SlideShare a Scribd company logo
Network security architecture is the planning and design of the campus network to reduce
security risks in accordance with the institution’s risk analysis and security policies. It focuses on
reduc-ing security risks and enforcing policy through the design and con-figuration of firewalls,
routers, and other network equipment.
Network security is important because it is one of the means to enforce the policies and
procedures developed by the institution to protect information. It is often referred to as the “front
door” in broader discussions of IT security. To the extent that you can block network access to a
computer, you “lock” the door and provide bet-ter protection for that computer and its contents.
Traditional network design has focused on creating a secure net-work perimeter around the
organization and strategically placing a firewall at the point where the network is connected to
the Inter-net. For higher education, this traditional design is problematic; our constituents need
access from off campus to a large number of machines and services on campus. In addition,
because we have many computers on our campus that we cannot implicitly trust, we also must be
concerned about security threats from inside the perimeter protected by a traditional firewall.
These design issues require a different approach to network security. Although it is impossible to
do justice to the topic of network design in a few pages, there are some best practices that I feel
universities should focus on in terms of network design.
Step 1: Eliminate Network Components That Still UseShared Ethernet
Shared Ethernet switches (or hubs) were developed more than a decade ago to interconnect
multiple computers and networks. These hubs retransmit all network traffic to all computers
connected to that hub. The security implication is that if one computer has its security
compromised it can be used to monitor network traffic com-ing from any other computer that
shares the same hub. This could expose passwords and other sensitive information. Today,
switched Ethernet, which isolates traffic intended for one computer from the view of others on
the same switch, is very inexpensive and, hence, it is worth the cost of replacing older hubs.
Step 2: Embrace and Implement the Concept of Defense and Use Multiple Firewalls Within
Your Network
Commercial and Linux-based firewalls are inexpensive enough that you can deploy these in
multiple locations as needed. It is still bene-ficial to have a firewall separating your institutional
network from the connection to the Internet. This firewall, called a border firewall, will provide a
minimal level of protection for all computers on your net-work. The major benefit of this firewall
is that it allows your network and security staff to quickly block external access should a threat
arise, such as when the “SQL worm” was launched in January 2003 In addition to the border
firewall, consider adding internal firewalls to protect areas that require different levels of
security. For example, placing a firewall between the network segments containing the
computers that oper-ate the institutional business systems allows the institution to pro-vide more
restrictive security for those computers. Other areas that firewalls can strengthen include
residential networks and research labs. Each firewall can have different access controls, support
dif-ferent security policies, and allow for distributed administration— all of which are essential
to success in academia
Step 3: Implement Intrusion Detection Systems at Key Points Within Your Network to Monitor
Threats and Attacks
Anintrusion detection system(IDS) looks at the incoming network traffic for patterns that can
signify that a person is probing your net-work for vulnerable computers. The IDS can also look
at traffic leaving your institution for patterns that might indicate that a com-puter’s security has
been compromised. This probing from off cam-pus is usually the first step in attempting to
compromise the security of a computer on your network. IDSs historically have produced daily
reports showing what security vulnerabilities were being tar-geted the day before.
Some vendors are now integrating the IDS with the firewall and renaming these intrusion
prevention systems. When a threat is iden-tified, the IDS automatically works with the firewall to
adjust the firewall rules to protect the computers on the network. IDS prod-ucts are broadly
available through commercial vendors and the open-source community.
Step 4: Implement a Virtual Private Network Concentrator for Off-Campus and Wireless Access
A virtual private network (VPN) uses special software on each com-puter, called a VPN client,
to encrypt network traffic from that computer to a VPN concentrator on the institution’s network.
Using a VPN allows a member of your institution to securely con-nect to campus computers
from an off-campus computer. The VPN will establish an encrypted connection that allows the
off-campus computer to appear as if it were part of your internal campus net-work, thereby
granting access to resources that may be blocked by a border firewall
