Unit 3 Network Security and Traffic MGMT 4
Unit 3 Network Security and Traffic MGMT 4
Learning Objectives
At the end of the session, the students should be able to:
1. Define Network Security and Traffic Management
2. Define Network Policy
3. Discuss the role of Network Policy
4. Explain security policies that are the basis of security for your company's
technology infrastructure.
________________________________________________________
________________________________________________________
________________________________________________________
Introduction
The protection of the computer network consists of steps taken by corporations or some
organizations to track and avoid unauthorized access by external attackers.
Depending on the scale of the computer network, distinct approaches to computer network
security management have distinct criteria. A home office, for example, requires basic
network security, while large organizations need high maintenance.
The Network Administrator manages access to the network's data and applications. A
network administrator assigns the approved person the user ID and password.
Presentation of Contents
Network security is a broad term that covers a multitude of technologies, devices and
processes. In its simplest term, it is a set of rules and configurations designed to
protect the integrity, confidentiality and accessibility of computer networks and data
using both software and hardware technologies. Every organization, regardless of
size, industry or infrastructure, requires a degree of network security solutions in
place to protect it from the ever-growing landscape of cyber threats in the wild today.
Today's network architecture is complex and is faced with a threat environment that is
always changing and attackers that are always trying to find and exploit
vulnerabilities. These vulnerabilities can exist in a broad number of areas, including
devices, data, applications, users and locations. For this reason, there are many
network security management tools and applications in use today that address
individual threats and exploits and also regulatory non-compliance. When just a few
minutes of downtime can cause widespread disruption and massive damage to an
organization's bottom line and reputation, it is essential that these protection measures
are in place.
Network security
With policies in place, any violations can be easier to detect. Security is more easily
enforced, threats more quickly contained, and risk rapidly reduced with security-
related policies.
Role of the Security Policy in Setting up Protocols
Following are some pointers which help in setting u protocols for the security policy
of an organization.
User policies
IT policies.
User policies generally define the limit of the users towards the computer resources
in a workplace. For example, what are they allowed to install in their computer, if
they can use removable storages.
Whereas, IT policies are designed for IT department, to secure the procedures and
functions of IT fields.
General Policies − This is the policy which defines the rights of the staff and
access level to the systems. Generally, it is included even in the
communication protocol as a preventive measure in case there are any
disasters.
Server Policies − This defines who should have access to the specific server
and with what rights. Which software’s should be installed, level of access to
internet, how they should be updated.
Firewall Access and Configuration Policies − It defines who should have
access to the firewall and what type of access, like monitoring, rules change.
Which ports and services should be allowed and if it should be inbound or
outbound.
Backup Policies − It defines who is the responsible person for backup, what
should be the backup, where it should be backed up, how long it should be
kept and the frequency of the backup.
VPN Policies − These policies generally go with the firewall policy; it defines
those users who should have a VPN access and with what rights. For site-to-
site connections with partners, it defines the access level of the partner to your
network, type of encryption to be set.
Structure of a Security Policy
When you compile a security policy you should have in mind a basic structure in
order to make something practical. Some of the main points which have to be taken
into consideration are −