Question:
Discuss About The Managing Organizational Network Security?
AUST Technologies is the software company that develops as well as modifies software applications in order to gain practical experience in data and system security field. AUST technologies is working on various IT projects that includes developing software applications in-house or to modify other applications in concurrence with large organizations. The scope of AUST tech is very limited in the advancement of various IT applications. The main objective of the organization is to extend its business in following years to different branches inside ICT, and to all parts of Australia as well as other countries. The other best alternative for the AUST tech can be to enhance the business into giving progressing data and system security administrations to organizations that mainly operate their business online. It will require dealing with the online security of those associations; security of their sites and customer databases. The main business which can be included in these activities are gambling associations, pharmaceuticals or hospitality associations.
Managing network security is the main concern for AUST tech for a wide range of circumstances and is vital as the developing utilization of web across the world. There is very basic security requirement for small businesses whereas for large businesses may require very high maintenance as well as propelled software and hardware to keep noxious attacks from hacking or any other malicious attack. Various strategies will be required in order to implement new security patterns. The Network Security is continually advancing, because of traffic development, utilization patterns and the consistently changing risk. This report is to provide a reflection on various security concerns and how these threats can be protected. (Gaigole & Prof. Kalyankar, 2015).
The main problem is the emerging new innovation which is most prone the attack of hackers. By hacking the data, hackers can get entire information of the organization and that will affect the economy of the nation on large extent.
The main purpose of the report is to develop new strategies for securing the entire network of the organization.
The research on the securing the network either LAN or WAN will concentrate on various threats, challenges, and implementing strategies for implementing various security measure for securing the database.
The main objective of network security strategy evaluation structure are:
A network in IT can be defined as the combination of various lines that are used to connect various systems whether in an organization or across the world. Therefore, it can be arranged by different factors that includes longitude, interconnection, administration as well as its design. Network security is the process of securing network from various types of risks whether internal or external and is provided to meet the association’s security mechanism. Secured network helps to provide secure network. It helps to provide various security measurements for securing the network. The main object of network security is to make confidentiality, trusteeship as well as integrity and also being continually accessible. Three main goals of network security are as following:
2.1.1 Confidentiality – Network security guarantees that the confidential information must be accesses by unauthorized users.
2.1.2 Privacy – It guarantees the data which have been gathered as well as saved by individuals must be available by them.
2.1.3 Accuracy – It guarantees that information and various applications are permitted to make a change just on a particular methodology. The accuracy of network system also guarantees that function keeps running in the right way and must be saved from unauthorized access.
2.1.4 Availability – It guarantees that the framework works rapidly and does not avoid authorized clients means the information must be available to right user at right time whenever user needs it. (Roozbahani & Azad, 2015).
The network attack can be in many structures, including dynamic system attack to unencrypted network traffic on sensitive data; passive assaults like observing unprotected system exchange to decode feebly encoded movement and getting validation data; abuse by insiders, Denial of service (DDoS), etc. Physical attack mainly affects the hardware components, Reconnaissance attacks are unauthorized access that affect vulnerabilities of the network. Denial-of-service (DoS) is an endeavor to make a machine or system asset inaccessible to its expected clients. Because of low memory abilities and constrained calculation assets, the devices
If the systems in the internal or external network are infected, these systems can contaminate other systems and can make everybody helpless. Therefore, digital cleaning is about securing data around us in order to stop the infection of other systems. Eg: Bots or zombie systems that are cyber threats. Hackers look for an opportunity for infecting and contaminating the systems as well as register with a zombie force that taints various machines, and enhance the ability to get a large number of users.
It is quite possible to hack the infected network. Digital security must be mutual duty. Web organizations and physical vendors can do their part by ensuring the security of their systems and banking and payment frameworks. Government can teach the pubic and implement hostile to digital criminal laws. Organizations can ensure that they have solid security forms set up that includes ensuring their workers utilize strong passwords and everybody can assume an essential part by securing the devices as well as being certain that our passwords must be unique and strong to be guessed. (Magid, 2014).
Association needs to adapt to significant ethical issues. These are: Privacy and individual data, Freedom of discourse in the internet, Intellectual property and Cybercrime. Protection is the claim of people to be allowed to sit unbothered, free from observation or obstruction from different people or associations that includes the state. Also, social and cultural issues needs to be considered. (Tiwary, 2011).
