Comprehensive Analysis of Network Security Management Strategies

Verified

Added on  2023/06/15

|5
|593
|119
Report
AI Summary
This report provides an overview of network security management, detailing various aspects such as methods attackers use to gain network access, considerations for blocking ICMP packets, and features necessary for effective VPN connections. It identifies six common attack vectors: packet sniffing, buffer overflow, dictionary attack, password cracking, brute force attack, and social engineering. The report also discusses the implications of blocking ICMP packets, noting that while ICMP can be used for reconnaissance, it also serves essential troubleshooting and network functionality purposes. Furthermore, it outlines the key requirements for establishing a secure and effective VPN connection, emphasizing the importance of account access, scope research, and the selection of appropriate privacy, security, and bandwidth levels. The document concludes by highlighting the need for network security management solutions that provide comprehensive visibility, enforce global policies, and offer a unified management interface for both virtual and physical systems, ultimately ensuring robust network protection. Desklib offers a wealth of similar solved assignments and past papers to aid students in their studies.
Document Page
Running head: NETWORK MANAGEMENT SECURITY
Network Management Security
Name of the student:
Name of the university:
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1NETWORK MANAGEMENT SECURITY
The various steps in management of network security
The network security management has been allowing the administrators to control the
network. This has comprised of the virtual and physical firewalls from a centralized location (Kim &
Feamster, 2013). The different steps in managing network security are demonstrated by the
following answers.
1. Listing the six ways by which an attacker can gain access to network:
The six ways by which an attacker gains access to a network are packet sniffing, buffer
overflow, dictionary attack, password cracking, brute force attack and social engineering (Barcena &
Wueest, 2015).
2. Response on blocking the ICMP packets:
The ICMP can lead to reconnaissance. It is the cause to block. The pings could be used to
find whether any host is on. Apart from this it also helps in determining whether the time exceeds
the part of the traceroute for mapping the network architectures (Piskozub, 2014). A thoughtful,
rational and measured approach is to be taken for the protections. To block the ICMP ultimately is
not the proper idea. However, picking and selecting the ting prevented and found the origin would
help to achieve the aim.
3. Features required delivering an effective VPN connection:
To make the VPN connection at first, the available account is to be found. The employees
must be consulted to obtain the access this account. Then the scopes must be researches to the new
report. For this, the type of privacy, security and the bandwidth required is to be considered (Houidi,
2016). As the VPN is purchased from the provider, payment should be made for the service. Then
the provider would supply the data need to access the VPN.
Document Page
2NETWORK MANAGEMENT SECURITY
The administrators have required solutions of network security management for receiving a
massive level of visibility. This is towards the network behavior enforcing global policies, delivering
the single management interface for the virtual and physical systems and so on. Thus the study
shows that the management of network security supplies the visibility to the network. This must
generate data for the assets, VPNs, security policies and so on. Moreover, ICMP comprises of
essential features. As some of them are helpful in troubleshooting, some are vital to make the
network function properly.
Document Page
3NETWORK MANAGEMENT SECURITY
References:
Barcena, M. B., & Wueest, C. (2015). Insecurity in the Internet of Things. Security Response,
Symantec.
Houidi, Z. B. (2016, November). A Knowledge-Based Systems Approach to Reason About
Networking. In Proceedings of the 15th ACM Workshop on Hot Topics in Networks (pp. 22-
28). ACM.
Kim, H., & Feamster, N. (2013). Improving network management with software defined
networking. IEEE Communications Magazine, 51(2), 114-119.
Piskozub, A. (2014). MODERN APPROACHES OF SECURING COMPUTER NETWORKS
FROM DENIAL OF SERVICE ATTACKS. International Journal of Computing, 4(2), 95-
104.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4NETWORK MANAGEMENT SECURITY
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]