Solution
Network security architecture is the planning and design of the campus network to reduce
security risks in accordance with the institution’s risk analysis and security policies. It focuses on
reduc-ing security risks and enforcing policy through the design and con-figuration of firewalls,
routers, and other network equipment.
Network security is important because it is one of the means to enforce the policies and
procedures developed by the institution to protect information. It is often referred to as the “front
door” in broader discussions of IT security. To the extent that you can block network access to a
computer, you “lock” the door and provide bet-ter protection for that computer and its contents.
Traditional network design has focused on creating a secure net-work perimeter around the
organization and strategically placing a firewall at the point where the network is connected to
the Inter-net. For higher education, this traditional design is problematic; our constituents need
access from off campus to a large number of machines and services on campus. In addition,
because we have many computers on our campus that we cannot implicitly trust, we also must be
concerned about security threats from inside the perimeter protected by a traditional firewall.
These design issues require a different approach to network security. Although it is impossible to
do justice to the topic of network design in a few pages, there are some best practices that I feel
universities should focus on in terms of network design.
Step 1: Eliminate Network Components That Still UseShared Ethernet
Shared Ethernet switches (or hubs) were developed more than a decade ago to interconnect
multiple computers and networks. These hubs retransmit all network traffic to all computers
connected to that hub. The security implication is that if one computer has its security
compromised it can be used to monitor network traffic com-ing from any other computer that
shares the same hub. This could expose passwords and other sensitive information. Today,
switched Ethernet, which isolates traffic intended for one computer from the view of others on
the same switch, is very inexpensive and, hence, it is worth the cost of replacing older hubs.
Step 2: Embrace and Implement the Concept of Defense and Use Multiple Firewalls Within
Your Network
Commercial and Linux-based firewalls are inexpensive enough that you can deploy these in
multiple locations as needed. It is still bene-ficial to have a firewall separating your institutional
network from the connection to the Internet. This firewall, called a border firewall, will provide a
minimal level of protection for all computers on your net-work. The major benefit of this firewall
is that it allows your network and security staff to quickly block external access should a threat
arise, such as when the “SQL worm” was launched in January 2003 In addition to the border
firewall, consider adding internal firewalls to protect areas that require different levels of
security. For example, placing a firewall between the network segments containing the
computers that oper-ate the institutional business systems allows the institution to pro-vide more
restrictive security for those computers. Other areas that firewalls can strengthen include
residential networks and research labs. Each firewall can have different access controls, support
dif-ferent security policies, and allow for distributed administration— all of which are essential
to success in academia
Step 3: Implement Intrusion Detection Systems at Key Points Within Your Network to Monitor
Threats and Attacks
Anintrusion detection system(IDS) looks at the incoming network traffic for patterns that can
signify that a person is probing your net-work for vulnerable computers. The IDS can also look
at traffic leaving your institution for patterns that might indicate that a com-puter’s security has
been compromised. This probing from off cam-pus is usually the first step in attempting to
compromise the security of a computer on your network. IDSs historically have produced daily
reports showing what security vulnerabilities were being tar-geted the day before.
Some vendors are now integrating the IDS with the firewall and renaming these intrusion
prevention systems. When a threat is iden-tified, the IDS automatically works with the firewall to
adjust the firewall rules to protect the computers on the network. IDS prod-ucts are broadly
available through commercial vendors and the open-source community.
Step 4: Implement a Virtual Private Network Concentrator for Off-Campus and Wireless Access
A virtual private network (VPN) uses special software on each com-puter, called a VPN client,
to encrypt network traffic from that computer to a VPN concentrator on the institution’s network.
Using a VPN allows a member of your institution to securely con-nect to campus computers
from an off-campus computer. The VPN will establish an encrypted connection that allows the
off-campus computer to appear as if it were part of your internal campus net-work, thereby
granting access to resources that may be blocked by a border firewall

