Network Security Concepts

Topics: OSI model, Public-key cryptography, Certificate authority Pages: 5 (1883 words) Published: November 20, 2005
Network Security Concepts
Name
NTC 410
Instructor's Name
November 1, 2005

File security falls into two categories, encryption and access. Access to files can mean physical access to a computer with unsecured files or access via user permissions or privileges in the form of access control lists (ACLs) (Strengthen Your Users' File Security, 2003). The files kept on a server with NTFS storage can be locked to prevent anyone who does not have the correct permissions from opening them. This is secure but can be bypassed with physical access to an open computer and should not be used for sensitive information. The other method of securing files is by encrypting the information in the files using an Encrypting File System (EFS), which employs public key encryption privileges (Strengthen Your Users' File Security, 2003). A firewall prevents access to an internal system from the outside the company via the internet on any open ports. A firewall will also prevent internal network users from accessing certain internet sites which could be dangerous or offensive (Shay, 2004). The firewall acts at the OSI model's layers three and four by searching packets for certain types of headers (Shay, 2004). So, firewalls differ from file security because anyone inside the company can theoretically access files behind the firewall, while file security provides internal security against a company's own workers. Symmetric and asymmetric encryption differ from each other in that with symmetric encryption, the same key is used for both the encryption and decryption process. With asymmetric encryption, the keys are in pairs but are not the same, and one is used for encryption and another for decryption (Matuszek, 1999). Symmetric encryption is simple and faster than asymmetric encryption, with the security of the key being directly related to the length of the key. Asymmetric encryption has one key that is known only to the person receiving the encrypted data, which does not have to be shared with any users and one key that is public and known to many users (Matuszek, 1999). Secret and private keys are very similar and are often used interchangeably. The difference is that secret keys are used for both encryption and decryption, while a private key is part of the public/private key system and is used only for decryption (Cryptography, 2005). In both cases, the key may be known only to a single person or a limited group of people in order to keep the key secure. Public-Key Infrastructure (PKI) is a method of verifying users on a network, while a digital certificate is a reference from a neutral company that confirms the identity of an internet site (Shay, 2004, p. 321) and (Tomsho, G., Tittel, E. Johnson, D., 2004, P. 378). The digital certificate is issued by a Certificate Authority (CA) such as Verisign, and a registration authority (RA) that acts as a reference to identify an entity to a user of the website, and uses a directory that holds the certificate and can revoke a company's digital status. The PKI technology is at the core of the digital certificates used in almost all transactions on the internet. The PKI uses a cryptographic key pair, one of which is public and one which is private, to authenticate the owner of the certificate (PKI, 2002). In each of the layers of the OSI model, there are security risks that exist and are developing now, and countermeasures to combat them. The physical layer is a layer that must be approached from a physical point of view, because access to this layer is most likely to come from outside the device level. The threats to the physical layer include people taking the equipment itself, traffic sniffing and wiretapping, loss of power or environmental damage from natural disasters (Reed, 2003). These threats can be combated by using identifying badges, locks and surveillance equipment to reduce the exposure of outsiders to the equipment as well as sniffer equipment to identify leaks on the cabling. To...

References: Aber, R. (2004, May 7). Network security basics. Retrieved on November 2, 2005 from http://www.ciscopress.com/articles/article.asp?p=170742&seqNum=2
Arizona enterprise architecture target technology table
Convery, S. (2004, June 18). General design considerations for secure networks. Retrieved on November 2, 2005 from http://www.ciscopress.com/
Cryptography
Frazier, R. (n.d). Security Frameworks. Retrieved on November 2, 2005 from http://www.ccc.de/congress/2004/fahrplan/files/89-security-frameworks-paper.pdf
Kozierik, A
Matuszek, Steve (1999, March). Encryption. Retrieved on October 31, 2005 from http://www.cs.umbc.edu/
Mitchell, R
PKI. (2002). Retrieved on November 1, 2005 from http://searchsecurity.techtarget.com
Shay, William
Song, K. (2004, February). The ABC 's of network security. Retrieved on November 1, 2005 from http://www.certmag.com/
Strengthen Your Users ' File Security with Windows XP Professional
TLS. (2005). Retrieved on November 1, 2005 from http://www.webopedia.com/TERM/T/TLS.html
Tomsho, G., Tittel, E
Vulnerabilities in TCP. (2004, April 20). Retrieved on November 2, 2005 from http://www.net-security.org/advisory.php?id=3243
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Security Proposal Essay
  • Network Based Intrusion Prevention System (Nips) Essay
  • Internal Network Security Essay
  • Essay about Riordan Security Issues
  • Industrial Control Systems (ICS) Security Market 2018- Market Dynamics & Drivers Essay
  • Preliminary Security Assessment Essay
  • Network Security Essay
  • Essay about Security Technologies

Become a StudyMode Member

Sign Up - It's Free