Security and privacy have, for the most part, been seen as the responsibility of
ID: 3696322 • Letter: S
Question
Security and privacy have, for the most part, been seen as the responsibility of network engineers because most data and processing have been contained within the enterprises' walls. Now that mobile devices are capable of running applications outside of the enterprise, we are finding that traditional firewall approaches are providing inadequate protection.
This course has taught you the technical aspects of networks and the practices and capabilities to secure them. We have explored the future expectations for networks and the Internet. Network engineers should always be planning and preparing for 1 to 2 years away.
In this paper, summarize your expectations about where networks will be in 2 years and you will develop a theory for how network security solutions will evolve. Your theories do not have to be accurate, I don't expect you to be fortune tellers. I am looking for reasoned, course-based forecasts.
Having read about networking and Internet security and privacy throughout this course,
Write a 4 page APA formatted paper that includes references to at least 3 external sites.
The paper consists of the front page, 2 or 3 content pages and a reference page. Include graphs - full-page graphics will not count towards the number of pages.
Include at least 3 external references.
Why is the current practice of securing the enterprise by hiding it behind hardened firewalls becoming extinct?
What should network engineers expect to happen with security in 2 years?
What will networks look like in 2 years, given the proliferation of mobile devices?
Explanation / Answer
Answer :
Security mechanisms available to protect are :
Future possiblity as being the legal, social, and/or ethical implications of using the security device or mechanism
Internet security is the set of applications more than anything else. The future will possibly be that the security is similar to an immune system. The immune system fights off attacks and builds itself to fight tougher enemies.In the same way network security will be able to function as an immune system.
Many security developments that are taking place are within the same set of security technology that is being used today with some minor adjustments.The fame towards biometrics could have taken place a while ago, but it isn’t being actively pursued.
This below describes some typical mechanisms of secure network. You can select from these mechanisms when describing solutions for common security oppositions.
Authentication
The term authentication usually refers to authenticating users but can also refer to authenticating devices or software processes.Authentication identifies who is requesting network services.some routing protocols support route authentication, where by a router must pass some criteria before another router accepts its routing updates.
Auditing :
This is also called accounting.Effectively analyze the security of a network and to respond to security incidents, procedures should be established for collecting network activity data.collecting data is called auditing.
collecting passwords creates a potential for a security breach if the audit records are improperly accessed.The audit process should not collect passwords. Neither correct nor incorrect passwords should be collected. An incorrect password often differs from the valid password by only a single character.
Data Encryption
An encryption device encrypts data before placing it on a network.Encryption is a process that scrambles data to protect it from being read by anyone but the intended receiver. A decryption device decrypts the data before passing it to an application. A router, server,dedicated device can act as an encrypted or decrypted device.Data that is not encrypted is called plain text and data that is encrypted is called ciphered data .
How an enterprise might be attacked and the type of security device or mechanism you would select to combat the attack :
In a attack, an attacker targets a lower security host, where less security is in place, which in turn enables to access the lower security host to exploit the access privileges granted to host to attack a higher security host with better probability of success
The attacker would target a low-security server on a lower security part of the network by first scanning an organization's externally accessible IP addresses to gain access to a internal network, and then use that access to be able to attack a database storing sensitive information. This is similar to attacking shared libraries in large programs to be able to inject harmful code into the overall program.Depending on how many levels in a network, the attack could come from a site many links away from the original website.
To prevent these types of attacks, reduce the amount of external party content on our website, evaluate the content prior to allowing it to be served, automatically follow all of the links on your website and scan them for harmful code.
Sandboxing would limit code to only access data in its sandbox and not access everything that web browser could access One of the protections is sandboxing.This would mean that the harmful code potentially would only be able to access the objects it had access to in its sandbox rather than the more broad access that a web browser might have access to the attack.