Recommended for you

network security.pdf
network security.pdfnetwork security.pdf
network security.pdf

This document discusses the design and implementation of a network security model using routers and firewalls. It begins by outlining the importance of network security and some common vulnerabilities, threats, and attacks against network devices like routers. It then provides details on specific attacks like session hijacking, spoofing, and denial of service attacks. The document also discusses best practices for router and firewall security policies, including access control, authentication, and traffic filtering. The overall aim is to protect networks from vulnerabilities and security weaknesses by implementing preventative measures, securing devices like routers and firewalls, and establishing proper security policies.

Network security
Network securityNetwork security
Network security

Network security refers to the set of rules, technologies, and processes used to protect computer networks. It aims to preserve the confidentiality, integrity, and availability of network data and resources. Network security works through physical, technical, and administrative controls. Physical controls restrict access to network infrastructure. Technical controls protect data in transit and storage through measures like antivirus software, firewalls, and virtual private networks. Administrative controls govern user authentication, access levels, and system changes through security policies. Together these layers safeguard networks from both internal and external cyber threats.

networkingnetworkinternet
The Ultimate Guide to Network Firewalls_ Everything You Need to Know.pdf
The Ultimate Guide to Network Firewalls_ Everything You Need to Know.pdfThe Ultimate Guide to Network Firewalls_ Everything You Need to Know.pdf
The Ultimate Guide to Network Firewalls_ Everything You Need to Know.pdf

Network firewalls provide multiple layers of security, significantly enhancing your network’s ability to resist cyber threats. They offer comprehensive protection against a wide range of attacks, from simple malware to complex, multi-vector threats.

network firewalls

More Related Content

Similar to Network security architecture is the planning and design of the camp.pdf

Firewall
FirewallFirewall
Firewall
Naga Dinesh
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
Amare Kassa
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
LakshmiSamivel
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
JeganathanJayaran
 
Network security
Network securityNetwork security
Network security
Pooja Dewangan
 
The Ultimate Guide to Network Firewalls_ Everything You Need to Know.pdf
The Ultimate Guide to Network Firewalls_ Everything You Need to Know.pdfThe Ultimate Guide to Network Firewalls_ Everything You Need to Know.pdf
The Ultimate Guide to Network Firewalls_ Everything You Need to Know.pdf
CyberPro Magazine
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
E.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
Ken Flott
 
Industry Best Practice against DDoS Attacks
Industry Best Practice against DDoS AttacksIndustry Best Practice against DDoS Attacks
Industry Best Practice against DDoS Attacks
Marcelo Silva
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...
SubmissionResearchpa
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
IAEME Publication
 
Approach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed FirewallsApproach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed Firewalls
International Journal of Science and Research (IJSR)
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
ahmed53254
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System Security
Amber Wheeler
 
New internet security
New internet securityNew internet security
New internet security
university of mumbai
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
university of mumbai
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
 
Network security
Network securityNetwork security
Network security
Simalike Peter
 
Firewall
FirewallFirewall
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
Divyank Jindal
 

Similar to Network security architecture is the planning and design of the camp.pdf (20)

Firewall
FirewallFirewall
Firewall
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
Network security
Network securityNetwork security
Network security
 
The Ultimate Guide to Network Firewalls_ Everything You Need to Know.pdf
The Ultimate Guide to Network Firewalls_ Everything You Need to Know.pdfThe Ultimate Guide to Network Firewalls_ Everything You Need to Know.pdf
The Ultimate Guide to Network Firewalls_ Everything You Need to Know.pdf
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Industry Best Practice against DDoS Attacks
Industry Best Practice against DDoS AttacksIndustry Best Practice against DDoS Attacks
Industry Best Practice against DDoS Attacks
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
Approach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed FirewallsApproach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed Firewalls
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System Security
 
New internet security
New internet securityNew internet security
New internet security
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Network security
Network securityNetwork security
Network security
 
Firewall
FirewallFirewall
Firewall
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 

More from aquazac

Answer Every investor expects dividend from his investments.Dividen.pdf
Answer Every investor expects dividend from his investments.Dividen.pdfAnswer Every investor expects dividend from his investments.Dividen.pdf
Answer Every investor expects dividend from his investments.Dividen.pdf
aquazac
 
Ans. Gene is defined as the segment of DNA that gives a functional p.pdf
Ans. Gene is defined as the segment of DNA that gives a functional p.pdfAns. Gene is defined as the segment of DNA that gives a functional p.pdf
Ans. Gene is defined as the segment of DNA that gives a functional p.pdf
aquazac
 
additional optmization techniques for underlying IP network must1.pdf
additional optmization techniques for underlying IP network must1.pdfadditional optmization techniques for underlying IP network must1.pdf
additional optmization techniques for underlying IP network must1.pdf
aquazac
 
