Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.
Running head: Network security Assignment1: Network Security (Student's Name) (Professor's name) (Course Title) (Date Of submission) 1 NETWORK...
With the rapid advancement in technology, the security of the network infrastructure has become undermined in the sense that people are also increasing developing new techniques of attack. Examples of the threats to network infrastructure are unauthorized access, computer misuse, malware etc. Network security which are measures developed to protect these infrastructure against these threats/attacks. Whenever you are designing the security technique to employ in your organization, you should evaluate which are the vulnerabilities within your system.
The strategies of network security are mainly divided into two main categories; that is the in depth and layered security strategies. These two security strategies are very different based under the concept each security strategy employ. The in depth security strategy creates a large scope of the areas you are supposed to cover in the network security while the layered security strategies helps in protection of all your information and technology resources. The in depth focuses in causing the delay and hindering the threat until they can be fully destroyed while the layered focuses on use of multiple security to protect the entire system.
Defense in depth security strategies
In the defense in depth involves putting in place security devices that will ensure the protection, will detect and respond to any of the threat on our system.eg the intrusion detection systems, the firewall etc. which helps in the protecting of the system against intruders, the in depth defense strategy helps in reducing the percentage of success of any attacker, hacker or intruder. These mechanism helps the network administrator in identifying person who are trying to compromise the network.
By any chance if the hacker is able to gain the access to the system, these strategies will help in reducing the impact of the attack plus give the network security personnel time to come up with new measures to prevent such an attack from happening again. The in depth security strategies employs multiple level of protection such that if the attacker is trying to gain access to the one level they will have to go through another level such that they are detected blocked and delayed before they fully gain access to the system. Some of the strategies of the in depth security strategies are the firewalls, antivirus software anti-spyware programs, biometrics and the intrusion detection systems. Some of the mechanism employed in the in depth strategy are: Installation of an antivirus software-these will prevent your system from being attacked by virus and malware and alert you when the virus and the malware are about to attack, Creating strong password for your accounts and the network devices, Installation of a virtual Private networks account to a wired router.
Advantage of in depth security strategy.
Defense in depth security strategy gives quick notifications and responds faster whenever the attacks and the threats are underway and helps in the delay and minimizing of the impact of the attack or the threat.
It is able to take advantage of the threat delay which helps n the mitigation for the attack.
Balance between the organizations needs to function effectively and the security needs. As every system software and application will require the user to be authenticated, if the authentication is too complex it will be very hard for any user to use it. On the other hand if the authentication is too little this will give an opportunity for the bad guys to penetrate the system, therefore the authentication is made complex which makes it very difficult for any user to access the system or the application from which they end up not completing their duties as the spend most of their time requesting for the assistance.
Balance of the protection capability and the cost -a company cannot spend all its finances in deployment of the most expensive security tools. It will only require decisions on how to prioritize on the spending of the organization.
Defense in layered security strategy.
Layered security strategies involves the use of a variety of components in the protection of activities on multiple areas of the network or the system from different attacks and threat such as theft of data, malwares and unauthorized access to the system, these method argues that there is no strategy that can fully safeguard your system. Layered security strategy tries to solve problems of different kind of attacks. The layered defense strategy should be able to provide protection in the following layers, the system level security, application level, the network and in the transmission level security. Each of the layer is designed to protect the system from a specific attack. These are the examples of layers that can be used in your network security, web protection, data protection, digital certificates, control of privacy of the information and data.
It is able to eliminate any kind of threat in ever layer of the system. In general this defense mechanism does not try to specify the kind of the attack the system is experiencing but instead takes it as a threat to the whole system therefore tries to cub it
With one component of tool to deal with the attacks, the information technology resources which helps in improving the security profile of our organization.
By using the layered defense you are only able to protect the data and the information above each layer and not below every layer, therefore the data and the information below the layer are still at risk.
As an organization continues to add more security controls on different layers, controls will make the performance of the system to be poor and also make it difficult for the user to us the system.
Each technique of the above security strategies must be tested before their use to ensure that their installation will not interfere with any of the system operations. Every organization has its own security and information need which will help it in choosing the appropriate security strategy.
Stallings, W. (2017).