6 Apr 2022

379

Computer Network Security

Format: APA

Academic level: College

Paper type: Book Report

Words: 871

Pages: 3

Downloads: 0

Network security refers to the following concepts; any protection of access, misuse of a computer network system, and hacking of directories in a computer network system. The most common forms of threat in any given network include the viruses, hacker attacks, spyware, identity theft, zero-day attacks, data interception and theft, worms and adware ( Huang et al 2015) . There is no single package of network security system that is capable of offering complete protection against every of the above listed threats. It is thus important to have and use multiple layers of security for any network.

Defense in Depth (DID) refers to the use of multiple layered security measures in protecting integrity of information in any information technology system. The aim of this method of data protection is to address the possible vulnerabilities that exist in technology, personnel and operations, physical security, technical, and procedural in the duration of the system’s life cycle. Defense in Depth is also sometimes referred to as Layered Security. The very idea of defense in depth is to use multiple defense mechanisms deployed in layers across a network infrastructure to protect the internal data, systems, networks, and users (Straub, 2003). “With defense in depth, networks are protected by using layers of detection and protection mechanisms such as firewalls, intrusion-detection systems, antivirus software, physical security, and an informed user base” (Bingman, 2016, p. 71). Multiple layered defenses are used in the network architecture as failsafe network design, so that if one defensive measure/layer fails, there are more back-up security layers that can continue to protect the assets ( Huang et al 2015) . The importance of implementing defense in depth is leveraged from the capabilities it offers, such as: 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Monitoring, alerting, and emergency response: Since the layered security architecture caters to an informed user database, deploying the user authentication is the first layer of security implemented in depth in defense strategy. This helps monitoring network activity based on authenticated logins and forceful intrusions.

Authorized personnel activity accounting: Individual user activity monitoring enhances the level of security for the network. Most systems provide an option of user and event logging in form of encrypted files or recordings.

Disaster recovery: In case of a security breach, an alert flag is triggered to the administrator informing the event details of security compromise, deploying a fallback option that continues to arm the architecture perimeter for any further illegal penetration.

Criminal activity logging, reporting and forensics: The user activity can be logged, which gives an added advantage of recording and reporting. In the event of an incident response call, these logs provide the necessary audit trail for forensic investigations and reprimanding the cyber-attack 

Some of other concepts that are involved in computer network security are physical security risk, cyber-threat and counter measure and are discussed below.

Physical security refers to the protection of personnel, network data, hardware and software from physical actions and occurrences that are capable of causing serious damage or loss to an agency or institution. It comprises all types of protection from physical threats such as fire, natural disasters such as floods, burglary, vandalism and terrorism. This type of security is often overlooked compared to technical threats such as cyberespionage (Oriyano, 2014). In addition, this type of security risk can be carried out with brute force and little or completely no knowledge on the part of an attacker. Physical threat has three important components, which are access control, surveillance and testing.

Cyber threat refers to the possibility of a harmful attempt to damage or distort a computer network or system. It is the adversary attempt to gain access to a system. There are many types of cyber threats. The top most common cyber threats include Social Engineered Trojans, Unpatched Software, Phishing, Network travelling worms and Advanced Persistent Threats ( Taylor et al 2014) . In 2016, Bob Gourley highlighted two technology trends that drive the cyber threat landscape. This includes the Internet of things and Explosion of data. The most common sources of cyber threats are Nation states or national governments, terrorists, industrial spies, organized crime groups, hackers and hacktivists, business competitors and disgruntled insiders. 

A counter measure is basically an action that is taken to counter a particular threat or danger. Apart from being an action, it can also be a process, device or system that can be used to prevent or mitigate threats to a computer, sever or network and its effects. From the given scenarios in the question, the following actions can be taken as counter measures of the given threats. 

Scenario 1: This type of threat could be considered a physical threat as it relates to unidentified people stealing ACME’s assets. A counter measure that could be used here is applying some type of physical constraint to the door as an electronic keypad lock or an employee card reader. In addition, security personnel can be employed to be physically present at the premises where ACME’s network equipment’s are being kept. CCTV cameras should also be installed to help in assistance to the security personnel’s in order to deal with the physical threat.

Scenario 2: This type or threat could be considered a cyber-crime or a cyber-threat. ACME could use antivirus software as a countermeasure to protect them from this type of incident ( Fritsch, 2014) . In addition, establishment of an extensive defense in depth security measure will be necessary in order to prevent the possibilities of future threats.

Scenario 3: This type of threat could be considered a physical threat as it relates to an angry employee who has done nothing so far but does have feelings off revenge towards ACME. ACME feels some trepidation towards what possible reaction the employee may have as well. Some countermeasures that ACME could perform are physically monitoring Robert and perform audits on his work computer to ensure that he is only doing work related business (Oriyano, 2014).

References

Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: An integrated model.  MIS quarterly 27 (1), 51-90

Huang, W, Tang, W, & Beedgen, C. F. (2015).  U.S. Patent No. 9,031,916 . Washington, DC: U.S. Patent and Trademark Office. 

Oriyano, S. (2014). Physical Security. In Cehv8: Certified Ethical Hacker Version 8 Study  Guide (pp. 393-409). Indianapolis, IN USA: Wiley  

Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2014).  Digital crime and digital terrorism . Prentice Hall Press.

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). Computer Network Security.
https://studybounty.com/computer-network-security-book-report

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Sociology

Group Facilitation: Engagement and Authority

PART1 This was a part of the first group therapy session of a group of individuals. The group had both men and women of different backgrounds and personalities. The observation parameters that govern this sort...

Words: 883

Pages: 3

Views: 123

17 Sep 2023
Sociology

Micro Client System

Discussion 1 In my career as a social worker, I have worked with client systems of all sizes. In their career and daily work, social workers interact with all client systems in assisting individuals suffering...

Words: 789

Pages: 3

Views: 177

17 Sep 2023
Sociology

Food Policy and Habits

The survival of human being depends on the food. Globally, food is known to be more than a source of nutrients and energy for human well-being. The food we eat, how we eat, who we eat with, when we eat, and what we...

Words: 382

Pages: 1

Views: 148

17 Sep 2023
Sociology

Culture, Ethnocentrism, and Cultural Relativism

Since the middle Stone Age, human beings are considered as social creatures, from those days people have identified and associated with each other as a community to live and survive. Common behavior and habits unite...

Words: 1321

Pages: 5

Views: 72

17 Sep 2023
Sociology

Client Population and Problem Addressed by the Program

A considerable number of Americans are not consuming the right amount of vegetables and fruits. As of 2013, about 13% of the entire USA population was consuming the required daily intake of fruits (one and a half to...

Words: 1367

Pages: 4

Views: 155

17 Sep 2023
Sociology

Community Observation: How to Get Started

The meeting attended was a legislative meeting of the Board of Directors of the School District of Cheltenham Township. The meeting was held on Tuesday, February 19, 2019, at 7:16p.m in the Administration Building,...

Words: 1513

Pages: 5

Views: 115

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration