Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2024
Technology's rapid growth and greater reliance on digital systems have made cybersecurity a global problem for organizations. ACME Industries, a worldwide financial security corporation, follows suit. We analyze ACME Industries' IT infrastructure and make security suggestions in this study. The paper begins with a cybersecurity risk analysis that covers risk analysis standards and frameworks, valuable assets and their impact values, and threats and vulnerabilities. This study enables secure security architecture design. A DMZ server farm would secure central server files. This includes directory, DHCP, file, proxy, management, email, DB, SIEM, and web servers. DMZs keep vital servers safe. We also secure OS and networked systems. To secure network traffic, VLANs are used. VLANs isolate and govern network resources for departments, guests, Wi-Fi users, PC users, and IP phones. We cover network assaults and vulnerabilities using SIEM. Real-time security analytics can detect and respond to attacks. ACME Industries can increase network security and threat detection using SIEM data. Planning and execution are needed to change the network architecture. We describe a smooth switching mechanism. We also present industry best practices and cybersecurity principles-based research and reasons for the recommended solutions. This cybersecurity analysis study is designed to help ACME Industries understand its IT infrastructure security landscape and improve company cybersecurity. ACME Industries can reduce risks, protect sensitive data, and maintain system and data integrity by following security recommendations and industry standards
2024
Technology's rapid growth and greater reliance on digital systems have made cybersecurity a global problem for organizations. ACME Industries, a worldwide financial security corporation, follows suit. We analyze ACME Industries' IT infrastructure and make security suggestions in this study. The paper begins with a cybersecurity risk analysis that covers risk analysis standards and frameworks, valuable assets and their impact values, and threats and vulnerabilities. This study enables secure security architecture design. A DMZ server farm would secure central server files. This includes directory, DHCP, file, proxy, management, email, DB, SIEM, and web servers. DMZs keep vital servers safe.We also secure OS and networked systems. To secure network traffic, VLANs are used. VLANs isolate and govern network resources for departments, guests, Wi-Fi users, PC users, and IP phones. We cover network assaults and vulnerabilities using SIEM. Real-time security analytics can detect and respond to attacks. ACME Industries can increase network security and threat detection using SIEM data.Planning and execution are needed to change the network architecture. We describe a smooth switching mechanism. We also present industry best practices and cybersecurity principles-based research and reasons for the recommended solutions.This cybersecurity analysis study is designed to help ACME Industries understand its IT infrastructure security landscape and improve company cybersecurity. ACME Industries can reduce risks, protect sensitive data, and maintain system and data integrity by following security recommendations and industry standards
2010
In recent years, so many networks are being built and some of the organizations are able to provide security to their networks. The performance of a network depends on the amount of security implemented on the network without compromising the network capabilities. For building a secure network, administrators should know all the possible attacks and their mitigation techniques and should perform risk analysis to find the risks involved in designing the network. And they must also know how to design security policies for implement the network and to educate the employees, to protect the organization's information. The goal behind this case-study is to build a campus network which can sustain from reconnaissance attacks. This thesis describes all the network attacks and explores their mitigation techniques. This will help an administrator to be prepared for the coming attacks. This thesis explains how to perform risk analysis and the two different ways to perform risk analysis. It also describes the importance of security policies and how security policies are designed in real world.
The Importance of Network Security in Protecting Sensitive Data and Information
Network security has remained a major concern especially in the modern world where technological advancement is rapidly evolving. This study explores the concept of data and information security especially in today's environment where cyber risks like malware, phishing, DDoS, and insider threats are rampant. It covers the fundamentals of the network's security measures such as Firewall, IDS, Encryption, Access control, VPNs, and Security Auditing & Monitoring. A qualitative analysis of secondary data and case studies such as the Equifax data breach and the Yahoo data hack is used to assess the effectiveness of these security measures in the real world. Regulatory compliance is also encouraged through the use of standards like GDPR, PCI DSS, and HIPAA to ensure that companies meet the set requirements; failing to do so attracts fines, lawsuits, or loss of reputation among other consequences. Measures like regular software updates and patching, secure user authentication, network segmentation and security consciousness among the workers should be adopted. These are important in avoiding risk occurrences, minimizing threats and providing a hardy protection for new risks. This will be a detailed step by step guide to help organizations improve their network security, manage compliance and data protection in the interconnected world of today, with a focus on the importance of strong network protection in ensuring data integrity and trust.
International Journal of Communication Systems, 2005
The need to secure information systems and networked infrastructures is now commonplace in most enterprises. The use of novel communication technologies has became a crucial factor that can considerably improve or affect productivity. This is essentially due to the importance of the information transmitted across communication networks and stored in servers. As a consequence, strong ties are being built between security and the enterprise business activity. Risk management, which is the discipline that deals with this aspect, integrates a litany of architectures, techniques, and models that are described in this paper. A global view is proposed to the reader through a presentation of the research activity that has been directed towards this field. Copyright © 2005 John Wiley & Sons, Ltd.
