Network Security and Data Communications: Risks and Resilience Report

Verified

Added on  2023/06/10

|10
|2937
|125
Report
AI Summary
This report provides a comprehensive analysis of network security and data communications. It begins by identifying core vulnerabilities within both network and online environments, including malware attacks, outdated software, and social engineering. The report then explores how security thinking and tools can benefit a network environment, emphasizing the importance of protecting information and preventing cyberattacks. It evaluates the link between network architecture and security engineering concepts, highlighting the role of network security architects. Internal risks are assessed, covering specialist sabotage, unauthorized access, and accidental data loss. The report then evaluates process and physical defenses against malicious network intrusions, such as strong password policies, regular updates, and firewalls. Key security concepts are applied to large and distributed organizations, focusing on the CIA triad (confidentiality, integrity, and availability). Finally, the report assesses how key factors enhance an holistic approach to network and systems resilience, emphasizing the need for a comprehensive system that considers technology, people, and processes.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Network Security and Data
Communications
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Contents
INTRODUCTION...........................................................................................................................1
MAIN BODY..................................................................................................................................1
TASK 1............................................................................................................................................1
1.1: Analyse the core vulnerabilities within a network environment and an online environment.
.....................................................................................................................................................1
1.2: Explain how the emergence of security thinking and tools can benefit a network
environment.................................................................................................................................2
TASK 2............................................................................................................................................2
2.1: Evaluate the link between network architecture and security engineering concepts............2
TASK 3............................................................................................................................................3
3.1: Evaluate internal risks and exposure....................................................................................3
3.2: Evaluate available process and physical defences against malicious network intrusions....3
TASK 4............................................................................................................................................4
4.1: Explain how key security concepts can be applied in a large and distributed organisation.4
4.2: Assess how key factors are applied to enhance and embed an holistic approach to network
and systems resilience..................................................................................................................5
CONCLUSION................................................................................................................................6
REFERENCES................................................................................................................................7
Document Page
INTRODUCTION
Network security is considered as the technologies set which safeguard the integrity and
usability of organisational structures through preventing the entry or proliferation into a network
of board variety of possible threats. Additionally, this is essential for home networks and within
business world both. Most homes along with higher speed internet connections that have one or
above wireless routers that might be exploited if not appropriately secured. Data communication
is described as the procedures of utilising computing and communication technologies for
transferring the information from one area to other or among participating parties. In addition to
this it is vital as it permits business for minimising expenditures and develops effectiveness
through sharing information & common equipments between several different computers.
MAIN BODY
TASK 1
1.1: Analyse the core vulnerabilities within a network environment and an online environment.
Network environment and online environment is a communication system which ties
various users together. There are mainly two core vulnerabilities in network and online
environment such as network and non physical vulnerabilities. Network vulnerability is
undertaken as the weakness or flaw into hardware, software or business procedures that when
included through threat which outcomes within security may breach. Moreover, the non-
physical network vulnerabilities mainly includes information or software. By aspects of
vulnerability, cyber adversaries are become competent for gaining access to their system as well
as gather information. In addition to this, network vulnerabilities continuously evolve, outcomes
into loss of crucial data as well as revenue from businesses. This may be either non-physical or
physical. In addition to this, utilizable weaknesses as well as bugs are always present into
networks but acknowledging how hackers influence them provides business a clarified image of
what management should perform for preventing authorised users from accessing any valuable
assets of digital. Also, network vulnerabilities are comes into various kinds but the much
common forms are:
Malware Attacks: Malware attacks are regarded as the common cyber attacks in which
malware implements unauthorised actions upon system of victims. Additionally, the
1
Document Page
malicious software encompasses various particular forms of attacks like spyware, key
loggers and ransom ware.
Outdated software issues: One of the key network security vulnerabilities is regarded as
outdated or unpatched software which exposes system that runs the application as well as
possibilities of whole network. As an outcome, much vulnerable to ransom ware attacks,
data breaches and malware.
Social engineering attacks: It have become a famous method utilised through threats
actors for simply bypass authentication as well as authorization security protocols and
obtain access towards a network. In addition this, these attacks have enhanced critically
into previous 5 years that become a lucrative business for hackers. Additionally, internal
users focus the huge security risk towards firm mainly as they are uneducated or unaware
of threats.
1.2: Explain how the emergence of security thinking and tools can benefit a network
environment.
The emergence of security thinking is undertaken as the new manner to understand,
observe and responds towards threats that provides firms the ideal responds to continuously
moving challenges of security. Additionally, the network security tools may be either software or
hardware based that aids in protecting firm’s networks, crucial information from attacks and
critical infrastructures. Currently, business having access to much valuable data than even before
ass well as safeguarding those information is essential to organisational growth. effectual tools of
security act as gatekeeper towards those data, preventing unauthorised access, mis-utilise, change
or alteration of computer network and their resources. Additionally, the emergence of security
thinking and tools benefits the network environment is described below:
Protect information: The security thinking and tools emergence keeps checking upon
unauthorised. As an outcomes that safeguards the confidential information from being
stolen, disrupt or oppressed through unauthorised users.
