Saturday, September 7, 2019
Network Security Planning Research Paper Example | Topics and Well Written Essays - 500 words
Network Security Planning - Research Paper Example Over the year network infrastructure has always been suffering major threats and immeasurable attacks of the data panel. The following has been established as the major threats to the network infrastructure: In order to secure network infrastructure one must secure and manage the access of such infrastructure devices. Compromising with the infrastructure devise access, compromises the management and security of the entire network. This calls for the establishment of critical and suitable controls necessary to curb unauthorized invasion to the infrastructure devices. Network infrastructure devices aims at providing a wide range and different variety of access protocols. This includes asynchronous and console connections, In addition to protocols based on remote access such as HTTP, Telnet, rlogin and SSH. Therefore, every infrastructure device should be skillfully configured and reviewed to ensure that only allowed access procedures are enhanced and that they are thoroughly protected. Enhance confidentiality of data- protect all the sensitive data stored from copying or viewing. Protect all the information in a communication channel from session hijacking, sniffing, and man in the middle attacks. Cisco safe architecture, like any other network security system, is not immune to limitations. However, it has successfully developed threat mitigation and detection programs readily available on Cisco security agents, Cisco firewalls, Cisco network admissions control, and Cisco IPS and web safety appliances. In addition, these devices alerts and generate information centrally gathered and correlated using the Cisco security monitoring, analysis and response system which recognize the source of threats, envisage the attack route, give the possible suggestions and sometimes optionally implements the response actions. The visibility of Cisco IPS reduces many instances of false positives thus allowing for dynamic quarantine impositions of unsecured
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.