Thursday, June 20, 2019

Computer Network Security Case Study Example | Topics and Well Written Essays - 1250 words

Computer Network Security - Case Study ExampleIn order to protect digital information, organizations are keen to employ technical controls such as firewalls, invasion Detection Systems, honeypots and Demilitarized zones. These controls are considered as logical and provide pledge on the logical layer. However, often the important picture i.e. information security management is not addressed to the optimal level. A typical information security program is led by an information security manager who establishes a steering committee for discussing security aspects focusing not only on the IT department but every department within the enterprise. some of the management controls that are implemented by the information security manager are IT governance, Risk management, monitoring Key Process Indicators (KPI) and Key Goal Indicators (KGI). KPI demonstrates the legitimate state of security within an organization and KGI demonstrates the level of security to be achieved. As per the curr ent scenario, critical data must be protected by implementing Firewalls to secure the engagement from external logical threats and Virtual Private Network will be implemented for securing the data transmission on the Wide welkin Network. 2 Detailed Network Security Recommendations 2.1 Fundamentals of Firewall and VPN Network security appliances are implemented for providing three fundamental functions i.e. prevention, detection, and correction. Some of the most commonly pick out security appliances are Firewalls and Intrusion Detection Systems. Firewall is defined as a piece of software or hardware device that ? filters the information coming with the Internet connection into a private network or a computer system. Firewall enforces an memory access control policy between two or more(prenominal) networks with two key functions to block unwanted traf?c, and to permit wanted traf?c (Firewall.2007). Similarly, as per network dictionary, Intrusion detection system is defined as In trusion detection system (IDS) is a type of security management system for computers and networks. An IDS gathers and analyzes information from various areas within a computer or a network to identify possible security breaches, which include both intrusions and misuse. 2.2 Recommendation for Firewall and VPN Remote access VPN provide emulation of a workstation to a remote user. It privy extend every application related to data, video or voice communication. Remote access VPN can provide highly customizable and secure remote access to employees anywhere anytime with any congenial device (Vachon & Graziani,). They can access the network resources and data access with any compatible device. The remote access VPN portrays a graphic user experience as the user access his own system. The access is more flexible and easy because it can be operated by any compatible computing device. Remote access VPN supports a wide variety of connectivity options and platforms, fulfilling the user req uirements efficiently. 2.3 Recommended Solution for the Enterprise-A recommended solution for the enterprise will be a hardware-based firewall that is also called as Adaptive Security appliance ASA 5500 from Cisco. The Cisco ASA 5500 Series Security Appliances personalize the security for specific network requirements such as securing credit card transactions.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.