Network Security
Introduction
Network security is the adoption of policies that help in the prevention and monitoring of unauthorized access to data and information (Hua & Bapna, 2013). In today’s world, technology is advancing greatly with ordinary people benefiting the most. The internet has seen a rapid growth and advancements. Many people are able to work swiftly and efficiently with technological tools like the computers, wireless connections, and the information that is gathered from sites through the internet. This is the good side of technology but the bad side of it is hacking. Through hacking, information is prone to fall in the wrong hands and the consequences might be grave. This shows that there is need to protect and secure information that is sent and received via the internet.
Vulnerabilities Assessment
The firm has shown to have network security problems that could be breached if no actions are taken to stop the possible hacking of the network (Vacca, 2012). Vulnerability results from the flaw or weak point of the organization’s entire security and network system that can be easily exploited. The vulnerabilities of this organization include wireless connection, email setup of staff through the company’s internet provider, use of standard websites to access emails, management’s use of iPad to access and respond to emails, application of wireless as the primary network connection, and peer to peer network. These vulnerabilities are easily exploited and the implications could be severe; for instance, the connection of the computers and printers to the wireless NETGEAR MR814 device. Netgear routers have been seen to be very vulnerable due to the flaws that have been exploited by hackers. The company’s Domain Name System (DNS) settings could be changed to a malicious IP address and the company’s data can fall into the wrong hands.
The email setup of the staff through the company’s internet provider shows a flaw that could be easily attacked (Song & Shen, 2010). With the compromise of the internet connection, emails for the staff could be redirected to other IP addresses that the hacker wants the information to go to. This is very dangerous as the information on clients’ accounts can be easily retrieved against the account holders’ directive. The manager’s use of an iPad to send and receive emails is also a risk that can be exploited. This is because the gadgets, for example, the computers, are left vulnerable to hacking and vital information leaked and sent to addresses the hacker designates. Access to emails through standard websites is susceptible too. Most of these websites have spyware, software that monitors the use of a computer by a user. Spyware can access and collect information from personal information to readdressing web browsers. Emails that have been accessed through standard websites can be exploited and the information of clients is hacked and directed to other IP addresses intended by the hacker.
The use of wireless network as the sole primary network connection increases the firm’s vulnerability and reduces efficiency. In situations where many people are using wireless networks, the speed of the network reduces; this is because of network interference. Due to the low speed, malicious software can be sent to the files and data could be lost. Peer to peer networking is the distribution of tasks between peers. Peers make a portion of their resources directly available to other network participants without the need for central coordination by servers. Peer to peer applications can be vulnerable. What makes it dangerous for peer to peer software is that its applications operate as the servers, in addition to the clients, signifying that they can be more susceptible to remote attacks (Vu, Lupu, & Ooi, 2009). Without a proper server, the firm is at risk of losing all vital information to hackers and this will cause irreparable damage.
Network System Security Recommendations
Network security requires identification and passwords for computer networks and systems that helps in authorizing and being able to access vital information. There are private networks and public networks; nonetheless, private networks are suitable for this firm as other networks are prone to malicious attacks. There are two types of attacks: active and passive attacks. Passive attacks could arise when a network intruder intercepts data traveling through the network while active attacks may happen when an intruder initiates commands to disrupt the network’s normal operations (Vu et al., 2009).
For this firm to curb possible hacking of its network security systems the assessed vulnerabilities need to be checked and a few recommendations implemented as discussed below.
- For the wireless network connection, updating the firm’s firmware will help. Constant update of the router helps if detection of redirected IP addresses is noted.
- A different cable of a higher speed would be an advantage. The Motorola sb3100 cable modem is quite slow for a Netgear router. Changing the cable will enhance the speed of the network connection thus increasing its efficiency.
- By setting up a windows server domain, access to files and other data will be safe especially to the firm’s employees. This will help reduce the risk of data being hacked or directed to other people’s IP addresses. With a server, authorization to access information will be required and failure to have a login id or password means one will not access the information.
- The manager has to be integrated in the server domain so as to protect the information he has access to. It would be difficult to hack a server domain as to get the primary source of information a hacker has to try really hard to get a code of the domain.
- Creation of a website. Website creation helps in redirecting attention of the hacker from the original information. By this, the firm gets to secure the original and important information by putting a website that has information that can help the public but prioritize and protect the original data by use of firewalls and other security systems.