According to the given equation, aqueous carbon dioxide reacts with .pdf
According to the given equation, aqueous carbon dioxide reacts with .pdfAccording to the given equation, aqueous carbon dioxide reacts with .pdf
According to the given equation, aqueous carbon dioxide reacts with .pdf
aquazac
 
a) mean = 1.43Thus distribution is Poisson(4.2)P(X = 4) = 4.2^4.pdf
a) mean = 1.43Thus distribution is Poisson(4.2)P(X = 4) = 4.2^4.pdfa) mean = 1.43Thus distribution is Poisson(4.2)P(X = 4) = 4.2^4.pdf
a) mean = 1.43Thus distribution is Poisson(4.2)P(X = 4) = 4.2^4.pdf
aquazac
 
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf
aquazac
 
A person may not choose to participate in the labour force due to La.pdf
A person may not choose to participate in the labour force due to La.pdfA person may not choose to participate in the labour force due to La.pdf
A person may not choose to participate in the labour force due to La.pdf
aquazac
 
Well.. 1) Ionic bonds are almost always metal to .pdf
                     Well.. 1) Ionic bonds are almost always metal to .pdf                     Well.. 1) Ionic bonds are almost always metal to .pdf
Well.. 1) Ionic bonds are almost always metal to .pdf
aquazac
 
1. The answer is d) Environmental EffectsEnvironmental effects ca.pdf
1. The answer is d) Environmental EffectsEnvironmental effects ca.pdf1. The answer is d) Environmental EffectsEnvironmental effects ca.pdf
1. The answer is d) Environmental EffectsEnvironmental effects ca.pdf
aquazac
 
clear clc close all Use polyfit to solve for the phase l.pdf
 clear clc close all Use polyfit to solve for the phase l.pdf clear clc close all Use polyfit to solve for the phase l.pdf
clear clc close all Use polyfit to solve for the phase l.pdf
aquazac
 
The oxygen appears in both step reactions. But, i.pdf
                     The oxygen appears in both step reactions. But, i.pdf                     The oxygen appears in both step reactions. But, i.pdf
The oxygen appears in both step reactions. But, i.pdf
aquazac
 
PART A The element Si belongs to IVA group. Therefore, four electro.pdf
  PART A The element Si belongs to IVA group. Therefore, four electro.pdf  PART A The element Si belongs to IVA group. Therefore, four electro.pdf
PART A The element Si belongs to IVA group. Therefore, four electro.pdf
aquazac
 
The two contributions to the cohesive energy of t.pdf
                     The two contributions to the cohesive energy of t.pdf                     The two contributions to the cohesive energy of t.pdf
The two contributions to the cohesive energy of t.pdf
aquazac
 
If you are talking about an extraction design, th.pdf
                     If you are talking about an extraction design, th.pdf                     If you are talking about an extraction design, th.pdf
If you are talking about an extraction design, th.pdf
aquazac
 
Yes ,its true. Though both gibbons and rhesus monkeys belong to pr.pdf
Yes ,its true. Though both gibbons and rhesus monkeys belong to pr.pdfYes ,its true. Though both gibbons and rhesus monkeys belong to pr.pdf
Yes ,its true. Though both gibbons and rhesus monkeys belong to pr.pdf
aquazac
 
When something boils, it changes states of matter. It would go from .pdf
When something boils, it changes states of matter. It would go from .pdfWhen something boils, it changes states of matter. It would go from .pdf
When something boils, it changes states of matter. It would go from .pdf
aquazac
 
We need to discuss why there is an importance of adding residents to.pdf
We need to discuss why there is an importance of adding residents to.pdfWe need to discuss why there is an importance of adding residents to.pdf
We need to discuss why there is an importance of adding residents to.pdf
aquazac
 
What is the largest decimal integer that can be represented with the.pdf
What is the largest decimal integer that can be represented with the.pdfWhat is the largest decimal integer that can be represented with the.pdf
What is the largest decimal integer that can be represented with the.pdf
aquazac
 
