulnerability.
Encryption: encryption is used when converting the data into a form that cannot be read by anyone.
These texts are known as ciphertext. The unauthorized people neither have the ability to understand
the text nor has the authority to decrypt these messages. Decryption is done in order to convert this
cypher text into a readable one. There are basically two types of encryption method available that is
the Symmetric key encryption and asymmetric key encryption. In symmetric key encryption private
key are used for encrypting and decrypting the message whereas asymmetric key encryption includes
a public key. The main advantage of using symmetric key encryption is that it ensures more security
for the network as the size of key increases. This is the fastest way of encryption and ensures
maximum security. The private key is used for encrypting well as decrypting the message. Once the
user encrypts the message with a private key this message is decrypted with the help of a shared
private key. This ensures maximum security towards the network as people with the private key has
the capability to access the data. This restricts unauthorized people from getting access. However it
Network security techniques:
In order to have a clear view on network security working it becomes important to test it
through techniques that will provide clear results about the network security maintained within an
organization.
Scanning of the network: this process is done at a faster rate than others. It is used to scan the
functioning of the network based on the number of hosts accessing the networks. The technique for
scanning the network is not that costly and offers better results than other techniques.
Vulnerability scanning: this technique is used for identifying the vulnerability that is likely to affect
the network security and threat the system. Once the network is identified with the vulnerability that
the system provides an option to remove this vulnerability (Subramanian 2010), these are easy to
access and run once implemented within the network.
Penetration testing: this is used to detect the vulnerabilities that are beyond the surface level. This
requires more time than another process as it requires the involvement of each host available on the
network. Each host is tested individually to identify the vulnerability.
Encryption: encryption is used when converting the data into a form that cannot be read by anyone.
These texts are known as ciphertext. The unauthorized people neither have the ability to understand
the text nor has the authority to decrypt these messages. Decryption is done in order to convert this
cypher text into a readable one. There are basically two types of encryption method available that is
the Symmetric key encryption and asymmetric key encryption. In symmetric key encryption private
key are used for encrypting and decrypting the message whereas asymmetric key encryption includes
a public key. The main advantage of using symmetric key encryption is that it ensures more security
for the network as the size of key increases. This is the fastest way of encryption and ensures
maximum security. The private key is used for encrypting well as decrypting the message. Once the
user encrypts the message with a private key this message is decrypted with the help of a shared
private key. This ensures maximum security towards the network as people with the private key has
the capability to access the data. This restricts unauthorized people from getting access. However it
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9NETWORK MANAGEMENT SECURITY
becomes important to have proper monitoring over the people sharing this private key. On the other
hand in case of asymmetric key cryptography, two keys are used one is the public key and another one
is the private key. As soon as the message is encrypted with the use of a public key, the system
generates a private key to the people who have the authorization to access the message (White, Fisch
and Pooch 2017). These messages get decrypted with the only matched private key. Thus it can be
said that encryption is one of the main factors that enhance network security management.
Firewalls: firewalls are the most important security measures for a network. This ensures that proper
and needful information are allowed to enter the network by blocking the unwanted data. This is used
to isolate LAN from the internet. Mainly there are two types of firewall: packet filter and application
gateway. Packet filtering issued to filter the network packets and every packet are inspected whenever
it passes through the firewall. With the help of packet filters the packets are blocked or allowed while
accessing the routing. There are a set of rules that are used to determine which packets are to be
allowed and which are not to be. Every network should manage the packets accordingly and know the
importance of each packet passed. The packet filter can be expected to occur in a router, in an
individual host and in case of a bridge.
Intrusion detection system
There are basically three types of the intrusion detection system and two fundamental
techniques. The different types of intrusion detection system are Network-based Intrusion detection
system, host-based Intrusion detection system and Application based Intrusion Detection system.
Network-based Intrusion Detection System: these sensors are placed on key network circuit. An
intrusion detection system is a device running with use of a special operating system that helps in
monitoring the system and network packets and reports the intrusion expected within the system.
Host-based intrusion detection system: this is a package of software that is installed within the host
server. This helps to monitor the activity taking place within the server and also monitors the
incoming circuit so that IDS can manage its working properly.
becomes important to have proper monitoring over the people sharing this private key. On the other
hand in case of asymmetric key cryptography, two keys are used one is the public key and another one
is the private key. As soon as the message is encrypted with the use of a public key, the system
generates a private key to the people who have the authorization to access the message (White, Fisch
and Pooch 2017). These messages get decrypted with the only matched private key. Thus it can be
said that encryption is one of the main factors that enhance network security management.
Firewalls: firewalls are the most important security measures for a network. This ensures that proper
and needful information are allowed to enter the network by blocking the unwanted data. This is used
to isolate LAN from the internet. Mainly there are two types of firewall: packet filter and application
gateway. Packet filtering issued to filter the network packets and every packet are inspected whenever
it passes through the firewall. With the help of packet filters the packets are blocked or allowed while
accessing the routing. There are a set of rules that are used to determine which packets are to be
allowed and which are not to be. Every network should manage the packets accordingly and know the
importance of each packet passed. The packet filter can be expected to occur in a router, in an
individual host and in case of a bridge.
Intrusion detection system
There are basically three types of the intrusion detection system and two fundamental
techniques. The different types of intrusion detection system are Network-based Intrusion detection
system, host-based Intrusion detection system and Application based Intrusion Detection system.