— Software Defined Networking, the emerging technology is taking the network sector to a new variant. Networking sector completely focused on hardware infrastructure is now moving towards software programming. Due to an exponential growth in the number of user and the amount of information over wires, there arises a great risk with the existing IP Network architecture. Software Defined Networking paves a platform identifying a feasible solution to the problem by virtualization. Software Defined Networking provides a viable path in virtualization and managing the network resources in an " On Demand Manner ". This study is focused on the drawbacks of the existing technology and a fine grained introduction to Software Defined Networking. Further adding to the above topic, this study also passes over the current steps taken in the industrial sector in implementing Software Defined Networking. This study makes a walkthrough about the security features of Software Defined Networking, its advantages, limitations and further scope in identifying the loopholes in the security. Keywords— Software Defined Networking (SDN), Quality of Service (QoS), Transmission Control Protocol/ Internet Protocol (TCP/IP), Open Network Foundation (ONF),
2021
Network protection includes of the strategies and procedures implemented in this paper to avoid and monitor intrusion attempts, infringement, manipulation or violation of a computer system and services accessed by the network. Network protection applies to the different countermeasures put in place to secure or flow through the network and data collected on or through it. Protection for web applications is the method of securing websites and internet resources from multiple security attacks that target weaknesses in an application. Security for web apps is a data management division that primarily deals with the security of websites, web applications and web services. Risks to cyber security include a broad range of allegedly criminal practices on the web. For years, computer security risks against utility assets were identified, cyber-attacks arising from the exploitation of data device weaknesses by unauthorized access users This study is a cyber infrastructure assault, vulnerabil...
… in Mobile IP Based WLAN, 2 …, 2010
All input is evil until proven otherwise!‖‖so security technology come into play.With the rapid growth of interest in the Internet, network security has become a major concern to companies throughout the world. The fact that the information and tools needed to penetrate the security of corporate networks are widely available has increased that concern. Because of this increased focus on network security, network administrators often spend more effort protecting their networks than on actual network setup and administration. Tools that probe for system vulnerabilities, such as the Security Administrator Tool for Analyzing Networks (SATAN), and some of the newly available scanning and intrusion detection packages and appliances, assist in these efforts, but these tools only point out areas of weakness and may not provide a means to protect networks from all possible attacks. Thus, as a network administrator, you must constantly try to keep abreast of the large number of security issues confronting you in today's world. This paper describes many of the security issues that arise when connecting a private network. Understand the types of attacks that may be used by hackers to undermine network security. For decades, technology has transformed almost every aspect of business, from the shop floor to the shop door. While technology was a fundamental enabler, it was often driven from an operational or cost advantage and seen as separate from business itself. The new reality is that technology doesn't support the business—technology powers the business. IT risks are now business risks and IT opportunities are now business opportunities.
In addition to the advancement of the web, safety, as well as protection, came to be significant stress. Additionally, the background of security allows a much better understanding of the look of safety advancement. The net structure, on its own, enabled lots of safety threats to happen. The type of the world wide web, when regulated, can easily decrease the practical assaults that could be delivered throughout the network. Recognizing the strike techniques permits appropriate surveillance to surface. Many companies protect on their own, coming from the internet using firewalls in addition to the shield of encryption devices. Businesses make an "intranet" to keep connected to the internet but gotten from possible threats. This paper briefly discussed about the security threats, security vulnerabilities and advance network security policies.
2006
This article on cyber security has offered a highly decentralized communications model for processing risk-management information about critical information infrastructures, one that can be applied at both the international and national levels. Whereas security is typically regulated at the government level, cyber security is at once national, international, public and private in character. The urgent task ahead is to identify the key information flows that are required for cyber security and to establish linkages among the various organizational entities that can best collect and use this information.