Throwing.javaimport java.util.InputMismatchException; import jav.pdf
Throwing.javaimport java.util.InputMismatchException; import jav.pdfThrowing.javaimport java.util.InputMismatchException; import jav.pdf
Throwing.javaimport java.util.InputMismatchException; import jav.pdf
aquazac
 
This electron transport is accompanied by the protons transfer into .pdf
This electron transport is accompanied by the protons transfer into .pdfThis electron transport is accompanied by the protons transfer into .pdf
This electron transport is accompanied by the protons transfer into .pdf
aquazac
 

More from aquazac (20)

Answer Every investor expects dividend from his investments.Dividen.pdf
Answer Every investor expects dividend from his investments.Dividen.pdfAnswer Every investor expects dividend from his investments.Dividen.pdf
Answer Every investor expects dividend from his investments.Dividen.pdf
 
Ans. Gene is defined as the segment of DNA that gives a functional p.pdf
Ans. Gene is defined as the segment of DNA that gives a functional p.pdfAns. Gene is defined as the segment of DNA that gives a functional p.pdf
Ans. Gene is defined as the segment of DNA that gives a functional p.pdf
 
additional optmization techniques for underlying IP network must1.pdf
additional optmization techniques for underlying IP network must1.pdfadditional optmization techniques for underlying IP network must1.pdf
additional optmization techniques for underlying IP network must1.pdf
 
According to the given equation, aqueous carbon dioxide reacts with .pdf
According to the given equation, aqueous carbon dioxide reacts with .pdfAccording to the given equation, aqueous carbon dioxide reacts with .pdf
According to the given equation, aqueous carbon dioxide reacts with .pdf
 
a) mean = 1.43Thus distribution is Poisson(4.2)P(X = 4) = 4.2^4.pdf
a) mean = 1.43Thus distribution is Poisson(4.2)P(X = 4) = 4.2^4.pdfa) mean = 1.43Thus distribution is Poisson(4.2)P(X = 4) = 4.2^4.pdf
a) mean = 1.43Thus distribution is Poisson(4.2)P(X = 4) = 4.2^4.pdf
 
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf
 
A person may not choose to participate in the labour force due to La.pdf
A person may not choose to participate in the labour force due to La.pdfA person may not choose to participate in the labour force due to La.pdf
A person may not choose to participate in the labour force due to La.pdf
 
Well.. 1) Ionic bonds are almost always metal to .pdf
                     Well.. 1) Ionic bonds are almost always metal to .pdf                     Well.. 1) Ionic bonds are almost always metal to .pdf
Well.. 1) Ionic bonds are almost always metal to .pdf
 
1. The answer is d) Environmental EffectsEnvironmental effects ca.pdf
1. The answer is d) Environmental EffectsEnvironmental effects ca.pdf1. The answer is d) Environmental EffectsEnvironmental effects ca.pdf
1. The answer is d) Environmental EffectsEnvironmental effects ca.pdf
 
clear clc close all Use polyfit to solve for the phase l.pdf
 clear clc close all Use polyfit to solve for the phase l.pdf clear clc close all Use polyfit to solve for the phase l.pdf
clear clc close all Use polyfit to solve for the phase l.pdf
 
The oxygen appears in both step reactions. But, i.pdf
                     The oxygen appears in both step reactions. But, i.pdf                     The oxygen appears in both step reactions. But, i.pdf
The oxygen appears in both step reactions. But, i.pdf
 
PART A The element Si belongs to IVA group. Therefore, four electro.pdf
  PART A The element Si belongs to IVA group. Therefore, four electro.pdf  PART A The element Si belongs to IVA group. Therefore, four electro.pdf
PART A The element Si belongs to IVA group. Therefore, four electro.pdf
 
The two contributions to the cohesive energy of t.pdf
                     The two contributions to the cohesive energy of t.pdf                     The two contributions to the cohesive energy of t.pdf
The two contributions to the cohesive energy of t.pdf
 
If you are talking about an extraction design, th.pdf
                     If you are talking about an extraction design, th.pdf                     If you are talking about an extraction design, th.pdf
If you are talking about an extraction design, th.pdf
 
