Documente Academic
Documente Profesional
Documente Cultură
Network Monitoring
Capella University
Abstract
The organization today have something in best practices for network system management
other business else wants. By this paper practical backing for network system functional areas
which requires increase quality of best efforts and practices for secure network system
management, tools, and security controls. Since the organization development of security control
plans for securing every functional area of the network system, since the challenges of secured
network system design dealing with the complexity of network system connectivity from the
This paper will “review plans for maintenance and monitoring of secure network design
within an organization. this paper, we will further examine the development of sanction for
maintenance and monitoring tools to the backing of the upkeep of a secure network system in the
business. The paper will also discuss the development of sanction for plans, methodologies, and
processes to the backing of the upkeep of a secure network system in the business. furthermore,
the paper will focus on plans for security professional within an organization for enforcement of
best effort for the current network system hardening” (Capella, 2019 para 21).
Table of Content
Cover Page,
Abstract.
Table of Content.
Introduction/ Body
Conclusion
References
NETWORK MONITORING 4
Introduction
For the organization to deal with effectively challenges that come with network system in
vulnerabilities and flaws, there is the needed for development of plans for implementing the right
security controls mix for security principles in a modular network system design which will
allow for application of multi-layered security defenses for protect in network system in top-
down approach which centered on the information security governance policies and planning
development and choosing the best network system technologies. Since by this article we
understand the various ways of securing the organization legacy system elements from the
enterprise-wide network which is more exposed to security risks such as the remote access
network, internet access connection or public network connection, wireless access connection
The Paquet(2013) says that the maintenance and monitoring of network system design
depend on these plans and applying a security control plans from the identification of network
system assets, examining the network system security risks, also examining the network system
security requirements with tradeoffs, which will help in development of network system security
plans and policies, also the organization develop measures for the application of network system
security control policies, organization technical implementation plan which accomplished by the
buy-in of all stakeholders of the organization. Further awareness and training of all stakeholders
of the organization while testing the network system security controls by patching, updates and
system upgrades if there any risk found after a further risk assessment of the organization
The network system design needs is by this situation an information security policies and
processes are define and further communicated to the organization in an implemented steps of
NETWORK MONITORING 5
system development life cycle of definition of the network system security plan for dealing with
any identify system risk, there is documentation of information security policies and processes,
leading to the creation of network system security awareness the organization believes and sticks
to it. Paquet (2013) paper examines that whiles implementing security controls of the network
system and organization as a whole without missing monitoring and measure the performance
metrics outcomes of the security control strategies which are applied and their end result.
Reporting and auditing of the security control measures to see its effectiveness.
Rafi (2006) states in his article that since there is likely the organization information
system security will have and face challenges in the information system asset which requires
mitigation of these security risks, threats and flaws in the asset such as the NOS, operation
system/application, network system inventory of assets, human factors, enterprise access and
user excessive permission, business continuity and data recovery and further business security
awareness.
The goals for monitoring and maintenance plan is to have comprehensive organization
information security governance which handles various technical process, governing process and
end-user processes in streamline network system monitoring and maintenance plan in mean time
to resolves all network system behavior mix from the escalation, reporting alerts on the multi-
layered of the network system, applying the increase availability of the network system backup
and failover plans, not leaving the network system security controls configuration management
options and policies which has a capacity development and growth of the network system. Since
the scope of the monitoring and maintenance goals to monitor the organization network system
baseline behavior from the end-users internet usage. Full inventory and discovery of information
system asset and applications/OS by auditing and control, mitigation of application and OS
NETWORK MONITORING 6
vulnerabilities. Data center and server farm data integrity and retention plans (Paquet, 2013, p
15- 19).
Implementation of the maintenance and monitoring of the network system design for
security controls by the organization taking inventory of all authorized and unauthorized devices
and applications, analysis of audit logs, daily vulnerability evaluation and restoration,
administrative privileges in controlled mode, web browsing and email security protection, anti-
malware and virus protection, the business continuity and data recovery plan, accounting for
network system protocols and services use in the network system administration. There is an
Incident response, wireless access point control, various network system perimeter and boundary
defense, configuration management of the network system technologies and devices (Rafi, 2006,
p 13-17).
The sanctions for the monitoring and maintenance tools there is the need for deployment
of SIEM and the log analytic tools for monitoring and maintenance such as logs files gathering
and evaluation, also logic monitoring tool for the network system monitoring of the enterprise-
wide network system. Also, monitoring of network system technologies and devices such as
application, data center, server farms, cloud computing, virtual machines (Santander, 2010, p6).
The sanctions for information system processes and plans that will aid the upkeep of
maintenance of the network system from the technical governance policies such as the general
procedures for upkeep of the network system maintenance such as audit procedures, risk
of network system access procedure, the account entry request procedures, Email procedures,
integrity and database credentials procedures, network system procedures- what are the
NETWORK MONITORING 7
minimum network system entry user requirements procedures, technologies and devices security
and configuration management procedures, wireless communication and entry point procedures
which covers data retention and integrity (CISA, 2018, para 9 -13).
Network system hardening being enforced by today IT professional are fault management
network system security management procedures, and account management procedures of all
network system usage data of the network system devices resources. Through the network
system segmentation and segregation of the network systems, which is in hardening of the
network system devices there is physical separation of generated sensitive data through either
unnecessary services and protocols. The restriction of physical access to network system devices
and security protection of console and virtual cables lines, back up configuration procedures and
References
Capella University, 2019, Course room, unit 10, Network Monitoring, Date Retrieved 03/13/
2019,
https://courserooma.capella.edu/webapps/blackboard/content/listContent.jsp?course_id=_
162482_1&content_id=_7268977_1&mode=reset
Santander Peláez,M. (2010 p. 6). Measuring effectiveness in Information Security Controls. Date
effectiveness-information-security-controls-33398
Paquet, C. (2013). Network Security Concepts and Policies. Date Retrieved 03/13/ 2019,
http://www.ciscopress.com/articles/article.asp?p=1998559&seqNum=3
CISA, (2018), Securing Network Infrastructure Devices, Date Retrieved 03/13/ 2019,
https://www.us-cert.gov/ncas/tips/ST18-001
Rufi, A. (2006). Vulnerabilities, Threats, and Attacks. Network Security 1 and 2 Companion
threats-and-attacks-chapter-one-7.pdf
NETWORK MONITORING 9