Posted: March 26th, 2021

Network Security Essay

Network Security

Network Security
1. Introduction
The ever-growing security threats and the complexity of the threat environment require network security. Network security is a broad topic that involves rules, security protocols, and practices that protect data integrity. According to Francia et al. (2017), cybersecurity consists of complex security issues, such as phishing and malware attacks caused by the advancing technology in cryptocurrency and machine learning. Furthermore, network security utilizes both hardware and software in promoting confidentiality, availability, and data integrity. Network security management tools and application solutions are fundamental for every organization. This paper discusses various issues associated with network security.
2. Overview
Network security considers multiple aspects, including policies, hardware, and software control physical network security, technical network security, and administrative network security (Francia et al., 2017). Physical network security is designed to prevent access into restricted areas in the company, such as the accountant office. It uses strategies such as biometric authentication, controlled access, and authentication of information system devices. Network security concentrates on protecting various network segments, including protecting transactional data from the company to clients through the companies’ network (Pawar, Rabse, Paradkar, and Kaushik, 2016). Technical network security protects companies from being exposed to malicious attackers’ malicious activities, such as unethical employees who may intend to infiltrate the system and other internal attackers. Network security is also concerned with the organization’s administrative operations. The policies control and monitor employees’ and clients’ behaviors. This includes whether the company is authenticated enough, how employees access a certain type of data, and the changes made in the organization’s’ infrastructure.
Network security vulnerabilities are weaknesses that occur in computer networks and a company’s server. Examples include unresolved software developers’ issues, forgetting to update software hardware and weak security protocols. Network security vulnerabilities affect the organization’s data integrity, confidentiality, and availability (Pawar, Rabse, Paradkar, and Kaushik, 2016). The vulnerabilities or network vulnerabilities can pave the way for network security threats, such as malware, spyware, spam, botnets, and phishing. The top network security vulnerabilities include buffer overflow, unrestricted updates, Operating System command injection, lack of a data encryption protocol, and SQL injection (Pawar, Rabse, Paradkar, and Kaushik, 2016).
The most common types of network security issues include DOS, SQL injection attacks, Phishing, Adware, spyware, Man-in-the-middle attack, and a computer virus. A computer virus is a type of network security threat that is very common in the company since most activities are conducting through computers. According to statistics, 33% of computers are affected by viruses, spreading to all computer networks through data sharing. Viruses tamper with computer security settings, steal data, and corrupt a computer system (Pawar et al., 2016). For instance, viruses can lead to the loss of a company’s valuable data.
DOS and DDOS attacks are another common network security threat where companies’ servers become corrupted and overloaded (Francia et al., 2017). The traffic overloading may lead to crashing, mostly common in websites and applications such as transactional applications. Credit card fraud is a common security issue, especially where the new security system has failed to detect credit card fraud. However, the security systems tend to block any illegitimate activity or false-positive transaction. A DoS or DDoS occurs when a cybercriminal tends to overload the network system with traffic, hence unable to comply with companies’ clients’ requirements (Francia et al., 2017). Mostly, DDoS occurs when the information systems are connected to the internet, through packets, the network systems become flooded hence challenging to access services from transactional applications.
Phishing is another type of network security threat that focuses on obtaining credit, card numbers, and usernames. According to Francia et al. (2017), the attacker uses messages and emails that seem legitimate to users. However, the email or malicious link is used to compromise the companies network system, hence stealing valuable information. Another type of network security threat includes the SQL injection that target transaction applications and websites as a type of data-driven application. However, attackers use malicious codes to steal data, including stopping a transaction taking place in the company (Pawar et al., 2016). Furthermore, man-in-the-middle network security attacks include HTTPS spoofing, IP spoofing, DNS spoofing, WI-FI spoofing, and SSL hijacking.
3. Network Security Recommendation
The company line of business activity requires strict network security control, such as network access control, firewall protection, virtual private networks, and anti-virus software. A Virtual Private Network (VPN) would enable the organization to transfer value and sensitive information. VPN security is fit for the organization, especially in conducting business to wide area networks. The VPN uses third-party software and the native-operating system to enhance network security (Sharma, 2016). Additionally, the network system uses other security protocols, such as routers and firewalls. The security protocols can promote the company’s remote business of credit card transactions to far areas (Pawar et al., 2016). VPN can allow remote access to multi-office intranets and companies’ mobile devices as part of the VPN architecture solution.
The use of VPN and firewalls is the best security solution for the company. The firewall strengthens the network security strategy, monitors, conducts network access audits, prevents data leakages from the company’s data center, and acts as a barrier to network security threats (Sharma, 2016). All the company’s data between the internal and external companies’ network must go through the firewall before being allowed in or out. The firewall has a strong immunity that assists in blocking network security threats. The VPN server will act as the company’s IP address, which can only be used within the company, especially in hiding and protecting its identity (Sharma, 2016). VPN must work in handy with firewalls, although a VPN can work without a firewall. Mostly firewall deals with network traffic in the company, where a VPN with a firewall works better, especially in securing network traffic to avoid network security threats, such as phishing. A VPN detects and protects network security from damage, especially caused by the intrusion of threats.
Various types of firewalls used in network security include packet filtering firewalls, circuit gateways, hybrids, and MAC layer firewalls (Francia et al., 2017). It is recommended the utilization of the packet filtering firewall. This security feature examines the transmission control protocol, direction, diagram protocol, and internet protocol source and destination address. The packet filtering firewall would as sit in restricting unknown IP addresses (Sharma, 2016). The packet filtering would conduct a stateful inspection, which helps track network connections, such as transaction network activity, between the internal and external systems. The type of filtering conducts dynamic filtering, which is considered critical in urgent security situations. Dynamic filtering would assist the system with data issues by conducting updates and creating rules (Karhade, 2015). Static filtering would help unwanted filter packets into its network security and allow legit packets.
It is also recommended that the company use the remote access VPN. It will help secure the network between the clients, and the companies, transaction systems. The remote access VPN will also assist in accessing files, resources, and remotes from any location. It also assists in promoting privacy and security. I would recommend using the layer two tunneling protocol (L2TP), which works best when combined with an IPsec to secure the network connection and transaction data transferred through a network system (Karhade, 2015). A point-to-point tunneling protocol and a Secure Shell (SSH) would provide an encrypted network tunnel. Implementing the recommended VPN protocols and firewalls will start by considering training the employees on the security protocols and the need to have the security protocol, such as enhancing communication, security, and reliability. The implementation process should consider the five-layer structure comprised of the device interface layer, the common communication layer, the device logic layer, the function logic layer, and the user interface level.
4. Summary
Network security should be a high priority in the company, especially in organizations offering transaction services or companies holding valuable information. It protects the organization’s assets from internal and external attacks, where the security tools assist manage data transferred from the company to clients remotely. The best network security includes the use of VPN and firewalls, which protect them from cyber threats, vulnerabilities, and risks. Some of the network security threats include phishing, malware attack, and SQL injections. The organization should use the packet filtering firewall, which protects the company from malicious and unknown packets and IP addresses. The firewall also provides services such as dynamic filtering, stateful filtering, and static filtering. Finally, the organization can also use the secure shell VPN, the L2TP, or point tunneling protocol.