Yes ,its true. Though both gibbons and rhesus monkeys belong to pr.pdf
Yes ,its true. Though both gibbons and rhesus monkeys belong to pr.pdfYes ,its true. Though both gibbons and rhesus monkeys belong to pr.pdf
Yes ,its true. Though both gibbons and rhesus monkeys belong to pr.pdf
 
When something boils, it changes states of matter. It would go from .pdf
When something boils, it changes states of matter. It would go from .pdfWhen something boils, it changes states of matter. It would go from .pdf
When something boils, it changes states of matter. It would go from .pdf
 
We need to discuss why there is an importance of adding residents to.pdf
We need to discuss why there is an importance of adding residents to.pdfWe need to discuss why there is an importance of adding residents to.pdf
We need to discuss why there is an importance of adding residents to.pdf
 
What is the largest decimal integer that can be represented with the.pdf
What is the largest decimal integer that can be represented with the.pdfWhat is the largest decimal integer that can be represented with the.pdf
What is the largest decimal integer that can be represented with the.pdf
 
Throwing.javaimport java.util.InputMismatchException; import jav.pdf
Throwing.javaimport java.util.InputMismatchException; import jav.pdfThrowing.javaimport java.util.InputMismatchException; import jav.pdf
Throwing.javaimport java.util.InputMismatchException; import jav.pdf
 
This electron transport is accompanied by the protons transfer into .pdf
This electron transport is accompanied by the protons transfer into .pdfThis electron transport is accompanied by the protons transfer into .pdf
This electron transport is accompanied by the protons transfer into .pdf
 

Recently uploaded

Is Email Marketing Really Effective In 2024?
Is Email Marketing Really Effective In 2024?Is Email Marketing Really Effective In 2024?
Is Email Marketing Really Effective In 2024?
Rakesh Jalan
 
Bedok NEWater Photostory - COM322 Assessment (Story 2)
Bedok NEWater Photostory - COM322 Assessment (Story 2)Bedok NEWater Photostory - COM322 Assessment (Story 2)
Bedok NEWater Photostory - COM322 Assessment (Story 2)
Liyana Rozaini
 
"DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ...
"DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ..."DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ...
"DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ...
thanhluan21
 
Front Desk Management in the Odoo 17 ERP
Front Desk  Management in the Odoo 17 ERPFront Desk  Management in the Odoo 17 ERP
Front Desk Management in the Odoo 17 ERP
Celine George
 
NLC English 7 Consolidation Lesson plan for teacher
NLC English 7 Consolidation Lesson plan for teacherNLC English 7 Consolidation Lesson plan for teacher
NLC English 7 Consolidation Lesson plan for teacher
AngelicaLubrica
 
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptxChapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
Brajeswar Paul
 
L1 L2- NLC PPT for Grade 10 intervention
L1 L2- NLC PPT for Grade 10 interventionL1 L2- NLC PPT for Grade 10 intervention
L1 L2- NLC PPT for Grade 10 intervention
RHODAJANEAURESTILA
 
Credit limit improvement system in odoo 17
Credit limit improvement system in odoo 17Credit limit improvement system in odoo 17
Credit limit improvement system in odoo 17
Celine George
 
Howe Writing Center - Orientation Summer 2024
Howe Writing Center - Orientation Summer 2024Howe Writing Center - Orientation Summer 2024
Howe Writing Center - Orientation Summer 2024
Elizabeth Walsh
 
2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference
KlettWorldLanguages
 
The membership Module in the Odoo 17 ERP
The membership Module in the Odoo 17 ERPThe membership Module in the Odoo 17 ERP
The membership Module in the Odoo 17 ERP
Celine George
 
eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
siemaillard
 
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
MysoreMuleSoftMeetup
 
ENGLISH-7-CURRICULUM MAP- MATATAG CURRICULUM
ENGLISH-7-CURRICULUM MAP- MATATAG CURRICULUMENGLISH-7-CURRICULUM MAP- MATATAG CURRICULUM
ENGLISH-7-CURRICULUM MAP- MATATAG CURRICULUM
HappieMontevirgenCas
 