Moreover, the firm needs to invest in securing the computer and network systems. The overall performance of the firm solely relies on the security of the clientele data. If information leaks to unknown persons, fraud is bound to take place and this could affect the firm and its reputation. Procuring systems and equipment will be beneficial to the firm too. Upgrading from old and slow systems will be a plus. This will help in eradicating the risks and dangers of information falling to the wrong hands. Investing in a firewall is recommended. A firewall denotes a system that checks and manages the received and leaving network traffic rooted in programmed security regulations. This means a firewall will establish a barrier between a secure, trusted internal network and another outside network that is assumed not secure and cannot be trusted (Marsa-Maestre, De La Hoz, Gimenez-Guzman, & Lopez-Carmona, 2013).
There are four types of firewall that they firm could choose from; they include network layers (packet filters), application layer, proxies, and network address translation. However, the best type of firewall for the firm will be the Network Address Translation. This basically refers to the masking of the Internet Protocol (IP) from a private network IP address to another IP address. Network address translation is the common method of masquerading IP addresses. Internet connection is seriously influenced by the use of this translation. Careful implementations are required for this translation as they vary differently according to particular behaviors and network interference. The details of the network address translation are usually not acknowledged by sellers of gadgets having implementations (Amutha & Rabara, 2015). The best configuration for the network address translation for the firm would be the full cone NAT, commonly known as the one to one NAT. Full cone NAT is when an internal address is mapped to an external address. Packets from the internal address can be sent through the external address. Any external host could send information to the internal address through to the external address.
Other than the Netgear router, a different cable modem with exceptional speeds is required. With a cable modem that has fast speeds, the firm will be able to competently and properly monitor the network and computer systems. A high speed cable modem with a Netgear wireless router will boost the firm’s internet and will also work efficiently with the windows server domain (Amutha & Rabara, 2015).
Application/ End User Security Recommendations
Applications that the end-user can use to reduce the risks of hacking and losing vital information can be taught to the user and train a user on how to approach a potential risk. By educating and training a user on the potential risks of network security breach and computer security systems, value is added and exceptional care will be taken while using the computers, accessing data and sending vital information. A computer that has a proper authentication mode is the best (Amutha & Rabara, 2015). This makes the user be aware that he/she is the only person who has the authorization and password to the computer. This shows that there is some sense of responsibility. This also minimizes the risk of hacking as it would be hard for hackers to try and hack into a system that has an authorization password.
When there is no moving of data, the data is very much protected from hackers (Marsa-Maestre et al., 2013). This is because data that is at rest is quite hard to be hacked. Users should learn how to shut the computers safely so as to reduce the chances of losing data. When a computer is safely booted, the information that was on the computer’s database is saved and stored and is free from malware and spyware. For the installation of applications that detect spyware, the user can detect and prevent spyware from the computer to avoid loss of data and vital information. Detection of such spyware helps the firm to put up or install firewalls that can easily prevent the loss of data hence save important files.
Conclusion
The protection of the network security systems of a firm is vital to its success. The firm should invest in improving the security systems and computer systems by implementing the given recommendations. Important and crucial data can be saved if the implementations are followed and the firm’s reputation will also be increased.
References
Amutha, J., & Rabara, S. A. (2015). An Integrated Secure Inter-mobility IPv4/IPv6 Address Translation Architecture for Corporate Networks. International Journal of Future Computer and Communication, 4(5), 316.
Hua, J., & Bapna, S. (2013). The economic impact of cyber terrorism. The Journal of Strategic Information Systems, 22(2), 175-186.
Marsa-Maestre, I., De La Hoz, E., Gimenez-Guzman, J. M., & Lopez-Carmona, M. A. (2013). Design and evaluation of a learning environment to effectively provide network security skills. Computers & Education, 69, 225-236.
Song, L., & Shen, J. (2010). Evolved cellular network planning and optimization for UMTS and LTE. Boca Raton: CRC Press.
Vacca, J. R. (2012). Computer and information security handbook. Oxford: Newnes.
Vu, Q. H., Lupu, M., & Ooi, B. C. (2009). Peer-to-peer computing: Principles and applications. Berlin, Germany: Springer Science & Business Media.