The Major Project

 


                            

                            Network Security

                                                             

                                             Introduction

     
You’re 
     The meaning of the Network Security can be summarize  in few words, as the ability to providing high levels of optimization and created confidentiality , authentication and integrity, that includes de configuration of the computer system. The network Security focus also in variety of aspects as the intrusion ,analysis, detention and traffic, as Mohammed,Kabiru, Hassan Abubakar and Yusuf Mohammed sad, on Network Security we have to implement, identify and access management system using the lightweight access directory protocol.
  The security in our digital world is a really important concept  when comes to protect private information  of personal  on date base, this fact is more visual in organization , therefore as the technology improves the level of security have to develop aswell. The most important point in network security is block any type of unauthorized devices to reach a Network.
                                                              

                                                                  (perimeter21,2022)                            

                                              

                                             Main body


      The tool we can use to secure the Network, is measuring the disability or the confidentiality of large numbers of Network configurations to be able to secure them. That can be, work or estimate the weak level of the Network optimization, so basely  that allow the administrator  to select the best option , that action will be the key  to Secure a Network.
    We can mentioned  different  types of  Network Security;
  
 .Access control- block the access of the unauthorize users and also, protect the Network of any attack.
 
.Application security- track the accessibility and vulnerabilities and secure the hardware and software.

.Firewall- this device act like a filter, decide ,it can allow and blocking traffic.

.Virtual Private Network(VPN}- Secure the communication and the Network in all internet space.

.Intrusion prevention system-Those are type of systems Network that identify also block hackers by scan network traffic.

  As we can see those are the ones of the many ways to security the Network, in that point this will be important for cyber security, because will block  and defend against any external attack, creating a strong Network therefore  is important  to Selecting the best and powerful  security system against the cyber attack, would be the key for success, that can be provide in efficient way, using firewall, on this point of view software engineering design firewall policy is set  of codes. So the consistency of security policy and firewall policy is the method verify the 
security level of satisfaction .
Normally the WAN covering a a large area of    Network, like  a Metropolitan area and the LAN covering a Network local area and allow to communicate in consecutive devices , also the Network collection is made by interface devices.
  The security  is made base on traffic and can be applied from LAN zone to the WAN zone or vice verse , the router created a zone for traffic itself and can be made automatically therefore the firewall will figure out and then to apply to traffic, therefore we need zones in pairs to configure the global zone security. The Network security, concentrate more in single broadcast LAN, this measure is made  by identify possible Network attack , that can be made by compare the usage of the Network and determinate by the history profile then calculate the possibility of  violation been occur. The authors Heberlein,LT; Dias,GV; Levitt,KN; Murkherjee,B; Wood, J and Wolber, D, refer that, "several Network attack has been simulated  and refer to how the monitor has been able to detect those attacks are also analyzed" therefore it can be explain  that the  huge amount are detectable with monitor, can also be defeated , the main focus of Network is on integration , bate the host have to be based in the type of technics been used.
(Traitov, 2022)


                





                                        Conclusion

 
 

Network security has brought to our society, a quick development and attractive area of interesting, LANs, was the result of the rapidly develop when comes to protection and prevention securing the access in the flexible way, in a sort time of all information. When we take into consideration the fact of security builders providing confidentiality, integrity, authentication, it is meaning different and distant focus into the features of the Network security policy. 

Another point that we must give relevance, is the fact in security, issues are raised by using efficient technology, therefore is fundamental that the features are update regularly (find out the risks and vulnerabilities, improvement of the security, rising questions about legislative, legal, social, technical, and ethical such between privacy and security). 

The network as a conventional, requires considerable number of utilities, for this reason including much access, involve the implementation and the measurements to create a plan that can be used also be adequate to the right Security system. 

  While we develop good and sophisticated computer systems, the risks are high, it is important that those risks are covered by implementing a powerful security system. 

    The necessities due to the rapid growth of computer industries also the website. made that every day many experts in Network security have a Delph knowledge about the matter in the way to develop a good and appropriate Security system. 

 

Accordioning with International Conference on Computational Intelligence and Security (2017) they mention that the relevance for securing the network will most of the time be based on computer intrusion detention, traffic analysis and Network Motoring.  

 
 

  







                                                          References:
     

 Traitov, 2022. Cybersecurity and secure network concept. [image] Available at: <https://www.gettyimages.co.uk/detail/photo/cybersecurity-and-secure-nerwork-concept-data-royalty-free-image/1197780051> [Accessed 5 May 2022].

          MARIN, G. M,

     IEEE Computer Society's Technical Community on Security and Privacy

    In-text: (Marin, 2022)

    Your Bibliography: Marin, G., 2022. IEEE Computer Society's Technical Community on Security and Privacy. [online] Ieee-security.org. Available at: <https://www.ieee-security.org/> [Accessed 13 May 2022].


(Heberlein,, L., 2022. A network security monitor. [online] Ieeexplore.ieee.org. Available at: <https://ieeexplore.ieee.org/abstract/document/63859/> [Accessed 13 May 2022].


Kizza, J., 2022. [online] Amazon.com. Available at: <https://www.amazon.com/Computer-Network-Security-Communications-Networks/dp/1447145429> [Accessed 13 May 2022].


Mohammed, K., 2022. [online] Available at: <https://www.researchgate.net/publication/329353305_Identity_and_Access_Management_System_a_Web-Based_Approach_for_an_Enterprise> [Accessed 13 May 2022].


pirimeter21, 2022. Edge Security: How to Secure the Edge of the Network. [online] eSecurityPlanet. Available at: <https://www.esecurityplanet.com/networks/edge-security-how-to-secure-the-edge-of-the-network/> [Accessed 13 May 2022].

    




Comments

  1. This needs a bit more information and include an image too to enance the overall outlook.

    In-text citatons and references need to be included in academic writing.

    ReplyDelete

Post a Comment