Access to multiple cloud services, the geographic spread of enterprise Information Technology (IT) resources (including multiple data centers), and the emergence of microservices-based applications (as opposed to monolithic ones) have significantly altered the enterprise network landscape. This document is meant to provide guidance to this new enterprise network landscape from a secure operations perspective. Hence, it starts by examining the security limitations of current network access solutions to the enterprise network. It then considers security feature enhancements to traditional network appliances in the form of point security solutions, network configurations for various security functions (e.g., application/services security, cloud services access security, device or endpoint security), security frameworks that integrate these individual network configurations (e.g., zero trust network access [ZTNA]), and the evolving wide area network (WAN) infrastructure to provide a comprehensive set of security services for the modern enterprise network landscape (e.g., secure access service edge [SASE]). Keywords cloud access security broker (CASB); firewall; microsegmentation; secure access service edge (SASE); secure web gateway (SWG); security orchestration, automation, and response (SOAR); software-defined perimeter (SDP); software-defined wide area network (SD-WAN); virtual private network (VPN); zero trust network access (ZTNA). Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analyses to advance the development and productive use of information technology. ITL's responsibilities include the development of management, administrative, technical, and physical standards and guidelines for the cost-effective security and privacy of other than national security-related information in federal information systems. The Special Publication 800-series reports on ITL's research, guidelines, and outreach efforts in information system security, and its collaborative activities with industry, government, and academic organizations. NIST SP 800-215 Guide to a Secure Enterprise November 2022 Network Landscape ii Patent Disclosure Notice NOTICE: ITL has requested that holders of patent claims whose use may be required for compliance with the guidance or requirements of this publication disclose such patent claims to ITL. However, holders of patents are not obligated to respond to ITL calls for patents and ITL has not undertaken a patent search in order to identify which, if any, patents may apply to this publication.
2006
In a relatively short period, enterprise networks have evolved from small-sized LANs with simple architectures, to present day large networks with very complex architectures. Their topologies now include combinations of Local Area Networks (LANs), Wireless access networks, Metropolitan Area Networks (MANs), Wide Area Networks (WANs) and Virtual Private Networks (VPNs) that often span across multiple continents. Sustaining these highly interconnected, but also more dynamic and complex architectures currently occurs through the implementation of complex routing and switching protocols. Nevertheless, the increased network connectivity and higher availability have still not been sufficiently balanced by improved security. Threats from Viruses, worms, trojan horses and DoS attacks are still persistent, with rising tendencies in their sophistication and ability to spread. Mechanisms such as ACL, packet filters, firewalls, IDS and IPS, etc, put in place to curb these increased levels of threats and attacks have also caused the network to become inflexible, fragile and difficult to manage. This paper addresses issues such as trust, access control, complex routing and switching, and other forms of attacks that affect present day enterprise networks. It evaluates and analyzes current methods used to resolve these issues, points out their limitations and then proposes a new approach in dealing with the fundamental problem. It presents a newly designed protection architecture (SANE) for the enterprise network. This architecture is based on a single, logically centralized protection layer that is used to setup, secure and control all connectivities within the network.
The information security policy development lifecycle tend to lack focus on use of standard terms and semantics. This results in blurred outlines for monitoring, evaluation and enforcement of the security policy for the employees causing confusion in adhering and implementing it which leads to lack of process of publishing form the security policy, end user awareness, translation of high level policy to lowest level component configuration plans and actions to take in time of crisis. This leads to the critical need for the designing an empirically tested, comprehensive security policy design. This paper proposes bridging the gap between the high level information security policy descriptions with the low level network infrastructure security implementation. Background Objectives: With new and innovative technologies such as Cloud, Remote computing, Enterprise Mobility, e-commerce on the rise, network security has remained an ever increasing challenge. This paper presents a security framework to bridge the gap between high level specification requirements and the low level implementation phase for network infrastructure security using the network architecture model with the security policies associated with the network components required to be enforced. Methods/Statistical Analysis: To achieve the framework design, architectural model and a set of design-level security policies are taken into consideration. Also discussed are the advantages and desired characteristics of the model, relating to existing process worked in the design area; and future research directions are pointed. Findings: The current information security policy development lifecycle tends to have few disadvantages with the most critical being the overall lack of view of the policy. Typically a narrow view can be found when focusing only on development of the security policy documents and not including the actual practices for implementation or even maintenance of the security policies. This process does not address how the security policy would be development and enforced or even evaluated. The lifecycle designs usually focus on policy for development instead of focusing on development process of the information security policy. Application: Utilizing Hybrid cloud architecture design so that internet facing tiers tend to be public clouds and internal secure applications and database tend to be private clouds. This change in network architecture helps take on the volumetric network and application layer DDoS attacks to ensure the traffic reaching the internal network tiers is free from such attackers. Using Rate controls, built-in intelligent WAFs, Client Reputation monitoring, be used in combination as part of a comprehensive defense against all types and sizes of cyber threats
This book is intended to address important issues in the security and protection of information systems and network infrastructure. This includes the strategic implications of the potential failure of our critical network and information systems infrastructure; identifying critical infrastructure networks and services; analysis and risk assessment of current network and information systems infrastructure; classification of network infrastructure attacks; automating the management of infrastructure security; and building defense systems to proactively detect network attacks as soon as possible once they have been initiated. The chapters in this book are the result of invited presentations in a 2-day conference on cyber infrastructure protection held at the City University of New York, City College, on June 4-5, 2009.1 The book is divided into three main parts. Part I deals with strategy and policy issues related to cyber security and provides discussions covering the theory of cyberp...