Francia, G., Ertaul, L., Encinas, L. H., & El-Sheikh, E. (2017). Computer and network security essentials. Springer.
Karhade, M. (2015). U.S. Patent No. 9,112,911. Washington, DC: U.S. Patent and Trademark Office.
Pawar¹, D., Rabse, S., Paradkar, S., & Kaushik⁴, N. (2016). DETECTION OF FRAUD IN ONLINE CREDIT-CARD TRANSACTIONS.
Sharma, S. K. V. (2016). A Security Solution for Wireless Local Area Network (WLAN) Using Firewall and VPN‖. Innovative Systems Design and Engineering, 7(7).


Order for this Paper or Similar Assignment Writing Help

Fill a form in 3 easy steps - less than 5 mins.

Why choose us

You Want Best Quality and That’s our Focus

Top Essay Writers

We carefully choose the most exceptional writers to become part of our team, each with specialized knowledge in particular subject areas and a background in academic writing.

Affordable Prices

Our priority is to provide you with the most talented writers at an affordable cost. We are proud to offer the lowest possible pricing without compromising the quality of our services. Our costs are fair and competitive in comparison to other writing services in the industry.

100% Plagiarism-Free

The service guarantees that all our products are 100% original and plagiarism-free. To ensure this, we thoroughly scan every final draft using advanced plagiarism detection software before releasing it to be delivered to our valued customers. You can trust us to provide you with authentic and high-quality content.

How it works

When you decide to place an order with Nursing Assignment Answers, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.