Comprehensive Network Security Analysis and Report, University

Verified

Added on  2022/10/10

|4
|900
|214
Report
AI Summary
This report provides an analysis of network security, exploring various threats such as computer viruses, Trojan horses, and DDoS attacks. It discusses the need for robust security measures and tools like Acunetix, Intruder, and log management software to protect organizations. The report emphasizes the importance of Intrusion Detection Systems (IDS) and Security Information and Event Management (SIEM) for detecting malicious activities and analyzing network traffic. Log analysis is highlighted as a crucial element for system performance, troubleshooting, and security analysis, covering aspects like issue debugging, performance analysis, and predictive analysis. The report underscores the significance of log analysis in supporting administrators and ensuring comprehensive network and system security. The report also references several research papers and patents related to network security.
Document Page
Running head: NETWORK SECURITY
NETWORK SECURITY
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
NETWORK SECURITY
There is various software that is used to attack any organization with huge threat
capability. Some of them are a computer virus, Trojan horse, Rogue security software,
Adware-Spyware, Worm, Phishing, DDoS Rootkit, SQL injection, etc. it can be stated that no
matter what happened the organization will have to be saved or secured. For this reason,
various software and von technology have been used to modify the system appropriately.
Some of these attacks are happened through the wrong thing installing, from pen drive,
malicious .exe files, SQL injection, etc. So the organizations will have to be prepared for the
wrong situation to shield the attack properly (Perlman,Kaufman and Speciner,2016).
There are various tools and software's are used to protect this situation appropriately.
Those are Acunetix (web application security), Intruder (external network scanner), Netflow
Analyzer (bandwidth analyzer), EventLog Analyzer (log management software),
Manageengine Analyzer (analytics and firewall scanner), web titan (DNA based web filters),
Cornerstone MFT server (secure file transfer protocol), log 360 (log management and
network security) and several antiviruses. Now it can be said that each and every tool are
used for the various purpose. There is various scope where the attack can happen. So usage of
these things will keep safe the organization (Zuk and Guruswamy,2013).
Now there are various points that have to be calculated with respect to the
argumentative study. There is various software used as just normal antivirus; it can be said by
others that it is sufficient enough to protect an organization. But the attack will be started
from network packet to firewall or log management. All of these section problems cannot be
saved by the normal antivirus. Sometimes the VPN is also used because it will hide the IP
address for the particular computer. But still, the previously discuses tools are needed to be
included in each and every organization for proper security (Pederson and Vogt,2019).
Document Page
2
NETWORK SECURITY
The IDS is one of the applications which has been used to detect the final and main
malicious activity according to the policy and the activity policy. The security information
and event management are managed through this process to complete the situation properly.
The multiple resources of the alarm filtering will help to complete the procedure properly.
The network intrusion detection system and the host-based system are also involved to
complete the situation properly. It will help to analyse the network tariff to analyse the threat
properly. In the other had the anomaly-based and the signature-based system should be
completed with the reputation-based detection. That is how task has to be completed through
this procedure.
Log analysis is the main thing which will help to repair the system performance and
also it will help to provide the input to solve bottleneck problem. The system
performance will be also calculated to solve the procedure. Scanner log message can
be checked through the procedure of log analysis. It can be said that e-commerce
website log will be also calculated through the procedure of this task; in the other
hand web troubleshooting problem can be solved or traced through this. There are five
types of task can be handled through this; those are issue debugging, security analysis,
performance analysis, IoT logging and Predictive analysis. That is why it is very
much important (Kang et al.,2013).
The adequate support of log analysis will help the administrator in each step. The
administrator will check log status and the log rotation, in the other hand the OS
permit of system event will directly connected with this process. The audit report and
the events of the network will be calculated through this procedure. Custom agent
creating also done by this, also the third party utilities will help to complete the
procedure properly. So the system network and the security will also depend on this
Document Page
3
NETWORK SECURITY
access. So it can be said that the log analysis will help to access everything
(previously discussed).
Referencing
Kang, A. R., Woo, J., Park, J., & Kim, H. K. (2013). Online game bot detection based on
party-play log analysis. Computers & Mathematics with Applications, 65(9), 1384-
1395.
Pederson, J. C., & Vogt, T. J. (2019). U.S. Patent No. 10,205,530. Washington, DC: U.S.
Patent and Trademark Office.
Perlman, R., Kaufman, C., & Speciner, M. (2016). Network security: private communication
in a public world. Pearson Education India.
Zuk, N., & Guruswamy, K. (2013). U.S. Patent No. 8,370,936. Washington, DC: U.S. Patent
and Trademark Office.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]