StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Security Issues - Essay Example

Cite this document
Summary
The essay "Network Security Issues" focuses on the critical analysis of the major issues in network security. Data confidentiality entails allowing authorized users to access particular data while preventing unauthorized access to data by intruders…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
Network Security Issues
Read Text Preview

Extract of sample "Network Security Issues"

Data confidentiality entails allowing authorized users to access particular data while preventing unauthorized access to data by intruders. When access eavesdrops on particular data, the principle of confidentiality will not hold. In networks, encryption is the principal technique for maintaining data confidentiality. This process is achieved using encryption algorithms that are used to generate keys for encrypting and decrypting data.

Technical security controls are used to provide control mechanisms within systems to mitigate potential security risks that may affect the network. Technical security controls are made of three components: detective, corrective and preventive, which all work to mitigate risks within a system.

Switch(config)#line vty 0 15
Switch(config-line)#password admin
Switch(config-line)# login
Switch(config-line)#exit

Switch(config)#line console 0
Switch(config-line)#password adminpass
Switch(config-line)#login
Switch(config-line)#exit

routerOne(config)# login block-for 600 attempts 3 within routerOne(config)#login on-failure log every 2

In the first step, I will access the router through the web interface. This will allow me to configure encryption using the WPA2 or the pre-shared key. This will ensure that anyone who has all devices must provide this key before joining the network.

I will also configure the number of addresses to a defined number as well as allow the DHCP server to provide dynamic addresses based on certain main addresses.

After doing these configurations, I will also enable no broadcast of the SSID and save the configurations, and exit the router. 

The access list will permit traffic from the outside network to reach the inside network through port 80.

- TACACS uses TCP protocol which is more reliable than User Data Protocol used by RADIUS.
- RADIUS only encrypts the password section of an access-request packet. On the other hand, the TACACS+ encrypt the entire message thus offering better security.
- RADIUS offers a better extension for IPSec compared to TACACS+ which does not.
- RADIUS is well developed compared to TACACS but is not very well developed.

There are three IKE policy choices message encryption, message integrity hash algorithm and peer authentication method. The policies are satisfied by various encryption methods that are dependent on several factors such as the type of hardware in place. The key length available when using an encryption algorithm allows the definition of key length used in terms of bits. When it comes to choosing a message encryption algorithm, 3des is the strongest when compared to DES. The sha encryption offers a better encryption type as compared to md5 when it comes to the message integrity algorithm. For the peer authentication method, the rsa-sig offers stronger encryption.

An intrusion detection system has powerful features that provide notification when an attack occurs. On the other hand, a detective prevention system only uses limited functions to thwart attacks from taking place.

The detection system is also limited because it relies on copies of network packets, which must be received from another switch. This makes sensors operating in intrusion mode to be said as running in promiscuous mode.

Compared to a detection system, intrusion prevention is more robust and has better features because it operates in inline mode where it checks as packets flow in teatime. Therefore, it can prevent traffic from entering a given network in real time.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network security Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Network security Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1582197-network-security
(Network Security Essay Example | Topics and Well Written Essays - 500 Words)
Network Security Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1582197-network-security.
“Network Security Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1582197-network-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Security Issues

Network Security Principles

network security PRINCIPLES network security Principles Author Author Affiliation Date network security is a set of rules and regulations that a business organization must follow in order to protect its computer system.... At the present, network security is a major concern for each business in which computers are utilized to a great extent.... In this scenario, network security threat means that a competitor or a hacker can gain access to the sensitive or vital information, which can cause the entire business destruction or personal information related to a specific system or data loss....
3 Pages (750 words) Essay

Network Security

In addition, Network Security Issues are everywhere whether it is a computer being utilized in a big business/organization or it is a personal computer.... Moreover, in order to determine Network Security Issues a research study was conducted by the event management and security information supplier netForensics, which revealed that more than 80 percent of IT managers anticipate network-borne dangers, which have augmented all through the year 2010 and 2011, and more than 85 percent of IT managers are seeing their corporate network security environment turning out to be more and much harder and complex (Cisco, 2000; Schwartz, 2010)....
6 Pages (1500 words) Literature review

Successful Implementation of Network Security Policies

They address Network Security Issues related to Internet access, installation of unofficial software or devices, and sending/receiving e-mail attachments.... You can create awareness through widely circulated documentation, e-mail, newsletters, a web site, training programs, and other announcements about security issues.... pdate user awareness of current and upcoming security issues using the following methods: ... etwork managers should address the security issues with respect to personnel....
6 Pages (1500 words) Assignment

Device Hardening and Secure Network Design

Additionally, the Network Security Issues emerge with the emergence of new type of network technologies like that mobile networks, WiFi networks, wireless networks, etc.... It is a set of procedures and measures those are used to protect and defend against the augmenting Network Security Issues and vulnerabilities.... ain network security and Design Problems 4 ... However, network security has turned out to be a most important concern in network designing and implementation....
12 Pages (3000 words) Term Paper

Common Identity Theft Crimes

?Internet Identity Theft - Wireless Network Security Issues.... Common ID theft crimes and security issues are discussed.... Common ID theft crimes and security issues are discussed.... Wireless network security is one of the main concerns since wireless networks strengthened their roots in the tech world and issues of personal information theft arose.... A hacker cannot break into secured networks as wireless network security for them is turned on....
9 Pages (2250 words) Research Paper

Aspects of Network Security Management

Present Network Security Issues are everywhere whether it is a computer system being utilized in a big business/organization or else it is a private workstation.... o analyze Network Security Issues a research carried out by the event administration and security information suppliers netForensics, has revealed that 80 percent of IT executives anticipate network-abided dangers that has augmented all through the year 2010 and 2011, 85 percent of IT executives are observing that their corporate network security location is turning out to be more and more harder and complicated (Schwartz, 2010). ...
6 Pages (1500 words) Essay

Wireless Network Security Issues

The report "Wireless Network Security Issues" focuses on the critical, and thorough analysis of the major issues in wireless network security.... This paper will look at the most common types of wireless network security, as well as the relative level of support and steps involved in implementation.... Increased reliance on wireless networking creates an increased need for effective wireless security.... ore traditional means of security are also commonly employed with wireless networking....
13 Pages (3250 words) Report

Information Security

ritical evaluation of Network Security Issues yet to be resolved 13 ... This efficiency in the future will mainly be motivated by the advancement in technology which seems to answer most of the network issues as well as addressing the Network Security Issues.... ritical evaluation of Network Security Issues yet to be resolved ... The international laws and legislation regarding the Network Security Issues are also a stumbling block towards resolving some of the issues....
13 Pages (3250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us