How to Configure Time Off Types in Odoo 17
How to Configure Time Off Types in Odoo 17How to Configure Time Off Types in Odoo 17
How to Configure Time Off Types in Odoo 17
Celine George
 
How to Show Sample Data in Tree and Kanban View in Odoo 17
How to Show Sample Data in Tree and Kanban View in Odoo 17How to Show Sample Data in Tree and Kanban View in Odoo 17
How to Show Sample Data in Tree and Kanban View in Odoo 17
Celine George
 
Principles of Roods Approach!!!!!!!.pptx
Principles of Roods Approach!!!!!!!.pptxPrinciples of Roods Approach!!!!!!!.pptx
Principles of Roods Approach!!!!!!!.pptx
ibtesaam huma
 
AI_in_HR_Presentation Part 1 2024 0703.pdf
AI_in_HR_Presentation Part 1 2024 0703.pdfAI_in_HR_Presentation Part 1 2024 0703.pdf
AI_in_HR_Presentation Part 1 2024 0703.pdf
SrimanigandanMadurai
 
NAEYC Code of Ethical Conduct Resource Book
NAEYC Code of Ethical Conduct Resource BookNAEYC Code of Ethical Conduct Resource Book
NAEYC Code of Ethical Conduct Resource Book
lakitawilson
 
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
marianell3076
 

Recently uploaded (20)

Is Email Marketing Really Effective In 2024?
Is Email Marketing Really Effective In 2024?Is Email Marketing Really Effective In 2024?
Is Email Marketing Really Effective In 2024?
 
Bedok NEWater Photostory - COM322 Assessment (Story 2)
Bedok NEWater Photostory - COM322 Assessment (Story 2)Bedok NEWater Photostory - COM322 Assessment (Story 2)
Bedok NEWater Photostory - COM322 Assessment (Story 2)
 
"DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ...
"DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ..."DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ...
"DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ...
 
Front Desk Management in the Odoo 17 ERP
Front Desk  Management in the Odoo 17 ERPFront Desk  Management in the Odoo 17 ERP
Front Desk Management in the Odoo 17 ERP
 
NLC English 7 Consolidation Lesson plan for teacher
NLC English 7 Consolidation Lesson plan for teacherNLC English 7 Consolidation Lesson plan for teacher
NLC English 7 Consolidation Lesson plan for teacher
 
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptxChapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
 
L1 L2- NLC PPT for Grade 10 intervention
L1 L2- NLC PPT for Grade 10 interventionL1 L2- NLC PPT for Grade 10 intervention
L1 L2- NLC PPT for Grade 10 intervention
 
Credit limit improvement system in odoo 17
Credit limit improvement system in odoo 17Credit limit improvement system in odoo 17
Credit limit improvement system in odoo 17
 
Howe Writing Center - Orientation Summer 2024
Howe Writing Center - Orientation Summer 2024Howe Writing Center - Orientation Summer 2024
Howe Writing Center - Orientation Summer 2024
 
2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference
 
The membership Module in the Odoo 17 ERP
The membership Module in the Odoo 17 ERPThe membership Module in the Odoo 17 ERP
The membership Module in the Odoo 17 ERP
 
eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
 
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
 
ENGLISH-7-CURRICULUM MAP- MATATAG CURRICULUM
ENGLISH-7-CURRICULUM MAP- MATATAG CURRICULUMENGLISH-7-CURRICULUM MAP- MATATAG CURRICULUM
ENGLISH-7-CURRICULUM MAP- MATATAG CURRICULUM
 
How to Configure Time Off Types in Odoo 17
How to Configure Time Off Types in Odoo 17How to Configure Time Off Types in Odoo 17
How to Configure Time Off Types in Odoo 17
 
How to Show Sample Data in Tree and Kanban View in Odoo 17
How to Show Sample Data in Tree and Kanban View in Odoo 17How to Show Sample Data in Tree and Kanban View in Odoo 17
How to Show Sample Data in Tree and Kanban View in Odoo 17
 
