Detailed Report on Network Security Issues and a Security Model

Verified

Added on  2023/06/12

|12
|664
|108
Report
AI Summary
This report examines critical network security issues prevalent in today's interconnected digital landscape, focusing on the vulnerabilities introduced by e-commerce and global connectivity. It highlights common cyber-attacks such as Denial of Service (DoS) attacks, phishing, and cloud-based breaches, which pose significant threats to data and financial security for both users and organizations. To mitigate these risks, the report introduces a comprehensive seven-layer network security model, which divides security tasks across the physical, VLAN, ACL, software, user, administrative, and IT department layers. Each layer addresses specific aspects of network security, from physical access control and virtual network maintenance to software updates, user training, and specialized IT expertise. The report concludes by emphasizing the importance of addressing network security issues to prevent data and financial losses, advocating for continuous vigilance and proactive security measures in the face of evolving cyber threats. The document includes references to support its findings and recommendations. Desklib offers a variety of resources including solved assignments and past papers to support students.
Document Page
NETWORK SECURITY
ISSUES AND SECURITY
MODEL
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Introduction
E-commerce and global connectivity have been major advancement in the internet
technology field. Various benefits have been provided by the internet with various
vulnerabilities. The security of data and information over the internet has been major
problem for the internet users
Document Page
Cyber-attacks
Cyber-attacks have been the most common threats in the network of
the company
Document Page
DoS attack
A denial of service attack is an attack that
deals with shutting down of network server
of the company.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Phishing
This attack targets the personal
information o the users
including the username,
passwords, banking information
and other personal information
Document Page
Cloud attacks
Various hackers that have targeting
cloud for breaching out data and
information
Document Page
Network Security Model
The proposed network security model is of seven layers that helps in dividing
the task in the network infrastructure.
Physical layer
VLAN
ACL layer
Software layer
User Layer
Administrative layer
IT Department layer
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Physical layer & VLAN
The physical layer focuses in the security of the network at physical level. It can be
implemented to the physical security for preventing them from accessing a facility to
gain stored on computers and servers.
The VLAN layer refers to the maintenance and creation of the virtual local area
networks
Document Page
ACL & Software Layer
The Access Control Lists or ACL is security protocol installed in routers and firewalls.
The software layer has been focusing on the updating software installed in the device.
Document Page
User Layer, Administrative & IT
Layer
The user layer have focused on
the training and knowledge of
the user over the security in the
network.
The administrative layer focuses
on the training and motivation
of the administrative users.
The IT department layer
contains all network security
professionals including
technicians, architects and
support specialists.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Conclusion
It can be concluded that network security issues have been creating problems for the
company. This might results in data and financial loss of the users and organization in
the market. There are numerous phishing attacks are happening over the internet that
have been causing problems for the company.
Document Page
References
Acemoglu, D., Malekian, A., & Ozdaglar, A. (2016). Network security and contagion. Journal of
Economic Theory, 166, 536-585.
Beberlein, L. T., Dias, G., Levitt, K. N., Mukherjee, B., & Wood, J. (2017). Network attacks and an
Ethernet-based network security monitor.
Chen, G., Gong, Y., Xiao, P., & Chambers, J. A. (2015). Physical layer network security in the full-duplex
relay system. IEEE transactions on information forensics and security, 10(3), 574-583.
Frigault, M., Wang, L., Jajodia, S., & Singhal, A. (2017). Measuring the Overall Network Security by
Combining CVSS Scores Based on Attack Graphs and Bayesian Networks. In Network Security
Metrics (pp. 1-23). Springer, Cham.
Kizza, J. M. (2017). Guide to computer network security. Springer.
Knapp, E. D., & Langill, J. T. (2014). Industrial Network Security: Securing critical infrastructure
networks for smart grid, SCADA, and other Industrial Control Systems. Syngress.
Larson, V., Short III, R. D., Munger, E. C., & Williamson, M. (2016). U.S. Patent No. 9,374,346.
Washington, DC: U.S. Patent and Trademark Office.
Perlman, R., Kaufman, C., & Speciner, M. (2016). Network security: private communication in a public
world. Pearson Education India.
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]