Sei sulla pagina 1di 9

SECURING THE NETWORK 1

Securing the Network

Capella University

IAS5025 - Network and Operating System

Feb 03, 2019


SECURING THE NETWORK 2

Abstract
Every international organization requires network security which will be meet any information

system security requirements, end-point user security, applications and organization technical

requirements, network system management, the information system integrators, network system

architecture site planning for the organization mission and goals.

This paper describes the “requirements of an effective network program in an

international organization. this paper, we will discuss the categories of tools offered for the

support network security in the organization. The paper will look at the specific tools pertaining

the category that will increase the backing of network security and other topics such as the

decentralization, centralization, cloud computing and virtualization their contribution toward

network security of the international organization” (Capella, 2019 para 19).

Keywords: network program, cloud computing, centralization, de-centralization,

virtualization, network security.


SECURING THE NETWORK 3

Table of Content

 Cover Page,

 Abstract.

 Table of Content.

 Introduction/ Body

 Conclusion

 References
SECURING THE NETWORK 4

Unit 5 Virtual Lab 1 and Unit 5 Virtual Lab 2 document

Microsoft Word
Document

Introduction

The international organization quest for effective network security is to have anyways

and means of events, network management protocols, network hardware and technologies,

procedures and applications/operating system that meets the organization needs and mission

which are implemented in the network architecture and infrastructure which will secure the

information system operations, services and functions that maintain the integrity of network

system and information from the system is kept confidential, accountable who for anyone who

access what over the network system. This will consist of the network devices and application

technologies for the management of the effective network system which can handle any variety

of network security threats and block any threats from causing damage to the entire network

system.

The effective network security program is going to work in a way where there is

combinations of security controls, multiple layers of network defense at the various parameter

and within the network system. Within the segmented network system has security controls and

policies, authentication that validates the authorization of user’s who have access to the network

system resources, putting blockage and hindrance to any malicious actors who wants to exploit

the network system. Since the goal of the international organization is to deliver excellent

services experience to its customers and employees in protecting the organization information
SECURING THE NETWORK 5

system security which complies with regulatory requirements of network system security

principles with the goal of protecting their reputation (Jenkins, 2003, p7).

Global Inc. objective for effective network system security is protected its reputation

when it comes to having effect network system security which compiles with network security

principles of confidentiality, integrity, and accountability. These reputations are defining in their

effective network security program in the security controls that they offer and security if

information security assets that secure in the organization. There are continuous risk assessment

and management which identify the risk of network system vulnerabilities and threats discovery.

There is also value place on the data generated in the organization information system by

classification and security controls/protection for these data classification from the network

system. We are able to make available the direction of the network system security

methodologies, standard, outlines, baselines, and policies. Also, there are ways for the

organization information security culture and awareness to keep every member of the

organization in security consciousness (Jenkins, 2003, p3-5).

There are types of network system security for the Global Inc. to use which consist of the

security controls of the administrative, logical and the physical controls, these categories of

network system security works in the ways of how to authenticate employees of the Global Inc.,

how management of the Global conduct security awareness of employees, effective implement

change control management, access control management, authentication and verification

management, intrusion detection management, system audit and network system protocol

configuration management, application/OS patch management in the operation system. By these

types of network system security in access control we define which user’s should have access to

the network system, we have advanced malware protection to block any form of malicious
SECURING THE NETWORK 6

malware, also there is application security for supporting the organization network system

security. There is behavioral analytics for detecting any anomaly network system behavior and

also data loss defense where we make sure the integrity of data is secure making difficult for

anyone to intercept sensitive information from the outside of the network system. We also the

tools of email security or email security appliance tools for the email protection to and from the

organization network system (Cisco, 2013, p8).

There is also the tools of firewall and intrusion detection/prevention system for blocking

any type of network system attacks, specific tools such as Cisco Next-Generation IPS which can

support any international organization information system security in blocking any malicious

attacks events and also track done the changes of the outbreak malicious files and malware over

the network system thereby stopping the outbreak of network system attacks and reinfections.

There same way with firewalls which can put blockages between any trusted platforms of

network system parameter zones and external network also we define the firewall by a set of

rules for inbound and outbound network traffic. Such specific tools for firewalls are Cisco

Unified Threat Management (Cisco, 2013, p 9-11).

There are also tools of network system security such as mobile device management,

network segmentation, Wireless access security, Security event management, VPN and web

security all these network system security tools are defining to keep the organization network

system traffic connections private or define the network system traffic into different

classification either by application or network system hardware whiles reinforcing the network

system security controls. Also, we are able to encrypt the network system traffic, control and

limit the access that employees can use the web. Whiles maintaining the wireless access point

connections in stringent security controls. Since there are specific tools such as Cisco Aironet for
SECURING THE NETWORK 7

wireless access point security, there is also the endpoint security for remote access security,

Cisco identity services management for employee’s data and threat response security. TrustSec

network system segmentation enforcer. Server for hosting application for authentication and

verification security controls (Cisco, 2013, p 12-19).

Centralization and decentralization all deal with improvement network system tools to

get the best out tools for the network system security by way of economies of scales, the

flexibility of local control and performance of services when network system data are stored in a

central location or multiples location. And how they can result in data redundancy, fast search of

data at the central location or multiple locations, limitation in the data search at the storage. With

Virtualization, we store data on hosting devices that means we use a host environment and

storage to run the organization data and application on the hosting devices whiles not using the

physical network resources of the host devices. Cloud Computing which is offsite 3rd party

hosting environment storage for any organization which can buy space to store data and use its

virtual network resources and the 3rd party being responsible for hosting environment upkeep

cost and needs.


SECURING THE NETWORK 8

References

Capella University, 2019, Course room, unit 5, Securing the network, Date Retrieved 02/09/

2019,

https://courserooma.capella.edu/webapps/blackboard/content/listContent.jsp?course_id=_

162482_1&content_id=_7268977_1&mode=reset

Cisco.com. (2014) Cisco Compliance Solution for HIPAA Security Rule Design and

Implementation Guide. Web. Date Retrieved Aug/05/2018

https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Compliance/HIPAA/default/ch3_HI

P.html

Jenkins, S. (2003). Secure network architecture: Best practices for small business and

government entities. SANS Institute. Date Retrieved 02/09/ 2019,

https://www.giac.org/paper/gsec/2833/secure-network-architecture-practices-small-

business-government-entities/104797

Cisco. (2013). Cisco Medical-Grade Network: Build a Secure Network for HIPAA Compliance.

Date Retrieved 02/09/ 2019, from

http://www.cisco.com/c/dam/en_us/solutions/industries/docs/healthcare/cisco_medical_gra

de_network_build.pdf
SECURING THE NETWORK 9

Potrebbero piacerti anche