Week5_SP_DataComms&Networking
Week5_SP_DataComms&Networking
Network Security
IST 7040
Wilmington University
DATA COMMS AND NETWORKING 2
Introduction:
In order to protect the availability, confidentiality, and integrity of data within a computer
network, a variety of technologies, methods, and policies are used in a crucial and varied field of
network security. The demand for strong network security measures has never been greater in our
increasingly linked society, where enormous volumes of sensitive data are sent and stored
individual gadgets like computers and smartphones as well as entire corporate networks, cloud-
The threats to network security are numerous and always changing, ranging from harmful
software and unauthorized access attempts to highly technical cyber-attacks planned by nation-
states, cybercriminals, and hacktivists. Network security uses a mix of preventive measures, such
as firewalls, intrusion detection systems, and encryption protocols, as well as detective and
corrective procedures, such as log analysis and incident response plans, to counter these threats,
network security also entails continuous monitoring, vulnerability analyses, and routine updates.
Network security is extremely important since breaches can have serious effects, including lost
requiring a professional to stay informed about emerging threats and innovative security solutions.
A comprehensive understanding of network security is essential for safeguarding our digital assets
and preserving the trust and integrity and preserving the trust and integrity of our interconnected
world.
DATA COMMS AND NETWORKING 3
across people, process (operations) and technology (Q-CERT, 2008). Also, involves numerous
Firewalls, intrusion detection systems, and antivirus software are used in this first line of security.
These devices are placed at the network’s edge to keep an eye on and filter outbound and incoming
traffic. Network Security – Internal network traffic security is the main goal of this layer. To
prevent threats from moving laterally within the network, it comprises tools like network
segmentation, virtual LANs and access controls. Endpoint Security – Individual devices such as
desktops, laptops and mobile phones must be secured. It comprises safeguards including endpoint
Application Security – This layer is concerned with protecting the software and programs
utilized by an organization. Code review, application firewalls and routine security patching are
some of the procedures involved. Data Security – Data integrity and confidentiality must be
protected in this. To protect sensitive information, it consists of encryption, access controls- and
data loss prevention techniques. Physical Security – It’s also important to restrict and keep an eye
on physical access to network infrastructure. This includes security precautions including access
Security Monitoring and Incident Response – This layer involves continuous monitoring
of network activity for suspicious behavior. Regular Audits and Assessments – Periodic security
DATA COMMS AND NETWORKING 4
assessments, vulnerability scans and penetration testing help identify and address potential
vulnerabilities.
By employing these multiple layers of security measures, organization can create a robust
defense system that greatly reduces the likelihood and impact of security breaches and cyber-
attacks.
Layered Security:
Layered security refers to security systems that use multiple components to protect
operations on multiple levels, or layers (Amy Mersch, 2021). This strategy attempts to strengthen
the security posture’s redundancy and resilience. It involves the implementation of multiple
security measures at various levels, creating a series of defensive barriers. It can detect, slow down,
or delay the attack. It is done to ensure that the threat can be neutralized (Choi, Sershon, Briggs,
antivirus software, user education, physical security, and routine security audits are often included
in the layers. The combination of these steps creates a strong defense system and helps to protect
Additionally, to find and fix weaknesses, routine security audits and assessments are
carried out. Layered security can be utilized firstly in the network regardless of number of
computers. Secondly, this strategy uses multiple programs to secure information. Third, this
method can be employed in different security strategies (Choi et al., 2014). Organizations may
create a strong defense system that significantly lowers the likelihood and effect of security
DATA COMMS AND NETWORKING 5
breaches by implementing this tiered security approach, protecting sensitive data and important
assets.
Advantages:
approach to security.
Redundancy and Resilience – Redundancy and resilience are provided by the fact that
This indicates that multiple layers are in place to reduce potential hazards even if
Disadvantages:
Potential for Overlapping or Conflicting Controls – Because there are so many security
measures in place, there could be rules that overlap or conflict with one another.
Inefficiencies, greater complexity, and even unforeseen vulnerabilities might result from
this.
DATA COMMS AND NETWORKING 6
Advantages:
Specific and Targeted Protection – Organizations can deploy specialized and targeted
security measures at various levels thanks to layered security. This implies that every layer
Flexibility and Scalability – Layered security gives you the freedom to select and
personalize security methods for various network components or data kinds. Because of its
Disadvantages:
Potential Gaps between Layers – There may be openings or weaknesses between levels,
depending on how the layers are implemented and handled. Attackers may find ways to
diverse security procedures across several tiers. It takes careful preparation and execution
and solutions.
Conclusion:
In conclusion, Layered security and Defense in depth are invaluable tactics for protecting
digital environments from a wide range of threats. Defense in Depth is a comprehensive strategy
that employs numerous layers of defense to provide redundancy and resilience. Although it offers
broad protection, managing it can be time- and resource-consuming. On the other side, layered
security ensures flexibility and scalability by allowing for targeted and particular actions at several
DATA COMMS AND NETWORKING 7
levels. However, careful integration is required to prevent potential weaknesses between levels.
Every approach has pros and cons, thus it is important to carefully weigh the needs, resources and
the risk profile of each company before selecting one over the other. The adoption of either
strategy, in the end, constitutes a major step in protecting vital assets and confidential data in a
References
https://www.qcert.org/sites/default/files/public/documents/au-bp-defence_in_depth-eng-2008.pdf
Amy Mersch (2021). What is Layered Security & How Does It Defend Your Network
https://blog.totalprosource.com/what-is-layered-security-how-does-it-defend-your-network
Choi, Y. B., Sershon, C., Briggs, J., & Clukey, C. (2014). Survey of layered defense, defense in
depth and testing of network security. International Journal of Computer and Information
https://www.ijcit.com/archives/volume3/issue5/Paper030518.pdf
StudyCorgi (2023). Advantages & Disadvantages of Defense in Depth and Layered Network
Security.