Prevent cyber attack: The tools of security may minimise the risk of cyber attacks
through safeguarding the computer systems, programmes and networks from being
attacked by digital means.
2
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
TASK 2
2.1: Evaluate the link between network architecture and security engineering concepts.
Network architecture as well as security engineering are essential into any firm which
proceeds, transfers and stores information. Moreover, this is undertaken as unified kind of
security design which aids company to address the vital as well as possible risks included when
utilising computer application and infrastructures of networks. In addition to this, network
architectures is defined as the manner network facilities and devices are framed for serving the
connectivity customer service requirements. Also the security engineering is the procedures to
incorporates security controls in system of information so that controls become an integral part
of system operative abilities.
Network security architect: This also considered towards a set of accountabilities associated
with cloud security architecture. Based upon the organisation size, there could be an individual’s
accountable for every of these domains. Alternatively, en entity could to individuals for
overseeing them all. Regardless of approach , firm required to describes who has the particular
accountability as well as provide them the authority to develop mission critical decisions.
TASK 3
3.1: Evaluate internal risks and exposure.
Internal risk describe as the risk of anything from inside of firm who might exploit a
system into manner for causing damages or steal information.
Specialist Sabotage and Theft: Workers have the pleasure of getting to a wide extent of
genuine equipment inside an association, with simply trust to hold them back from
hurting or taking it. This suggests that hardware like hard drives, containing lots of huge
data, can be genuinely taken from the association.
Unapproved Access by Employees: As agents at this point approach a system inside an
association, they could have the choice to procure permission to locale of these PCs
individuals shouldn't, for instance, a partner who leaves themselves endorsed in, or a
room passed on opened giving induction to a server.
Feeble Cyber Security Measures and Unsafe Practice: By not having fitting mechanized
and real security, an association grows the chance of a shortcoming being made the most
of, especially from the issues risen ahead of time like theft.
3
Document Page
Accidental Loss or Disclosure of Data: The security shortcomings that license malicious
approach to acting may moreover permit essential incidents to occur and cause a huge
load of damage, for instance, laborers just incidentally deleting data from an envelope or
spilling a drink on a contraption.
3.2: Evaluate available process and physical defences against malicious network intrusions.
To proactively recognize and answer network interferences, affiliations need to have a
thorough cognizance of how network interferences work, execute network interference,
acknowledgment, and response structures that are arranged with attack methods and cover
procedures at the highest point of the need list. A piece of the open cycles and genuine securities
against harmful association interferences are:
Extraordinary Password Policy: Maintaining a irregular and complex mystery state is an
epic positive turn of events. Guarantee that clients never reuse passwords and change
them regularly as and when clients are impelled by an expiry alert. Picking a strong
mystery key is itself the best wellbeing exertion of all.
Update Regularly: Presumably the best method for defeating break tries is to revive the
functioning system and application programming as the new structures have no doubt
been adjusted to protect against malicious association interferences. These updates fix
security openings that have been found and take out PC bugs.
Securing the Router: Cyber criminals could simply includes information setting foot
inside areas. These aggressors can do this by breaking into the association, and it's
undeniably more clear to get it going it is unsound to expect the association. Affiliations
can get all of the contraptions in the association by ensuring that encryption is engaged
on clients' remote traffic.
Authentic Backing up of Data: Data is the most regarded asset of any affiliation, and it is
what punks need to exploit. Gathering backing up such assets with private information is
essential. Backing up data can be considered as an alternate line of protect shielding
against dangerous association interferences.
Presenting Centralized Firewalls: Firewalls are the fundamental line of defend in
network security. A suitably organized firewall goes probably as a deterrent between
networks with differing levels of trust. Affiliations truly should keep the local firewall on
4
Document Page
all the time as this is the best method for furnishing the association against noxious
attacks.
Encoded Transmission: Taken mixed data is of no impetus for cybercriminals. The
power of cryptography is so much that it can restrict permission to data and can convey it
trivial to the people who don't have the key. Using encryption is a serious step forward
towards reducing the damages of a security break.
TASK 4
4.1: Explain how key security concepts can be applied in a large and distributed organisation.
Cyber security is regarded as the wide term but is depends upon three primary concepts
called The CIA Triad”. This incorporates confidentiality, integrity and availability. In addition to
this, the particular model is developed for guiding the firm with policies of cyber security into
realm of information security.
Every so often protecting data characterization incorporates novel groundwork for those
privies to sensitive files. Planning can help with adjusting endorsed people with risk factors and
how to get ready for attack. Further pieces of getting ready might fuse strong passwords and
mystery state related recommended techniques and information about amicable planning systems
to hold clients back from turning data dealing with rules with good natured objectives and
potentially terrible results.
