Question:
Discuss About The Professional Information And Communication?
This report is all about network security which is a security system designed for a network to block unauthorized access and various kinds of threats. It also focuses to improvise the job of network admin to create some preventive measures to protect their network system from any kind of threat. Various system round the globe that does all the vital transaction and communication of regularly need security for protecting the data which contain vital information. It mainly keeps a track on different threats that may arise in a network. Network security mainly works by adding different layers of various security defenses.
The different types of network application available in present industry are intrusion detection system, firewalls and data-centric security. Firewall is type of network security system that is mainly used for maintenance and regulation of traffic over the internet using basic protocol and methods (Rasthofer et al.,2014). Firewall exists in mainly two forms that DHCP server which is hardware component and there are some software firewalls are mainly used for protection of system from various threats. Software firewall is mainly used by organization for protection against the breach of data which contains vital information. Data centric security mainly provide security against the breach of important data which contain vital information. No organization round the globe can claim that it is purely immune to various cyber-attacks.
The report mainly focuses on promoting the use of various technological services like firewall, intrusion detection system, data centric which can be proved beneficial for various organization round the globe. Various limitation of intrusion detection system will be discussed in the coming pages of this report. Intrusion detection system does not block or prevent attack of various malware software’s (Suh et al., 2014). The attacks of various malware can be stopped by the help of an experienced and well-trained engineer. Among all the methods this particular method uses protocol based attacks (PBA).
Network Security can be defined as the security which is designed for a network from unauthorized access and risks. It is the job of network admin to design some preventive measures to save their network from any kinds of threats or danger. Computer system that makes transaction and communication on a regular basis needs security for protecting its data with contain vital information. It can also be referred to as an activity which is mainly created for protecting the various network and data containing important information (Rasthofer et al.,2014). It is mainly to check different threats that may arise in a network. The best way to protect a network is to assign it a unique name and a password corresponding to it (Chen et al., 2015).
Network security works by combining different layers of security defenses. Different security layer uses policies and control for its working (Demchenko, De Laat & Membrey, 2014). It allows only authorized user to access the network and blocks any unknown user to save the network from exploitation and threats. Digitization has changed the living style of various people across the globe (Suh et al., 2014). It is the duty of every organization to check the network security as any fault in it may compromise with service given to a customer. Network security aims to protect important information from any attack (Chen et al., 2015).
There are various types of security devices involved in a network like active device, passive device, preventative device, unified threat management. Active devices mainly refer to certain devices that cuts down unwanted traffic. Firewall, Antivirus scanning devices is considered as active device. Passive device helps in identifying unwanted traffic and intrusion detection appliance can be referred as a passive device (Suh et al., 2014). Preventive devices help in scanning the network and checks any security problems related to it. Unified threat management devices is considered as the best device as it does all the work of different devices like firewall, content filtering, web catching and many other things (Chen et al., 2015).
Three different types of network application used in present market are intrusion detection system, firewalls and Data-Centric-Security. Firewall is nothing but a network security system that aims in maintenance and regulation of traffic over the network using some basic protocols. (Chen, 2013). Firewalls exists in two forms like as hardware and hardware appliance. Some firewalls that are hardware based acts like DHCP server over the network. Now days many computers use different types of software based firewalls to prevent its data from any network threats. Modern router that transfer data over network contains firewall components which is mainly used for performing basic routing function. The basic function of firewall that is used in private network is to prevent unauthorized access of device to the internet. Every important information that passes through internet will have to go through firewall for examination of different security checks. A perfect firewall system consists of both type of devices like hardware and software. It also aims in providing easy access to personal networks through various certificates and logins. Hardware firewalls are solo products. These types of firewalls are mainly found in routers used by various broadband services. Hardware firewalls prvide the freedom to use four port networks in any system. For larger network, it provides business firewall solutions also. Software firewalls are mainly used to protect system from various threats from internet. It is mainly used by various firms to protect them against the breach of any important data (Chen, 2013).
