Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Capella University
Abstract
Every international organization requires network security which will be meet any information
system security requirements, end-point user security, applications and organization technical
requirements, network system management, the information system integrators, network system
international organization. this paper, we will discuss the categories of tools offered for the
support network security in the organization. The paper will look at the specific tools pertaining
the category that will increase the backing of network security and other topics such as the
Table of Content
Cover Page,
Abstract.
Table of Content.
Introduction/ Body
Conclusion
References
SECURING THE NETWORK 4
Microsoft Word
Document
Introduction
The international organization quest for effective network security is to have anyways
and means of events, network management protocols, network hardware and technologies,
procedures and applications/operating system that meets the organization needs and mission
which are implemented in the network architecture and infrastructure which will secure the
information system operations, services and functions that maintain the integrity of network
system and information from the system is kept confidential, accountable who for anyone who
access what over the network system. This will consist of the network devices and application
technologies for the management of the effective network system which can handle any variety
of network security threats and block any threats from causing damage to the entire network
system.
The effective network security program is going to work in a way where there is
combinations of security controls, multiple layers of network defense at the various parameter
and within the network system. Within the segmented network system has security controls and
policies, authentication that validates the authorization of user’s who have access to the network
system resources, putting blockage and hindrance to any malicious actors who wants to exploit
the network system. Since the goal of the international organization is to deliver excellent
services experience to its customers and employees in protecting the organization information
SECURING THE NETWORK 5
system security which complies with regulatory requirements of network system security
principles with the goal of protecting their reputation (Jenkins, 2003, p7).
Global Inc. objective for effective network system security is protected its reputation
when it comes to having effect network system security which compiles with network security
principles of confidentiality, integrity, and accountability. These reputations are defining in their
effective network security program in the security controls that they offer and security if
information security assets that secure in the organization. There are continuous risk assessment
and management which identify the risk of network system vulnerabilities and threats discovery.
There is also value place on the data generated in the organization information system by
classification and security controls/protection for these data classification from the network
system. We are able to make available the direction of the network system security
methodologies, standard, outlines, baselines, and policies. Also, there are ways for the
organization information security culture and awareness to keep every member of the
There are types of network system security for the Global Inc. to use which consist of the
security controls of the administrative, logical and the physical controls, these categories of
network system security works in the ways of how to authenticate employees of the Global Inc.,
how management of the Global conduct security awareness of employees, effective implement
management, intrusion detection management, system audit and network system protocol
types of network system security in access control we define which user’s should have access to
the network system, we have advanced malware protection to block any form of malicious
SECURING THE NETWORK 6
malware, also there is application security for supporting the organization network system
security. There is behavioral analytics for detecting any anomaly network system behavior and
also data loss defense where we make sure the integrity of data is secure making difficult for
anyone to intercept sensitive information from the outside of the network system. We also the
tools of email security or email security appliance tools for the email protection to and from the
There is also the tools of firewall and intrusion detection/prevention system for blocking
any type of network system attacks, specific tools such as Cisco Next-Generation IPS which can
support any international organization information system security in blocking any malicious
attacks events and also track done the changes of the outbreak malicious files and malware over
the network system thereby stopping the outbreak of network system attacks and reinfections.
There same way with firewalls which can put blockages between any trusted platforms of
network system parameter zones and external network also we define the firewall by a set of
rules for inbound and outbound network traffic. Such specific tools for firewalls are Cisco
There are also tools of network system security such as mobile device management,
network segmentation, Wireless access security, Security event management, VPN and web
security all these network system security tools are defining to keep the organization network
system traffic connections private or define the network system traffic into different
classification either by application or network system hardware whiles reinforcing the network
system security controls. Also, we are able to encrypt the network system traffic, control and
limit the access that employees can use the web. Whiles maintaining the wireless access point
connections in stringent security controls. Since there are specific tools such as Cisco Aironet for
SECURING THE NETWORK 7
wireless access point security, there is also the endpoint security for remote access security,
Cisco identity services management for employee’s data and threat response security. TrustSec
network system segmentation enforcer. Server for hosting application for authentication and
Centralization and decentralization all deal with improvement network system tools to
get the best out tools for the network system security by way of economies of scales, the
flexibility of local control and performance of services when network system data are stored in a
central location or multiples location. And how they can result in data redundancy, fast search of
data at the central location or multiple locations, limitation in the data search at the storage. With
Virtualization, we store data on hosting devices that means we use a host environment and
storage to run the organization data and application on the hosting devices whiles not using the
physical network resources of the host devices. Cloud Computing which is offsite 3rd party
hosting environment storage for any organization which can buy space to store data and use its
virtual network resources and the 3rd party being responsible for hosting environment upkeep
References
Capella University, 2019, Course room, unit 5, Securing the network, Date Retrieved 02/09/
2019,
https://courserooma.capella.edu/webapps/blackboard/content/listContent.jsp?course_id=_
162482_1&content_id=_7268977_1&mode=reset
Cisco.com. (2014) Cisco Compliance Solution for HIPAA Security Rule Design and
https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Compliance/HIPAA/default/ch3_HI
P.html
Jenkins, S. (2003). Secure network architecture: Best practices for small business and
https://www.giac.org/paper/gsec/2833/secure-network-architecture-practices-small-
business-government-entities/104797
Cisco. (2013). Cisco Medical-Grade Network: Build a Secure Network for HIPAA Compliance.
http://www.cisco.com/c/dam/en_us/solutions/industries/docs/healthcare/cisco_medical_gra
de_network_build.pdf
SECURING THE NETWORK 9