Integrity joins report permissions and client access controls. Structure control may be used
to hinder mistaken changes or unexpected abrogation by supported clients from transforming
into an issue. Besides, affiliations ought to put in specific means to recognize any movements in
data that could happen due to non-human-caused events like an electromagnetic heartbeat (EMP)
or server crash.
Availability is ensured by completely staying aware of all hardware, performing gear fixes
rapidly when required, and keeping a fittingly working structure (OS) environment that is freed
from programming conflicts. It's also basic to keep current with all fundamental system
refreshes. Giving palatable correspondence information move limit and hindering the occasion of
bottlenecks are also huge techniques.
Distributed system
5
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Currently, computers are not stand individually units. Various computers are being networked
together for forming huge system of computers. Moreover, not only are computers being
network, but they are being networked in larger distributed systems in which every singular
computer, node in case they would may develop utilisation of applications distributed across the
system.
4.2: Assess how key factors are applied to enhance and embed an holistic approach to network
and systems resilience.
Online assurance requires a comprehensive system, one that keeps an eye on advancement,
people, and capacities anyway cycles and organization as well. This vision isn't limited to the
praiseworthy security order it requires mix with huge business risk the board, strong IT asset the
chiefs, drew in change the leaders, and a generous method for managing event response as well
as the persevering commitment of front-office employees.
Execute Basic Hygiene: Incredibly, various associations really don't have their crucial
security neatness all together. The fundamentals in network security will regularly be
somewhat overlooked. Before placing assets into any organization wellbeing program,
every affiliation should look at three central advances critical to acquire the best result in
watching their structures: carrying out fundamental tidiness on your own premises,
facilitated exertion inside the natural framework, and continually pressure test past a
standard yearly invasion test.
Length the Skill Gap: With the augmenting scale on which associations work and the
associated improvement of security needs, comes the necessity for more data and
capacity. A normal absence of sufficiently pre-arranged people is reachable.
Computerization and splendid use of AI can help with getting over the basic opening
among old and new web-based security needs, regardless, human capacities really make
the difference.
Be Bold in Implementing AI: Skilled people from all trades are not the sole game plan.
The advancement utilize their capacities. Accepting you look at a dealt with
transformation of an acknowledgment issue: there are various potential events, different
breaks, and various erratic events that are being represented reliably security work
environments have people noticing these reports.
6
Document Page
Keep an eye out for the Business: Looking at security and arranging associations'
security programs, doesn't stop at setting up people, completing advancement, and
diminishing bet. It is related with the value chain of the business. Data and assets are
where the business can be at serious risk and where perils can be recognized. That is a
flat out shift from what security used to be. Ordinary IT people are very well gifted, but
cash supervisors grasp regard chains in the business. Likewise, that needs confirmation.
CONCLUSION
As per the above report, it has been concluded that both network security and data
communication plays essential role within organisations. As, this is essential for home networks
and within business world both. Most homes along with higher speed internet connections that
have one or above wireless routers that might be exploited if not appropriately secured. While
Data communication is the procedures of utilising computing and communication technologies
for transferring the information from one area to other or among participating parties. In addition
to this it is vital as it permits business for minimising expenditures and develops effectiveness
through sharing information & common equipments between several different computers.
7
Document Page
REFERENCES
Books and Journal
Alferidah, D.K. and Jhanjhi, N.Z., 2020. A review on security and privacy issues and challenges
in internet of things. International Journal of Computer Science and Network Security
IJCSNS, 20(4), pp.263-286.
Alkhudhayr, F., Alfarraj, S., Aljameeli, B. and Elkhdiri, S., 2019, May. Information security: A
review of information security issues and techniques. In 2019 2nd International
Conference on Computer Applications & Information Security (ICCAIS) (pp. 1-6). IEEE.
Duppa, G.I.P. and Surantha, N., 2019. Evaluation of network security based on next generation
intrusion prevention system. TELKOMNIKA, 17(1), pp.39-48.
Geetha, R., Suntheya, A.K. and Srikanth, G.U., 2020. Cloud integrated IoT enabled sensor
network security: research issues and solutions. Wireless Personal
Communications, 113(2), pp.747-771.
Giri, S. and Shakya, S., 2019. Cloud computing and data security challenges: A nepal
case. International Journal of Engineering Trends and Technology, 67(3), p.146.
Hou, J., Qu, L. and Shi, W., 2019. A survey on internet of things security from data
perspectives. Computer Networks, 148, pp.295-306.
Hou, R., Ren, G., Zhou, C., Yue, H., Liu, H. and Liu, J., 2020. Analysis and research on network
security and privacy security in ubiquitous electricity Internet of Things. Computer
Communications, 158, pp.64-72.
Kadhim, A.A. and Sadkhan, S.B., 2020, December. Cognitive Radio Network Security
Enhancement Based on Frequency Hopping. In 2020 International Conference on
Advanced Science and Engineering (ICOASE) (pp. 1-6). IEEE.
8
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]