ReviewEssays.com - Term Papers, Book Reports, Research Papers and College Essays
Search

Network Security

Essay by   •  November 19, 2010  •  Research Paper  •  980 Words (4 Pages)  •  1,455 Views

Essay Preview: Network Security

Report this essay
Page 1 of 4

Network Security Paper

University of Phoenix

NTC/360

August 9, 2005

Installing firewall or anti-virus software on enterprise workstations can help prevent some of the security problems the Internet can cause; but not everything. By understanding the different Open Systems Interconnect (OSI) levels and security threats involved with each one of them, it is easier to plan a strategy to combat security problems.

Purpose and Scope

To cover all areas I have listed the network security measures that are associated with each level of the Open Systems Interconnect (OSI).

Physical layer

This layer is responsible for moving raw bits from one node to another: electrical impulse, light or radio signals. This layer represents the physical application security. It includes access control, power, fire, water, and backups. Many of the threats to security at the Physical layer cause a Denial of Service (DoS) of the enterprise application, making the application unavailable to enterprise users. To ensure this does not occur, the electrical and mechanical parts of the network are not only tested periodically but are kept safe from external damages like tampering or other physical destruction. The backups are in a secured room only few people have access to this room.

One method used to manage security in this layer is through Physical Layer Automation. By use of tools such as the Apcon's IntellaPatch™ line of copper and fiber Physical Layer switches, the network administrators have control and security at the foundation or physical layer of their network. With "wire once technology" built into every IntellaPatch switch, network administrators have the ability to manage and re-arrange the physical cabling topology of network closets or wire racks without the manual effort of pulling and patching a single wire. The network is cabled to IntellaPatch switches, then, using the graphical user interface (GUI) of Apcon's Control™ software, instantaneously configure and connect from any port to any other port without ever leaving your desk. Making changes to the network topology easy using these Apcon's IntellaPatch switches.

Security being top priority in networks, tools like IntellaPatch Physical Layer switches provide access control for both small and large networks. In large environments or multi-floor building environments where wiring termination points are scattered among various buildings or floors, managing and monitoring those facilities can be a tedious and cumbersome job. This is key for environments like manufacturing where there are multiple work shifts.

Data Link layer

At this layer data packets are encoded and decoded into bits. This layer ensures that everything sent was physically received. This layer encompasses switch security topics such as ARP attacks and MAC flooding. Simple configuration changes to the network switch can help protect enterprise applications from Data layer attacks. At my workplace only authorized users can have access to layer 2 software. The IT department has full control and determines when changes are made and who is authorized to do these changes. Other measures are taken like Shutting down unused ports in the VLAN and limiting the number of allowed MAC addresses by using port security mechanism.

Network and Transport layers

These layers handle the routing or forwarding of data. These layers are where the most common security precautions take place - this layer is where routers and firewalls are implemented. Examples of threats that occur at this level are unauthorized retrieval of endpoint identity and unauthorized access to internal systems. The company utilizes Network Address Translation, Access Control lists, and firewall technologies to mitigate these risks.

Session

This layer sets up, coordinates and terminates conversations, exchanges and dialogs between the applications at each end. This layer also sets up remote communication. At these layers the IT manager's

...

...

Download as:   txt (6.5 Kb)   pdf (98.9 Kb)   docx (11.6 Kb)  
Continue for 3 more pages »
Only available on ReviewEssays.com
Citation Generator

(2010, 11). Network Security. ReviewEssays.com. Retrieved 11, 2010, from https://www.reviewessays.com/essay/Network-Security/12916.html

"Network Security" ReviewEssays.com. 11 2010. 2010. 11 2010 <https://www.reviewessays.com/essay/Network-Security/12916.html>.

"Network Security." ReviewEssays.com. ReviewEssays.com, 11 2010. Web. 11 2010. <https://www.reviewessays.com/essay/Network-Security/12916.html>.

"Network Security." ReviewEssays.com. 11, 2010. Accessed 11, 2010. https://www.reviewessays.com/essay/Network-Security/12916.html.