As we know that network architecture incorporates hardware, software, links, protocols, and topologies. Hence, it is the need of the organization to secure each component of network for having reliable data communication. If not, the integrity of networking framework will be damaged. The following three factors need to be focused while designing AUST’s network:
After the detection of network threats and the threat type that have been recognized which hit the organization’s network, there will be requirement of implementing security strategies in the organization. Associations have a broad selection of advances, extending from Antivirus software to committed system security devices like firewalls and interruption discovery frameworks, to give assurance to every network system.
This software comes with many system and can help to protect the system against various types of threats like virus, malicious activity etc. It needs to be updated on regular basis. It depends on a tremendous system of clients to give early notices of virus, so that remedy could be produced and disseminated rapidly. With the updated database of viruses that are being produced every month, this is the main point that the virus database is stayed up with the latest. Legitimate hostile to anti-virus package merchants will distribute the most recent cures on their Web destinations, and this package can incite clients to intermittently gather new information. System security arrangement ought to stipulate that all PCs on the system are stayed up with the latest and are secured by a similar hostile to anti-virus. Hackers frequently make moving beyond the anti-virus software their first step. (Pareek, 2012).
Firewall can be defined as the device that is used to analyze data communication in between two systems or two networks and then firewall checks that the data which is exchanged between systems follows the protocols or prettified model. It is coordinated approach between that frameworks in the event that they take after the prettified model or not. If not, it stops the data. This device is helpful to minimize the unauthorized and malicious attack to the network. Its execution impacts the system security and firewall execution that depends on the breaking point of firewall. At the point when firewall confine is high, it provides better execution. In order to physically store the network, it is like a protective layer that is created between network and the external world. As a result, the firewall repeats the system at the purpose of section with the goal that it can get and transmit the authorized information immediately. (Tharaka, & Silva, 2016).
Taken from (Tharaka, & Silva, 2016).
Encryption is among the most significant strategy for mitigating system security issues. If secure data is kept in heap, it can be possible to save data from hackers. In order to protect data, data encryption forms as that of SSL or VPN, and have ability to protect the data in the database. It will be better option to protect the data among the application server and also the database server. The processes that can be used to secure data are – solidifying techniques, patches, security programming installation and by following the guidelines of the merchant. This sensitive data must be governed by network administrator on regular basis. It can be performed on volume level as well. (Hexatier, 2016)
The above figure shows the encryption process in a network.
Taken from (The ICT Lounge, n.d).
Intrusion Detection System is the hardware application that is utilized for checking the system and ensuring it from any type of intruder. As the internet is progressing very quickly, various new innovations in programming has been raising. The key point of this system is to screen the system advantages for recognize any type of unacceptable behavior in the network. The Intrusion Prevention System (IPS) is used to secure the network from any such type of threat that monitors network traffic in order to identify and to save weakness misuses. Two types of IPS systems are there – Network (NIPS) and Host (HIPS). These mainly monitors the network to take action accordingly. (Dr. Vijayarani & Ms. Sylviaa, 2015).
Various locations for IDPS in a network are as shown in figure.
Taken from (Insecure Lab, 2014).
Controlling access to sensitive data is most essential technique among all. It helps to protect information from unauthorized read and write operations. This process is to take control on the strategies made for the data communications as well as to take control on other objects. If access control is effectively controlled then the risk of affecting the database security on various servers will also be minimized. (Malik & Patel, 2016).
Auditing is the process of analyzing the configured network from internal as well as external perspective. Accounting is the method to maintain the auditing for various activities of the user on network. Responsibility as well as auditing will help to ensure the database integrity which will help to have the characterized access to the database. When a user has figured out how to check effectively and to get the access to an asset, these types of activities must be monitored by the framework, and their status ought to be in audit trail documents. (Malik & Patel, 2016).
