Documente Academic
Documente Profesional
Documente Cultură
INTRODUCTION
Security management is the process of administering and managing the security of the
network as well as the information and data’s in it. It deals with how system integrity is
maintained amid the man-made threats and risks, intentional or unintentional. It ranges
from identification of risks to determination of security measures and controls.
Securing the network is also a protection to information, which is one of the many assets
a corporation or private business. The protection of information and information systems
from unauthorized access, use, disclosure, disruption, modification, inspection, recording or
destruction of information in order to provide confidentiality, integrity and availability. In this
writing some aspects will be discuss which a person should take into account in managing
the security of the network. Improving security management in a network, someone can say
the harder the problem can be the better security a network can have. From passive to
active attacks to the network and so on. In keeping a better security for the network is giving
importance to the key elements for information security.
Making a network secure the person should know the problem that occurred, analyse
the problem and make solutions that must be implemented. Not only the network is
protected also the sensitive information and network resources of a certain corporation or
business is secured.
II. OBJECTIVE
A network that needs a better security should have objectives concerning security.
Integrity- keeping the information or data complete, intact and accurate and is not
modified in an unauthorized manner.
Sometimes IP spoofing is used to hijack a browser, a visitor who types in the URL
of a legitimate site is taken to a fraudent Web page created by hijacker. If the user interacts
with the dynamic content on a spoofed page, the hijacker can gain access to sensitive
information or computer or network resources. HE could steal or alter sensitive data such as a
credit card number or password, or install malware. The hijacker uses proxy server to send false
IP address to the owner of the IP address
IV. SOLUTION
Success of security management is on the implementation of steps to make a
better and more secured a network secured. Here are some steps to attain it:
In this step you identify the asset or important things in the network. Like these
three:
Information- This include the sensitive data like credit card passwords, account username
and network resources.
After determining the assets you can determine the security level the network
needed.
After identifying the risk you can now know the effect it can do to the network.
In this phase you should know the solution to the problem that occurred. You have
analysed that the problem occurred is IP address spoofing.
Filter the packets entering the network is one way to avoid spoofing. And also filtering of
the incoming and outgoing traffic should be implemented.
ACLs helps prevent spoofing by not allowing falsified IP addresses to enter.
Accreditation to encryption should be provided in order to allow only trusted hosts to
communicate with.
SSL certificates should be used to reduce the risk of spoofing at a greater extent.
In this step you are going to check if the solution you implement has worked. It is
important to re-evaluate to check if the solutions provided had response to the problem. We
may not know that we really need to change new components to avoid such risks again.
In keeping the network secured, you should always maintain and check if there are
risks that occur. With these you can avoid greater problems to the network.
A
SECURITY PROBLEM
OF A NETWORK