Intrusion detection system is also known as intrusion detection and prevention system are considered as various appliances that helps in monitoring of unknown activates over the internet and keeps a track of all the necessary information and various methods or steps that can be taken to stop the activity. Intrusion detection system aims to build an alarm system for any unknown activity in the network, drops the various packets and many times it resets the whole connection and protects the system from any damage or blockage (Chen, 2013). Intrusion detection system can perform many activities like to detect correction cyclic redundancy check and any errors related to it, prevention of transmission control protocol relating issues (Demchenko, De Laat & Membrey, 2014). It also aims to create unwanted transport and layers of various network. Intrusion prevention system is another technology which extends the solution of IDS by including the ability to block various threats which are detected by it. It has become the important option for checking various technology like IDS and IPS technology. IDA only detects threats which are placed out of band of the network infrastructure which means that is does not have any kind of passage for communication between the receiver and sender of the information. IDS solution mainly uses TAP port for checking inline traffic which mainly checks that it does not affect the performance of inline network. The main function of IDA is to check the traffic (Demchenko, De Laat & Membrey, 2014).
Data-centric security mainly aims to provide security against the breach of important data. No organization in the world is immune to various cyber-attacks. Data-centric security aims to provide following key points like data discovery, data classification, data tagging and watermarking, data loss prevention, visibility of data, identity management, access of data through cloud system. Tools used by data discovery mainly helps organization to get a detail information about the location, volume, context and all the types of risk associated with it. Data classification aims to provide various policies and tools which can be used to separate valuable information which can be targeted from a less important information. Data tagging aims to ensure that all the containing important information can be found easily. Data is mainly tag to produce its security classification and other important information related to it. Data loss prevention mainly used for identification and protection of data which can be in motion on networks and data at rest in various storage devices like desktop, laptop, mobile phone and tablets. Data visibility allows various organization to check how structured and unstructured can be processed (Liang & Xiao, 2013). Identity and access management aims to protect data by checking that only authorized people has the access to right information at correct time and for ethical reasons (Liang & Xiao, 2013). Corporate networks provide a global platform where user from various domains can access the required information at right time. Organization are increase the need of various application and are more focusing in moving their application to cloud (Liang & Xiao, 2013). Cloud access security brokers mainly aims to protect important data by improving its access control, access and analysis of important data (Knapp & Langill, 2014)
Brenna nit is considered to be an effective information and/or network security solution in Australia. It mainly aims to provide better network visibility and network monitoring from various application level attacks.
In the next five-year firewall method can protect the internal network of a business from any kind of damage from unknown source. A firewall contains a list of control list which can be used to block authorized access and only allow approved routes. Firewall helps in making internal IP addresses private and also checks that the information and system are not exposed to hackers. The ultimate goal is to create a public IP address so that the private IP may work as a public IP. By following the above three methods the network architecture can work properly it also helps in easy monitoring of network against various security threats. The above network can be used for tracking threats throughout the organization.
Intrusion detection system can be used to tune specific contents in various packets of network. It can be used to check for data in respect to other protocol. It helps in easy regulation of data across various networks. It can be used for increasing the efficiency of the system. Intrusion detection system helps in providing a clear overview of the going things over the network and there are few number of alternative that help the IDS to track the depth of network traffic. It also helps in tracking of virus as soon as it hits a network. An IDS can effectively tell about the compromised machines and how a virus it propagating through a network top effect over systems. In many cases it is found to be an important tool to prevent a network from various damage. A well configured IDS can be useful to provide data that used to file a civil or criminal case against any person who misuses a network.
They do not prevent attacks or block them, they are mainly used for uncovering them. An Experienced and well-trained engineer is needed for administration. This particular method is more prone to protocol based attacks (PBA). The signature library of this method needs to be continuously updated to check the upcoming and latest threats related to it. An IDS cannot replace a firewall, virus scan or any security measures. As soon as an IDS is installed in the system it will require more additional efforts. Another thing that must be taken care is that managing of IDS mainly requires experience staff members. The less experienced staff of the organization, the more effort is needed for them. It will ultimately create more work for the IT department and in many cases it will make work of the IT department more difficult (Rasthofer et al.,2014).
Firewall improves the security of host computers and subnet and it has many advantage like it ensure the safety of host and application, ensures safety of several client and server. It also protects various pivotal departments of an organization form inner or outer attacking (Divya, Priya & Kowselya, 2015). It also provides safety channel for various employees of an organization. Various client provides safety channel that passes through internet and visit long distance system.
Firewalls slows down many application and may be considered as heavy on some system resources (Divya, Priya & Kowselya, 2015). Firewalls can be considered difficult to remove and every host of the computer system needs to updated on regular basis using patches.
