Preview

Internal Network Security

Powerful Essays
Open Document
Open Document
1463 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Internal Network Security
Introduction
The development of technology has brought Internet to become the mass communication media between people or companies. Through Internet, people can communicate with other people in various places. Companies can get many advantages by using Internet network to support their business. Therefore, companies are trying as hard as they can, and give high effort in protecting their network from attack and make sure that they have the best network security.
Most people think that the threat of security attack is only come from outside the company. In fact, the attack from inside the company network is more harmful with high frequency to be happened. As written by Cryptek (2001), which based the argument from some articles, that threats from inside are far more dangerous than attacks from outside, and even FBI also stated that the average cost of an insider breach is $ 2.4 million while the average cost of a break-in from the Internet is $ 27,000.
All the facts above show that company must also think how to defend their network security from inside intruders, and not only concern about put firewall to protect their network security from outside. Companies must find way how to protect their information assets from attack, and make their network security is effective to block the threats either from outside or inside company.

The Importance of Internal Security
There are some reasons why inside intruders are as harmful and dangerous with outside intruder. It is because, for some organizations, especially big one, to support their company’ business, their facilitated their partners, customers, relations with the easiness technology can offer such as remote offices, mobile customers. All of the facilities boost up the use of corporate LAN increase, which resulted the increase of internal security threats, vulnerabilities to be attack by either outside or inside intruders.
As written in Cryptek (2001), there are some problems make the inside network



References: Anonymous (2002), “The Nuts and Bolts of Network Security”, [Online], Available : http://www.aquilagroup.com/network_security101.shtml, (2002, February 12). Cryptek (2001), “An Inside Out Look at Enterprise Security”, [Online], Available: www.Ciscoworldmagazine.com/webpapers/2001/12_cryptek.shtml, (2002,February, 08). Netmaster (2000), “Some history about firewalls and the Web”, [Online], Available: www.ciscoworldmagazine.com/webpapers/2000/09_netmaster.shtml, (2002,February,09).

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Between every network and the outside host of threats there is a first line of defense. For almost every network this will be a firewall. A firewall can be both hardware and software and is usually a combination of the two. A firewall creates a barrier between networks. Any outside computer or client must pass through the firewall to access the network or its resources. Only a computer or system that has proper access can easily access a network protected by a properly configured firewall. Though it is not infallible, a firewall is the first and perhaps best means of security…

    • 855 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    NT1330 Unit 3 Assignment 3

    • 1030 Words
    • 5 Pages

    Firewall these devices are designed to keep threats out of the company network, but unfortunately, the devices are configured by humans which can have error or security risks put in place to take over the network.…

    • 1030 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    The best network design to ensure the security of Corporation Techs internal access while retaining public Web site availability consists of several layers of defense in order to protect the corporation’s data and provide accessibility to employees and the public.…

    • 1214 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Keeping our LAN under lock and key prevent tampering of with the networks hardware. Access to the LAN devices is the easiest way to compromise a network. By also applying strict monitoring controls and current security updates are excellent security measures to implement.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    It255 Assignment 8

    • 309 Words
    • 2 Pages

    The more time you spend hardening your network, the safer it will be for not only your customers but your employees as well. Your Human Resources department will undoubtedly have confidential personal information on file for every employee. This could include social security numbers, information on dependents, emergency contacts, home addresses and telephone numbers, etc. That information will most likely be stored in an electronic format somewhere on your network. Keeping that information safe and secure from prying eyes should be a…

    • 309 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    Oppliger, R. (1997, May). Internet security: firewalls and beyond. Communication of the ACM Volume 40 Issue 5, pp. 92-100.…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Currently the security for the internet server and the location of it in the network is not as protected as it should be and it is not the best design either. The internet server must be located out of the company firewall to protect the systems and network internally. By doing this it separates the remote server system the system has proper validation and connection through the system allows access to the rest of the network. Staffs that are located in the firewall can authenticate through a proxy system and then access the internet, which in turn allows them to communicate…

    • 560 Words
    • 3 Pages
    Good Essays
  • Good Essays

    To secure the network and ensure a degree of protection from external intrusion, the first step is to ensure it is a private network and each host in the different remote locations is part of the private network; this minimizes the intrusion from public networks. Through the use of firewalls in the central computer network enforces authentication of all users in the network thus minimizing internal and external unauthorised access (Stallings, 2007).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Ing Life

    • 572 Words
    • 3 Pages

    Securing Internet connection a variety of overlapping security mechanisms will be equipped to guarantee the security of the Internet connection. Common mechanisms include: firewalls, packet filters, physical security, audit logs, authentication and authorization. At the same time, technicians also need to implement packet filters to prevent the Internet routers from the DoS attacks. DoS attacks…

    • 572 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 4

    • 581 Words
    • 2 Pages

    In User Domain the people are often the weakest link in IT security. In Workstation Domain is vulnerable if not kept up to date. In LAN-to-WAN Domain IP addresses are accessible from anywhere in the world, and attackers are constantly probing public IP addresses. They look for vulnerabilities and when one is found, they pounce. In Remote Access Domain is vulnerable to authentication because when the user provides credentials to prove identity, if found the attacker can later use them to impersonate the user. Also when data is passes between the user and the server. In WAN Domain is the same vulnerabilities as LAN-to-WAN Domain. In System/Application should remove unneeded services and protocols, change default passwords, and regularly patch and update the server systems.…

    • 581 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Stavrou, A., & Institute for Security Studies (South Africa). (2002). Mission Impossible? : E-Security In South Africa 's Commercial And Financial Sectors. Pretoria, South Africa: Institute for Security StudiesRufi, A. W., & Cisco Networking Academy Program. (2007). Network Security 1 and 2 Companion Guide. Indianapolis, Ind: Cisco Press…

    • 1233 Words
    • 5 Pages
    Powerful Essays