System security has turned into a prerequisite for AUST tech. organization as the maximum work is dependent on Internet. The clients, merchants and business accomplices presumably anticipate the surety about the data they share with this organization. These security advances let AUST framework avert known assaults and adjust to new risks, staff, clients and business accomplices who can be certain that their data remains secure. The strong network security ensure the surety of AUST’s confidential data like all the credit card details, financial details that must not be accessed by any other unauthorized person. After implementing the above network technologies, business accomplices will feel surer to share the information like sales forecasting. Likewise, similar advances that keep interlopers out can give your accomplices secure access to data on the network, and will cooperate more adequately.
These network practices lets the staff to safely access the important information on the network. It will help to make staff more productive as they will concentrate on their jobs instead of doing paper work. It will help to make better access to internet as well as their e-mails. These practices will enable the organization to include new services as well as applications without disturbing the performance of network. Adopting a proactive strategy to protect data guarantees the business stays up and running when it should be. Setting up a strong, secure system will enable organization to include propelled highlights like secured remote systems administration or voice as well as video conferencing. (Cisco, n.d).
Conclusions
This report is a reflection that takes high level perspective of network security as well as Internet risks, underlining the eminent changes and innovative development. In any case, we should not overlook that network crime is not harmless. Eg: ransomware keeps individuals out of their systems, holding cherished family photographs for ransom, commandeering incomplete compositions for books, as well as blocking access to tax return files, banking records, and other profitable archives. It was not ensured that after paying ransom, the hackers will release padlocks. Directed attack take significant licensed innovation from organizations, and an information break can shred an association’s reputation?even debilitating its survival. Digital protection claims are developing in quantity as well as cost, tax premiums significantly higher. In other words, cybersecurity issues undermine national security as well as financial development, which eventually influences every one of us. (Symantec, 2016).
This proposed network framework is feasible with versatile infrastructure. It likewise gives a diagram of the accepted procedures in relieving the known assaults and proposal on the best way to anticipate reoccurrence assaults. With propels in innovation, nobody is protected from an assault by hackers. It is an easy task for hackers to pick up control of a machine on the Internet that has not been enough secured. Organizations contribute the important part of their finance in securing their data, since the loss of key information is a threat to the business. The innovation in the advancement of systems, network communication provides the hackers to hack the network. Hence, by implementing these technologies into the network data can be protected.
Setting up as well as maintaining a structure that gives confirmation for data security techniques are lined up with and can support the business which is most important. While choosing one of these techniques, guaranteeing that the program gives the capacity to utilize a risk based approach and empowers the groups to recognize and explore adequately and react rapidly. It is necessary to control unauthorized access, analyze the providers and temporary workers and in addition representatives, and realize what main users are doing with organization information. AUST’s greatest resource is likewise the main threat. The trained users should be security front edges, regardless the organization will need the innovation as the last point of safeguard. Observing user action will help to recognize unauthorized behavior and check client activities are not abusing security methodology. The internal risks can be undetected.
Backing up the records may appear like sound judgment, however any association that has been hit with ransomware like Petya or Wannacry– will disclose that it is so critical to guarantee this best practice. It is vital for association to have a full back up of all of information from an essential security cleanliness imminent, as well as to battle developing assaults. Training to users for digital security is the best practices. Training ought to incorporate how to: perceive a phishing email, make and maintain passwords, stay away from unsafe applications, guarantee profitable data is not taken out from the organization notwithstanding other significant client security dangers. By having a response plan of time will enable to close any vulnerabilities, constrain the harm of a breach, and enable the organization to remediate viably. These activities can help the organization to protect their sensitive information effectively.
These associations need to begin with an exhaustive data security auditing process directed by an external auditor party who has particular involvement in the assembling and computerization space. They ought to organize remediation measures in view of the result of that auditing. Each robotic device that is associated with the Web ought to be password secured. Human stewardship of robot needs to be kept up at an abnormal state consistently for the future. (Vialina, 2016).
References
Abomhara, M. & Koien, G., M. (2015). Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks. Journal of Cyber Security, Vol. 4, 65–88. doi: 10.13052/jcsm2245-1439.414. Retrieved from -https://www.riverpublishers.com/journal/journal_articles/RP_Journal_2245-1439_414.pdf
Advancing Cyber Resilience Principles and Tools for Boards. World Economic Forum (2017). Retrieved from -https://www3.weforum.org/docs/IP/2017/Adv_Cyber_Resilience_Principles-Tools.pdf.
