Implementing and Managing Network Security
John Smith
CIS -125 Telecommunication Concepts
Prof.
Summer 2010
ASA College, New York
Table of Content
Introduction………………………………………….page 3
Security Principles………………………………......page 4
Managing Security……………………... ………..... page 5
Management Support Effective Security …………...page 6
Intrusion Detection ………………………………….page 7
Window Security…………………………………… page 8
Web Security……………………………………...... page 9
Security policy …………............................................page10
Conclusion………………………………………......page 11
Bibliography………………………………………..page 12
Web reference……………………………………....page13
Introduction
The network security is one of the most complex subjects that it is delivered for the most brilliant people who dedicate their lives to protect and also to damage the security network and still information from your computer. The reason which more people is attack and affected it is because they don’t know how to prevent. So now people are more aware about this kind of threat and they are learning about everything that it is related to the security and how to use it. This are some of the things that you must know very well before you do something in the system because it is save you a big pain later if you don’t know how to use. So, some of the things that you can implement are the security principles, mange the security network, how to detect the intrusion in the system, windows and web security and also the most important the police security for the network. Furthermore, sometimes it is very difficult to analyze which security it is the best because with the best security also you can get any intrusion that into the network systems. So the best way to prevent that something happened it is to read all the policy that show up every time that appears on the system or at any program that you are trying to download because if you don’t know if the resource it is reliable may be you get on risk to get and intrusion on your computer.
Security Principles
Security Basic
It is not possible to protect everything unless we know what exactly we want to protect. Some organization should have some resources, assets and any kind of systems to try to protect their system considered. For example, router, servers, workstations, switches, hut and networks links. Also, other important task that include this kind of basic security relay on the documentation equipment located like the UPS system and the HVAC( Heating, Ventilating, Air Conditioner) system. So most computer will have to storage everything on at backup such as UPS which may be part of the network that organization manage.
Another type of security basic it is to know what kind of risk you can get from different threats. Most of the potential “threats” came from internal and external sources. For example, external threats could be email with virus, network virus, web server attack and internal threats could be web base virus, network use attack and also email with virus (internal use). In this kind of threats the best way to protect it is to use the firewall because block some network traffic to the destinations. This includes the IP address and the particular service network port.
Basic Host Security
The basic host security it is to maintain the service lockdown the system and turning off the service reduce the exposure to an eminent attack, so desktop and server can run the basic fire wall software to protect and block the unnecessary IP ports on the host or restrict access from certain hosts. Another type of basic host security and maybe the most attack it is your email, so the best way to protect your emails is using a good user name and a difficult password that you can remember and also it is a great if you can change some time so that can reduce the problem to receive any threat or any kind of stole personal information. So now the computer came with some policies