Data Centric Security provides data protection techniques for protecting toolset to tackle masking of data, cloud protection, compliance and data residency. It also provides fast integration through various web services and high performance of Library of clients and masking of dynamic data.
Data Centric security provides low security with limited performance and capability. It cannot represent various complex data relationships. In Data centric security data redundancy is very common especially when the quantity or amount of data increases.
All companies have some legal responsibilities and they are required to accept the laws which can affect the organization. For proper working of an organization company must aware of various external factors. Social responsibility aims to provide certain requirements related to social responsibility. Ethical responsibility aims to create certain guidelines which helps in the establishment of various codes of conduct. Ca ethics can be considered as a system which is mainly designed for various practice related to ethics.
Conclusion
From the above discussion, it can be concluded that the organization has started using technologies like firewall, intrusion detection system, data centric can be proved beneficial to various organization. Firewall is a network security which helps in maintaining and regulating its traffic over the internet using some protocol. Firewalls mainly exists mainly two forms that is DHCP which is hardware form and there are some software firewalls which is mainly for protection of a system from various malware software that may attack the system. This method is mainly used mainly used by various organization for protection against the breech of important data which contains vital information. Intrusion detection system is also known as intrusion detection and prevention system are referred to those systems which helps in keeping a track of different applications which perform some activities over the internet. It also helps in keeping a track of all the required information and various steps that must be taken to stop such activities. It mainly aims to build an alarm system for keeping a track of various unknown activity. IPS stands for intrusion prevention system which is another technology by IDS which has the capability to block various malware software the internet. Data- centric security is another technology which mainly aims to provide security against breach of data which contains important information. Various organization round the globe are very much prone to cyber-attacks. Data centric security mainly aims to provide various key points like discovery of data, classification of data, tagging of data, prevention of data loss, data visibility, management of identity and accessing of data through various cloud system. As discussed above intrusion detection system have some limitation like it does not prevent attacks or blocks them. It mainly helps in uncovering them by the help of an experienced and well-trained engineer. This particular method is more used to protocol based attacks (PBA).
From the above discussion it can be recommended that the various organization should upgrade their intrusion detection system, firewalls and data centric security. As firewall can be considered as an important security system that helps in regulation and maintenance of traffic over the network using some protocol. Hardware and software firewall are mainly two types of firewalls available over the network. DHCP is an example of a well-known hardware firewall that is used over internet. Software firewalls are mainly used to protect various system from different malware software that is available over the internet. Intrusion detection system helps in keeping a track of all the important information and various steps that must be taken to stop the activity of various malware software’s. It also performs various activities like detection of cyclic redundancy and checking of any errors related to it. Data centric security mainly aims to provide security against the breach of data which contains important information as no organization in the globe is immune to various cyber-attacks.
Robotics can be used as an emerging technology which can improvise the speed, quality, expenditure of available products and services, on the contrary it can effect a large number of workers. The automation technology will ultimately affect the hardware, software and various self-care customer services which will improve the economy of various organization round the globe. Automation technology mainly aims to improve workface of many organization including this one.
References
Chen, G., Gong, Y., Xiao, P., & Chambers, J. A. (2015). Physical layer network security in the full-duplex relay system. IEEE transactions on information forensics and security, 10(3), 575.
Demchenko, Y., De Laat, C., & Membrey, P. (2014, May). Defining architecture components of the Big Data Ecosystem. In Collaboration Technologies and Systems (CTS), 2014 International Conference on (pp. 109). IEEE.
Divya, G., Priya, C. K., & Kowselya, G. (2015). EFFECTIVE FIREWALL IMPLEMENTATION IN CLOUD OVER VIRTUAL ENVIRONMENT USING SPACK FREWALL RESTRICTION.
Liang, X., & Xiao, Y. (2013). Game theory for network security. IEEE Communications Surveys & Tutorials, 15(1), 476.
Rasthofer, S., Arzt, S., Lovat, E., & Bodden, E. (2014, September). Droidforce: Enforcing complex, data-centric, system-wide policies in android. In Availability, Reliability and Security (ARES), 2014 Ninth International Conference on (pp. 45). IEEE.
Suh, M., Park, S. H., Lee, B., & Yang, S. (2014, February). Building firewall over the software-defined network controller. In Advanced Communication Technology (ICACT), 2014 16th International Conference on (pp. 746). IEEE.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download