International Journal of Advanced Trends in Computer Science and Engineering, 9(2), March - April 2020, 1583 – , 2020
Technology had been automated since the advent of the digital era. It paved the way to ease technical outages through manual resolution. While the globe is overwhelmingly dominated by technology, its growth remains dynamic. This study aims at improving the efficiency of existing IT security infrastructure processes and creating a malware detection system. The researchers gathered the data to IT staff and IT experts through face-to-face interviews, observations and questionnaires. Questions are about malware incident detection, data protection and reliability of the proposed program. The IT department wants a more effective program to manage these dilemmas, based on the study conducted. To counter this, the researcher built a system to upgrade their regular malware detector processing. The system would also be important not only for the client but also for other IT firms. Malware detector is handled properly and in a timely manner which reduces customer business costs. This study would also benefit not only the companies but also the clients.
International Journal of Safety and Security Engineering Vol. 10 , 2020
The Internet and related technologies have enabled companies to automate almost all of their operations resulting in enhanced efficiencies and cost-effectiveness. The technologies, however, have also introduced numerous security risks. Through security risks such as Electronic Hacking (EH), individuals and companies have lost a lot of valuable data and money. In this regard, there is a need to understand the extent of the threat of EH. A comprehensive thematic review and analysis of EH with a focus on developments, evolution, challenges, prognosis, and prevalence in select institutions was thus conducted. The research involved reviewing the literature on cybersecurity and its effect on organizations' operations. The result shows that cases of security breaches and associated costs continue to increase. Over five years, the healthcare and medical institutions were the most vulnerable. They were closely followed by corporations. The implications are that as institutions become more automated, their respective degrees of cybercrime vulnerability increase. The consequences of security breaches are normally dire for companies, as well as individuals. Millions, or possibly billions, of dollars worth of data, have been lost as a result of security breaches. This trend is expected to continue in the future, as computers and Internet technologies continue to advance. Through cybercrimes, numerous companies' operations have been sabotaged, and personal information from social media and email stolen. Long term, effective and sustainable strategies are therefore required. The paper is significant because it identifies the information security risks various organizations are exposed to and strategies that organizations can use to mitigate the risks.
Use and Analysis
The continuous deployment of network services over the wide range of public and private networks has led to transactions and services that include personal, and sometimes quite sensitive, data. Examples of services include: pay-per-view, cable telephony, bill payments by phone, credit card charging, and Internet banking. Such services require significant effort not only to protect the sensitive data involved in the transactions and services but to ensure integrity and availability of network services as well. The requirement for employing heterogeneous networks and systems becomes increasingly important, and as the view of traditional distributed systems has changed to a network centric view in all types of application networks, therefore, the complexity of these systems has led to significant security flaws and problems. Existing conventional approaches for security service development over such complex and most often heterogeneous networks and systems are not satisfying and cannot...
Computer Engineering and Intelligent Systems, 2023
In today's highly interconnected world, network security has become a critical aspect of protecting organizations from cyber-attacks. The increasing sophistication of attackers and their ability to exploit software and firmware vulnerabilities pose significant dangers to the security of networks. However, many organizations often neglect the essential steps required to secure their networks, leading to an increased risk of security breaches. In this research article, we aim to address this issue by investigating network security concepts, potential dangers, and practical defense strategies. We begin by exploring the different types of cyber-attacks and their sources, highlighting the various ways attackers exploit network vulnerabilities. We also examine the reasons why organizations often overlook network security and the consequences of not prioritizing it. To better understand the complexity of network security, we categorize the different security concerns using the CIA (confidentiality, integrity, and availability) triangle. This approach allows us to identify the various areas of vulnerability and their potential impact on network security. Next, we focus on the most crucial basic concepts and steps involved in various network security operations. We outline the best practices and practical approaches organizations can take to improve their network security, including implementing security policies and procedures, using encryption and authentication methods, and conducting regular security assessments. By highlighting the importance of network security and providing practical guidance on how organizations can defend against cyber-attacks, we hope to raise awareness and help prevent security breaches.
—Enterprise network (EN) supports thousands of users, and interconnects many networks. EN integrates different operating systems and hosts hundreds of servers that provide several services such as web applications, databases, E-mail, and others. Security threats represent a serious problem to EN. They try to damage enterprise confidentiality, integrity, and availability. Security provides protection against attacks, hacking, and data theft. In this paper, we propose a security model (SMEN) of EN. The proposed model provides security at different layers. It integrates both hardware and software security solutions. We perform a defense evaluation for the proposed model The results show that SMEN was able to detect and prevent all attacks and malwares that were induced by the framework Metasploit. Performance evaluation shows that applying proposed model has a little negative effect on bandwidth utilization and hence on network performance.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.