Sei sulla pagina 1di 9

NETWORK MONITORING 1

Network Monitoring

Capella University

IAS5025 - Network and Operating System

March 14, 2019


NETWORK MONITORING 2

Abstract
The organization today have something in best practices for network system management

other business else wants. By this paper practical backing for network system functional areas

which requires increase quality of best efforts and practices for secure network system

management, tools, and security controls. Since the organization development of security control

plans for securing every functional area of the network system, since the challenges of secured

network system design dealing with the complexity of network system connectivity from the

public network system, remote access server.

This paper will “review plans for maintenance and monitoring of secure network design

within an organization. this paper, we will further examine the development of sanction for

maintenance and monitoring tools to the backing of the upkeep of a secure network system in the

business. The paper will also discuss the development of sanction for plans, methodologies, and

processes to the backing of the upkeep of a secure network system in the business. furthermore,

the paper will focus on plans for security professional within an organization for enforcement of

best effort for the current network system hardening” (Capella, 2019 para 21).

Keywords: network system hardening, maintenance, monitoring, security control,

network system design.


NETWORK MONITORING 3

Table of Content

 Cover Page,

 Abstract.

 Table of Content.

 Introduction/ Body

 Conclusion

 References
NETWORK MONITORING 4

Introduction

For the organization to deal with effectively challenges that come with network system in

vulnerabilities and flaws, there is the needed for development of plans for implementing the right

security controls mix for security principles in a modular network system design which will

allow for application of multi-layered security defenses for protect in network system in top-

down approach which centered on the information security governance policies and planning

development and choosing the best network system technologies. Since by this article we

understand the various ways of securing the organization legacy system elements from the

enterprise-wide network which is more exposed to security risks such as the remote access

network, internet access connection or public network connection, wireless access connection

and user and network services.

The Paquet(2013) says that the maintenance and monitoring of network system design

depend on these plans and applying a security control plans from the identification of network

system assets, examining the network system security risks, also examining the network system

security requirements with tradeoffs, which will help in development of network system security

plans and policies, also the organization develop measures for the application of network system

security control policies, organization technical implementation plan which accomplished by the

buy-in of all stakeholders of the organization. Further awareness and training of all stakeholders

of the organization while testing the network system security controls by patching, updates and

system upgrades if there any risk found after a further risk assessment of the organization

network system design.

The network system design needs is by this situation an information security policies and

processes are define and further communicated to the organization in an implemented steps of
NETWORK MONITORING 5

system development life cycle of definition of the network system security plan for dealing with

any identify system risk, there is documentation of information security policies and processes,

leading to the creation of network system security awareness the organization believes and sticks

to it. Paquet (2013) paper examines that whiles implementing security controls of the network

system and organization as a whole without missing monitoring and measure the performance

metrics outcomes of the security control strategies which are applied and their end result.

Reporting and auditing of the security control measures to see its effectiveness.

Rafi (2006) states in his article that since there is likely the organization information

system security will have and face challenges in the information system asset which requires

mitigation of these security risks, threats and flaws in the asset such as the NOS, operation

system/application, network system inventory of assets, human factors, enterprise access and

user excessive permission, business continuity and data recovery and further business security

awareness.

The goals for monitoring and maintenance plan is to have comprehensive organization

information security governance which handles various technical process, governing process and

end-user processes in streamline network system monitoring and maintenance plan in mean time

to resolves all network system behavior mix from the escalation, reporting alerts on the multi-

layered of the network system, applying the increase availability of the network system backup

and failover plans, not leaving the network system security controls configuration management

options and policies which has a capacity development and growth of the network system. Since

the scope of the monitoring and maintenance goals to monitor the organization network system

baseline behavior from the end-users internet usage. Full inventory and discovery of information

system asset and applications/OS by auditing and control, mitigation of application and OS
NETWORK MONITORING 6

vulnerabilities. Data center and server farm data integrity and retention plans (Paquet, 2013, p

15- 19).

Implementation of the maintenance and monitoring of the network system design for

security controls by the organization taking inventory of all authorized and unauthorized devices

and applications, analysis of audit logs, daily vulnerability evaluation and restoration,

administrative privileges in controlled mode, web browsing and email security protection, anti-

malware and virus protection, the business continuity and data recovery plan, accounting for

network system protocols and services use in the network system administration. There is an

Incident response, wireless access point control, various network system perimeter and boundary

defense, configuration management of the network system technologies and devices (Rafi, 2006,

p 13-17).

The sanctions for the monitoring and maintenance tools there is the need for deployment

of SIEM and the log analytic tools for monitoring and maintenance such as logs files gathering

and evaluation, also logic monitoring tool for the network system monitoring of the enterprise-

wide network system. Also, monitoring of network system technologies and devices such as

application, data center, server farms, cloud computing, virtual machines (Santander, 2010, p6).

The sanctions for information system processes and plans that will aid the upkeep of

maintenance of the network system from the technical governance policies such as the general

procedures for upkeep of the network system maintenance such as audit procedures, risk

assessment procedure, enterprise-wide web server procedure, password procedures, acquisition

of network system access procedure, the account entry request procedures, Email procedures,

remote entry procedures, personal devices procedures, application procedures- application

integrity and database credentials procedures, network system procedures- what are the
NETWORK MONITORING 7

minimum network system entry user requirements procedures, technologies and devices security

and configuration management procedures, wireless communication and entry point procedures

which covers data retention and integrity (CISA, 2018, para 9 -13).

Network system hardening being enforced by today IT professional are fault management

procedures, configuration management procedures, performance management procedures,

network system security management procedures, and account management procedures of all

network system usage data of the network system devices resources. Through the network

system segmentation and segregation of the network systems, which is in hardening of the

network system devices there is physical separation of generated sensitive data through either

virtualization and perimeter boundary defense, elimination of unencrypted remote administrator,

unnecessary services and protocols. The restriction of physical access to network system devices

and security protection of console and virtual cables lines, back up configuration procedures and

robust password procedures (CISA, 2018, para 19 -21).


NETWORK MONITORING 8

References

Capella University, 2019, Course room, unit 10, Network Monitoring, Date Retrieved 03/13/

2019,

https://courserooma.capella.edu/webapps/blackboard/content/listContent.jsp?course_id=_

162482_1&content_id=_7268977_1&mode=reset

Santander Peláez,M. (2010 p. 6). Measuring effectiveness in Information Security Controls. Date

Retrieved 03/13/ 2019, https://www.sans.org/readingroom/whitepapers/basics/measuring-

effectiveness-information-security-controls-33398

Paquet, C. (2013). Network Security Concepts and Policies. Date Retrieved 03/13/ 2019,

http://www.ciscopress.com/articles/article.asp?p=1998559&seqNum=3

CISA, (2018), Securing Network Infrastructure Devices, Date Retrieved 03/13/ 2019,

https://www.us-cert.gov/ncas/tips/ST18-001

Rufi, A. (2006). Vulnerabilities, Threats, and Attacks. Network Security 1 and 2 Companion

Guide. Date Retrieved 03/13/ 2019, http://www.lovemytool.com/files/vulnerabilities-

threats-and-attacks-chapter-one-7.pdf
NETWORK MONITORING 9

Potrebbero piacerti anche