Wednesday, October 9, 2019

Computer Network Security Case Study Example | Topics and Well Written Essays - 1250 words

Computer Network Security - Case Study Example In order to protect digital information, organizations are keen to implement technical controls such as firewalls, Intrusion Detection Systems, honeypots and Demilitarized zones. These controls are considered as logical and provide security on the logical layer. However, often the important aspect i.e. information security management is not addressed to the optimal level. A typical information security program is led by an information security manager who establishes a steering committee for discussing security aspects focusing not only on the IT department but every department within the enterprise. Some of the management controls that are implemented by the information security manager are IT governance, Risk management, monitoring Key Process Indicators (KPI) and Key Goal Indicators (KGI). KPI demonstrates the current state of security within an organization and KGI demonstrates the level of security to be achieved. As per the current scenario, critical data must be protected by i mplementing Firewalls to secure the network from external logical threats and Virtual Private Network will be implemented for securing the data transmission on the Wide Area Network. 2 Detailed Network Security Recommendations 2.1 Fundamentals of Firewall and VPN Network security appliances are implemented for providing three fundamental functions i.e. prevention, detection, and correction. Some of the most commonly adopted security appliances are Firewalls and Intrusion Detection Systems. Firewall is defined as â€Å"a piece of software or hardware device that ? filters the information coming through the Internet connection into a private network or a computer system. Firewall enforces an access control policy between two or more networks with two key functions: to block unwanted traf?c, and to permit wanted traf?c† (Firewall.2007). Similarly, as per network dictionary, Intrusion detection system is defined as â€Å"Intrusion detection system (IDS) is a type of security man agement system for computers and networks. An IDS gathers and analyzes information from various areas within a computer or a network to identify possible security breaches, which include both intrusions and misuse†. 2.2 Recommendation for Firewall and VPN Remote access ‘VPN’ provide emulation of a workstation to a remote user. It can extend every application related to data, video or voice communication. Remote access ‘VPN’ can provide highly customizable and secure remote access to employees anywhere anytime with any compatible device (Vachon & Graziani,). They can access the network resources and data access with any compatible device. The remote access ‘VPN’ portrays a realistic user experience as the user access his own system. The access is more flexible and easy because it can be operated by any compatible computing device. Remote access ‘VPN’ supports a wide variety of connectivity options and platforms, fulfilling the user requirements efficiently. 2.3 Recommended Solution for the Enterprise-A recommended solution for the enterprise will be a hardware-based firewall that is also called as Adaptive Security appliance ASA 5500 from Cisco. The ‘Cisco ASA 5500 Series Security Appliances’ personalize the security for specific network requirements such as securing credit card transactions.  

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.