Network-based Intrusion Detection System: these sensors are placed on key network circuit. An
intrusion detection system is a device running with use of a special operating system that helps in
monitoring the system and network packets and reports the intrusion expected within the system.
Host-based intrusion detection system: this is a package of software that is installed within the host
server. This helps to monitor the activity taking place within the server and also monitors the
incoming circuit so that IDS can manage its working properly.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10NETWORK MANAGEMENT SECURITY
Application-based Intrusion detection system: this is used to monitor one application in the host
server.
The techniques used in the intrusion detection system are Misuse detection and anomaly
detection. Misuse detection is used to compare the activities taking place with the use of signatures
these are known as attacks. The anomaly detection works well in a stable network as it is used to
determine the normal set of activities.
Conclusion
The report aims at describing the importance of network security management. It becomes
important to have proper control over each network system. Network management is one of the
important concern. It becomes essential to have an appropriate system that will ensure better security
towards the network. The primary objective behind having proper network management is that it
helps in deployment, proper integration evaluation of the system and configuring the network with
appropriate components. Thus it becomes essential to protect the network from disruption, disaster
and expected destructions. With the use of redundant hardware, the system can prevent itself from the
following factors. In case a network faces power supply loss they can include an uninterruptable
power supply for gaining power. To apply for redundancy on the network components it becomes
crucial to install the bridges, routers within the network. The paper has evaluated the findings from
different articles and has represented a literature review on network security management. So from the
above results it can be stated that proper security is needed to be implemented within the network in
order to manage the networking system over a large scale as well as on a smaller scale.
Application-based Intrusion detection system: this is used to monitor one application in the host
server.
The techniques used in the intrusion detection system are Misuse detection and anomaly
detection. Misuse detection is used to compare the activities taking place with the use of signatures
these are known as attacks. The anomaly detection works well in a stable network as it is used to
determine the normal set of activities.
Conclusion
The report aims at describing the importance of network security management. It becomes
important to have proper control over each network system. Network management is one of the
important concern. It becomes essential to have an appropriate system that will ensure better security
towards the network. The primary objective behind having proper network management is that it
helps in deployment, proper integration evaluation of the system and configuring the network with
appropriate components. Thus it becomes essential to protect the network from disruption, disaster
and expected destructions. With the use of redundant hardware, the system can prevent itself from the
following factors. In case a network faces power supply loss they can include an uninterruptable
power supply for gaining power. To apply for redundancy on the network components it becomes
crucial to install the bridges, routers within the network. The paper has evaluated the findings from
different articles and has represented a literature review on network security management. So from the
above results it can be stated that proper security is needed to be implemented within the network in
order to manage the networking system over a large scale as well as on a smaller scale.

11NETWORK MANAGEMENT SECURITY
References
Chen, Z., Han, F., Cao, J., Jiang, X. and Chen, S., 2013. Cloud computing-based forensic analysis for
collaborative network security management system. Tsinghua science and technology, 18(1), pp.40-
50.
Garofalakis, M., Gehrke, J. and Rastogi, R. eds., 2016. Data Stream Management: Processing High-
Speed Data Streams. Springer.
Han, W. and Lei, C., 2012. A survey on policy languages in network and security
management. Computer Networks, 56(1), pp.477-489.
Kahate, A., 2013. Cryptography and network security. Tata McGraw-Hill Education.
Pathan, A.S.K. ed., 2016. Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC
press.
Peltier, T.R., 2016. Information Security Policies, Procedures, and Standards: guidelines for effective
information security management. Auerbach Publications.
Rahman, M.A. and Al-Shaer, E., 2013, May. A formal approach for network security management
based on qualitative risk analysis. In IM (pp. 244-251).
Soomro, Z.A., Shah, M.H. and Ahmed, J., 2016. Information security management needs more
holistic approach: A literature review. International Journal of Information Management, 36(2),
pp.215-225.
Subramanian, M., 2010. Network management: principles and practice. Pearson Education India.
White, G.B., Fisch, E.A. and Pooch, U.W., 2017. Computer system and network security. CRC press.
References
Chen, Z., Han, F., Cao, J., Jiang, X. and Chen, S., 2013. Cloud computing-based forensic analysis for
collaborative network security management system. Tsinghua science and technology, 18(1), pp.40-
50.
Garofalakis, M., Gehrke, J. and Rastogi, R. eds., 2016. Data Stream Management: Processing High-
Speed Data Streams. Springer.
Han, W. and Lei, C., 2012. A survey on policy languages in network and security
management. Computer Networks, 56(1), pp.477-489.
Kahate, A., 2013. Cryptography and network security. Tata McGraw-Hill Education.
Pathan, A.S.K. ed., 2016. Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC
press.
Peltier, T.R., 2016. Information Security Policies, Procedures, and Standards: guidelines for effective
information security management. Auerbach Publications.
Rahman, M.A. and Al-Shaer, E., 2013, May. A formal approach for network security management
based on qualitative risk analysis. In IM (pp. 244-251).
Soomro, Z.A., Shah, M.H. and Ahmed, J., 2016. Information security management needs more
holistic approach: A literature review. International Journal of Information Management, 36(2),
pp.215-225.
Subramanian, M., 2010. Network management: principles and practice. Pearson Education India.
White, G.B., Fisch, E.A. and Pooch, U.W., 2017. Computer system and network security. CRC press.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 12
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.




