30480030480000University companies. This war called cyberwar. According to

30480030480000University of Business and Technology College of Engineering Information Security SE 541 Fall 2018Assignment IIStudent Name: Nayyar FadenID: QB0134Date: NOVEMBER 27, 2018Achieved Mark: ___ / 05Page 1 of 1Network SecurityINTRODUCTION”Cyberwar is the battlefield of now.” This was the response of Geoff Livingston, the president of Tenacity 5 Media, when he was asked about the future of the internet. He thinks that the battlefields in some countries around the world are real, but there is new kind of battlefields and wars that occur everyday and results a huge loss and damage between individuals and companies. This war called cyberwar.

According to some statics published by “The Identity Theft Resource Center,” most of the internet traffic of the world nowadays is done though mobile devices which results new issues for network. Another static shows that half of that internet traffic is done by different automated source like hacking. In 2018, the United States received 1579 reported data breaches.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

All these statics prove how important network security is. So before we continue, lets know what do we mean by network security. Network is any works, events, or even activates developed and designed to secure and protect the integrity which is safety, availability, and confidentiality which is the private of the network, including information and data of hardware and software. Network security controls and manages the access to the network by stopping and preventing any threat that is trying to access to the network. Network security has several types, some of them are access control, Antivirus software, Web security, Wireless security, Mobile device security, Firewalls, VPN, and IDS.

In this essay, I will be focusing on the last three types of network security by defining and explaining them.FIREWALLFirewall is a type of network security that watch for getting in network traffic and getting out of network traffic depending on a pack of rules and principles of security, it allows or denies a traffic to be access. Firewall is the very first type of protection in network security for over 20 years in internet.

Firewall has different types which are proxy firewall, stateful inspection firewall, unified threat management (UTM), next-generation firewall (NGFW). Let’s explain some of them.Proxy FirewallProxy firewall is an early type of firewall. It exists as a gateway for software from a network to another network. Proxy firewall provide discovering of the content and security by stopping and preventing any connection not with the network or outside the network.Stateful Inspection FirewallStateful inspection firewall check all of the state, port, and protocols allow or deny the internet traffic based on rules and context defined by the administrator. It also monitors the activities from the opening port of the connection until it is closed.

Firewall has several techniques to prevent harmful information, let’s explain some of them.Packet FilterIt checks each packet that enters or leaves the network and allow or deny it depending on user rules.Application Gateway: Proxy firewall uses this technique as I explained above. It applies security to specific application like FTP.Circuit-level GatewayIn this technique, packets can access between the hosts without any addition checking only when TCP or UDP connection is made.Proxy ServerAll the messages that entre the network or leave the network will be objection and the true network address will be hidden.507555561595Personal Computer0Personal ComputerHardware Firewall Network Diagram5084445643255Personal Computer0Personal Computer313499560960Hardware-Based Firewall0Hardware-Based Firewall2451735408940154051068580DSL ModemDSL Modem10801354089405143566040InternetInternetIntrusion Detection System (IDS)Intrusion Detection System is a system that observe and watch for network traffic for suspect activities and issues alerts and notification when an activity is discovered.

Even thought the main and primary job of IDS is to report of anomaly detection, some of intrusion detection system take actions like blocking traffic when they found anomalous traffic. On the other hand, even though intrusion detection system work for discovering malicious activities, sometime false alerts occur. For that reason, companies and organization need to adjust their IDS products while installation. Scene we talked about some false alerts, let’s know what the types of IDS alerts are:True Positive: Traffic is bad, an alert is raisedFalse Positive: Traffic is good, but an alert is raised.

True Negative: Traffic is good, no alert is raisedFalse Negative: Traffic is bad, but no alert is raised.IDS has several types, some of them are:A network intrusion detection system (NIDS) is deployed inside the network at some points where it can watch for the inbound/outbound traffic to/from all devices of network.Host intrusion detection systems (HIDS) has the ability to detect anomalous packets that are inside the organization, or that malicious traffic which NIDS couldn’t detect. HIDS deployed at all computers/devices in the network with direct access to both the internet and internal network.

Signature-based intrusion detection systems watch all the packets in the network and compare them with know malicious threat. This type is very similar to the antivirus software.This diagram of IDS is taken form juniper.netVirtual Private Network (VPN)VPN is a private connection or a private network over an open network/public network. VPN protects data integrity, availability, and confidentiality by using authentication and encryption. So to redefine the VPN we can say that it is a technology that creates an encrypted connection over a less secure network which is the public internet.

The most purpose of using VPN technology is to allow employees or branch offices to access corporate applications to transfer data through secure tunnel. To do that, VPN users use passwords and other identification in order to access to VPN server. There are different types of VPN, which are:Remote Access VPN: It allows access to internal corporate network over public internet and that reduces the long distance.Site-to-Site VPN: It allows multiple offices to be connected with each other over public internet and that reduces the dependencies on leased lines.Extranet VPN: It allows business partner to access critical information and that reduces number of transaction.Client/Server VPN: It protects the sensitive internal communications.VPN diagram taken from TOZNY.

comEnhancement Security System by using Next-generation firewall (NGFW).The technique of next-generation firewall combines all of Firewall including packet filtering, URL blocking, virtual private network VPN, IDS and other functions and features that are not found in traditional firewalls in order to enhance the security of the system. Next- generation firewall is the 3rd generation of firewall technology that implemented in hardware and software to detect and block advanced attacks by applying security polices at port, protocols, and applications. Next- generation firewall is used by most of the companies to prevent and block modern threats like new malwares and layer attacks. There are many benefits of next-generation firewalls, one if the important one is NGFW is able to block malware before entering into a network, which wasn’t possible before.As we mentioned before that NGFW and traditional firewall has the same purpose of protection organization’s network, but they have some several differences.

One difference is that NGFW inspect a deep packet that goes beyond simple port and protocol. Also. “NGFWs extend the traditional firewall functionality of NAT, PAT and VPN support to operate both in routed mode – when firewall is a router – and transparent mode – when firewall is a bump -.”REFERENCESRouse, Margaret. ” What is Firewall.

” TechTarget. Nov 21, 2014. Website. November 24, 2018.

Rouse, Margaret. ” What is intrusion detection system (IDS).” TechTarget.

May 25, 2007. Website. November 25, 2018.

Rouse, Margaret. ” What is VPN.” TechTarget. Jul 5, 2016. Website. November 26, 2018.LEE RAINIE, JANNA ANDERSON AND JENNIFER CONNOLLY.

” Cyber Attacks Likely to Increase.” Pew Research Center. Oct 29, 2014. Website.

November 24, 2018.consoltech. ” Network Security: What it is and Why it’s More Important Than Ever.” consoltech. Sept 12, 2017. Website.

November 24, 2018TABLE OF CONTENTSINTRODUCTION …………………………………………………………………… PAGE 1FIREWALL…………………………………………………………………………… PAGE 2IDS …………………………………………………………………………….……… PAGE 4VPN …………………………………………………………………………….………… PAGE 5Next-generation firewall (NGFW)……………………………………………………… PAGE 6REFERENCES ……………………………………………………………………….… PAGE 7

x

Hi!
I'm Mary!

Would you like to get a custom essay? How about receiving a customized one?

Check it out