Chopra, A. (2016). Security Issues of Firewall. International Journal of P2P Network Trends and Technology (IJPTT) – Volume 22 Number 1 January 2016. Retrieved from – https://www.ijpttjournal.org/2016/volume-22/IJPTT-V22P402.pdf
Devi, P., A. & Laskhmi, S., R. (2013). A Study on Network Security Aspects and Attacking Methods. International Journal of P2P Network Trends and Technology- Volume3Issue2- 2013. Retrieved from -https://www.ijpttjournal.org/volume-3/issue-2/IJPTT-V3I2P406.pdf.
Dr. Vijayarani, S. & Ms. Sylviaa, M. (2015). Intrusion Detection system – a study. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015. Retrieved from – https://airccse.org/journal/ijsptm/papers/4115ijsptm04.pdf
Gaigole, M., S. & Prof. Kalyankar, M., A. (2015). The Study of Network Security with Its Penetrating Attacks and Possible Security Mechanisms. International Journal of Computer Science and Mobile Computing, Vol.4 Issue.5, May- 2015, pg. 728-735. Retrieved from – https://www.ijcsmc.com/docs/papers/May2015/V4I5201599a46.pdf
Internet Security Threat Report. Symantec (2016). Retrieved from – https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf
Intrusion Detection system. Insecure Lab (2014). Retrieved from – https://www.insecure.in/ids.asp
Magid, L. (2014). Why Cyber Security Matters To Everyone? Retrieved from – https://www.forbes.com/sites/larrymagid/2014/10/01/why-cyber-security-matters-to-everyone/#3e2347cc5a71
Malik, M. & Patel, T. (2016). Database security – attacks and control methods. International Journal of Information Sciences and Techniques (IJIST) Vol.6, No.1/2, March 2016 . Retrieved from – https://aircconline.com/ijist/V6N2/6216ijist18.pdf
Pareek, R. (2012). Network security: an approach towards secure computing. Journal of Global Research in Computer Science, Volume 2 No (7), July, 2011, 160-163. Retrieved from -https://www.rroij.com/open-access/network-security-an-approach-towards-secure-computing-160-163.pdf
Rice, L., E. & Rahman, M. (2012). Non – profit organizations’ need to address security for effective government contracting. International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.4, July 2012. Retrieved from -https://arxiv.org/ftp/arxiv/papers/1512/1512.00067.pdf.
Roozbahani, F., S. & Azad, R. (2015). Security Solutions against Computer Networks Threats. Int. J. Advanced Networking and Applications Volume: 07 Issue: 01 Pages: 2576-2581. Retrieved from -https://www.ijana.in/papers/V7I-1.pdf
Section 8.8 – Encryption. The ICT Lounge (n.d). Retrieved from – https://www.ictlounge.com/html/encryption.htm
Security Best Practices for Migrating your Database to the Cloud. Hexatier (2016). Retrieved from -https://www.hexatier.com/security-best-practices-for-migrating-your-database-to-the-cloud/
Sharma, A. (2014). Managing the Organizational Network Security. International Journal of Innovations in Computing (ISSN : 2319-8257) Vol. 2 Issue 4. Retrieved from – https://scholar.harvard.edu/files/lingayas/files/anamika_research_peper2.pdf
Tharaka, S., C. & Silva, R., L., C. (2016). High Security Firewall: Prevent Unauthorized Access Using Firewall Technologies. International Journal of Scientific and Research Publications, Volume 6, Issue 4, April 2016. Retrieved from – https://www.ijsrp.org/research-paper-0416/ijsrp-p5278.pdf
Tiwary, D., K. (2011). Security and ethical issues in IT: an organization’s perspective. International Journal of Enterprise Computing and B International Journal of Enterprise Computing and Business Systems. Retrieved from – https://www.ijecbs.com/July2011/45.pdf
Vialina, B. (2016). Robots present a cyber risk. Retrieved from – https://www.csoonline.com/article/3139448/security/robots
What You Need to Know about Network Security. Cisco (n.d). Retrieved from -https://www.cisco.com/c/en_sg/solutions/small-business/products/security-small-business-main-page/security-primer.html
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download