Preview

Unit 8 Assignment 1 Network Hardening

Powerful Essays
Open Document
Open Document
601 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 8 Assignment 1 Network Hardening
NT 2580
Introduction To Information Security
Teacher : Mr. Timothy Tacker
Unit 8 Assignment 1 Network Hardening

Network Hardening
Network Layout 4 : VPN (Remote Access Domain) – Virtual Private Networks (VPNs) with VPN software and Secure Socket Layer/VPN (SSL/VPN) tunnels
A Virtual Private Network or VPN enables a computer or network-enabled device to send and receive data through shared or public networks as if it were directly connected to the private network, while it’s benefiting from the functionality, security and management policies of the private network. It was created to establish a virtual pint-to-point connection through the using of dedicated connections, virtual tunneling protocols or traffic encryptions.
Three Strategies for hardening the network environment
1 Firewall Friendly VPN
The increase demands of e-business come with a compelling requirement for data security. Virtual Private Network with IP Security Architecture (IPsec VPN) meets this requirement by providing end-to end encryption and authentication at the IPlayer and protecting confidential data that flows over possibly untrustworthy networks. IPsec has the advantage of a wide scope of coverage and agile granularity of protection; however, incompatibilities exist between IPsec VPN and the Network Address Translation (NAT) that firewalls use.
2 Security policy enforcement:

Means of enforcement of security policy should be a primary consideration throughout the research, test and implementation phases of any security technology. Careful research, review of manufacturer’s documentation, questions presented to vendors and manufacturers, and testing of the technology can serve to meet this criteria. Without a method of enforcement, effectiveness of security policy is questionable at best. While audit trails, hardware analysis and security logs should be reviewed regularly; it is a time-intensive process and this alone alerts the administrator to violations and security threats

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Router Management Out-of-Band Management Username and Password Authentication. Traffic VPN and Tunnel Based Traffic ACL and Tunnel Traffic Established Between Trusted End Points. UDP and TCP Protocol Enforcement with Stateful Firewall Access list Source and Destination, Address and Session established with Layer 7 Firewall Protection.…

    • 155 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Save Question 10 (1 point) IPsec is used for ________ VPNs. Question 10 options: A) remote-access B) site-to-site C) Both remote-access and site-to-site D)…

    • 268 Words
    • 6 Pages
    Satisfactory Essays
  • Best Essays

    Munasinghe, K. S. and Shahrestani, S.A.,“Analysis of Multiple Virtual Private Network Tunnels over Wireless LANs,” in Proceedings of the 3rdInternational Business Information Management Conference (IBIMA 2004), pp. 206-211, December 2004b.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    For the remote access domain, we need a secure VPN so that employees are not exposing sensitive data to anyone outside of our network. To do this everyone must authenticate to the system for authorization.…

    • 337 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Good Essays

    The Remote Access will provide the Virtual Private Networks with services that the users can use to access the corporate networks over the Internet as it they were directly connected. This remote access will enable the remote…

    • 623 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The core of a coaxial cable carries the electronic signals that make up the data. This wire core can be either solid or stranded. If the core is solid, it is usually copper.…

    • 4489 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Palmer, M. (2003). Guide to Operating Systems Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 21, 2009, from University of Phoenix, CMGT440.…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    VPN – virtual private network – it provides the functionality of a privately owned secure network without the associate costs of leased telephone lines, satellites, and other communication equipment.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Request for Proposals

    • 26335 Words
    • 106 Pages

    Section C – Technical Approach Section D – Security Gap Analysis Section E – Privacy Data Section F – Security Assessment Section G – Security Assessment Report Section H – Mitigating Risks Section I – BIA, BCP, and DRP Section J – Layered Security Solution 6.4 6.5 6.6 6.7 Cost Proposal & Scoring Guide Proposal Score Summary Matrix Reference Questionnaire Supplemental Templates…

    • 26335 Words
    • 106 Pages
    Powerful Essays
  • Powerful Essays

    Unit 4

    • 1878 Words
    • 8 Pages

    Security policy planners must consider and the tasks they must complete to deploy an effective security audit policy in a network that includes computers running Windows 7 or Windows Server 2008 R2.…

    • 1878 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    In today’s world, most businesses rely heavily on the use of information technology ad information systems. Corporate communication is usually dependent upon wired as well as wired networks within the company. With these networks being set up in businesses, there has been a major shift in data storage to using computers to store and transfer data instead of the traditional ways of using paperwork and hard copies. Companies can securely share information with other companies through the use of virtual private networks, called VPNs. My current occupation is very technologically driven.…

    • 791 Words
    • 4 Pages
    Good Essays
  • Good Essays

    References: Johnson, Rob. with Merkow, Mike. Security Policies and Implementation Issues. First Edition. Copyright © 2011by Jones & Bartlett Learning, LLC, an Ascend Learning company…

    • 577 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    focus today is on the big “I,” the public Internet and IP VPNs, to the exclusion of…

    • 12448 Words
    • 96 Pages
    Powerful Essays