Principles of Roods Approach!!!!!!!.pptx
Principles of Roods Approach!!!!!!!.pptxPrinciples of Roods Approach!!!!!!!.pptx
Principles of Roods Approach!!!!!!!.pptx
 
AI_in_HR_Presentation Part 1 2024 0703.pdf
AI_in_HR_Presentation Part 1 2024 0703.pdfAI_in_HR_Presentation Part 1 2024 0703.pdf
AI_in_HR_Presentation Part 1 2024 0703.pdf
 
NAEYC Code of Ethical Conduct Resource Book
NAEYC Code of Ethical Conduct Resource BookNAEYC Code of Ethical Conduct Resource Book
NAEYC Code of Ethical Conduct Resource Book
 
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
 

Network security architecture is the planning and design of the camp.pdf

  • 1. Network security architecture is the planning and design of the campus network to reduce security risks in accordance with the institution’s risk analysis and security policies. It focuses on reduc-ing security risks and enforcing policy through the design and con-figuration of firewalls, routers, and other network equipment. Network security is important because it is one of the means to enforce the policies and procedures developed by the institution to protect information. It is often referred to as the “front door” in broader discussions of IT security. To the extent that you can block network access to a computer, you “lock” the door and provide bet-ter protection for that computer and its contents. Traditional network design has focused on creating a secure net-work perimeter around the organization and strategically placing a firewall at the point where the network is connected to the Inter-net. For higher education, this traditional design is problematic; our constituents need access from off campus to a large number of machines and services on campus. In addition, because we have many computers on our campus that we cannot implicitly trust, we also must be concerned about security threats from inside the perimeter protected by a traditional firewall. These design issues require a different approach to network security. Although it is impossible to do justice to the topic of network design in a few pages, there are some best practices that I feel universities should focus on in terms of network design. Step 1: Eliminate Network Components That Still UseShared Ethernet Shared Ethernet switches (or hubs) were developed more than a decade ago to interconnect multiple computers and networks. These hubs retransmit all network traffic to all computers connected to that hub. The security implication is that if one computer has its security compromised it can be used to monitor network traffic com-ing from any other computer that shares the same hub. This could expose passwords and other sensitive information. Today, switched Ethernet, which isolates traffic intended for one computer from the view of others on the same switch, is very inexpensive and, hence, it is worth the cost of replacing older hubs. Step 2: Embrace and Implement the Concept of Defense and Use Multiple Firewalls Within Your Network Commercial and Linux-based firewalls are inexpensive enough that you can deploy these in multiple locations as needed. It is still bene-ficial to have a firewall separating your institutional network from the connection to the Internet. This firewall, called a border firewall, will provide a minimal level of protection for all computers on your net-work. The major benefit of this firewall is that it allows your network and security staff to quickly block external access should a threat arise, such as when the “SQL worm” was launched in January 2003 In addition to the border firewall, consider adding internal firewalls to protect areas that require different levels of
  • 2. security. For example, placing a firewall between the network segments containing the computers that oper-ate the institutional business systems allows the institution to pro-vide more restrictive security for those computers. Other areas that firewalls can strengthen include residential networks and research labs. Each firewall can have different access controls, support dif-ferent security policies, and allow for distributed administration— all of which are essential to success in academia Step 3: Implement Intrusion Detection Systems at Key Points Within Your Network to Monitor Threats and Attacks Anintrusion detection system(IDS) looks at the incoming network traffic for patterns that can signify that a person is probing your net-work for vulnerable computers. The IDS can also look at traffic leaving your institution for patterns that might indicate that a com-puter’s security has been compromised. This probing from off cam-pus is usually the first step in attempting to compromise the security of a computer on your network. IDSs historically have produced daily reports showing what security vulnerabilities were being tar-geted the day before. Some vendors are now integrating the IDS with the firewall and renaming these intrusion prevention systems. When a threat is iden-tified, the IDS automatically works with the firewall to adjust the firewall rules to protect the computers on the network. IDS prod-ucts are broadly available through commercial vendors and the open-source community. Step 4: Implement a Virtual Private Network Concentrator for Off-Campus and Wireless Access A virtual private network (VPN) uses special software on each com-puter, called a VPN client, to encrypt network traffic from that computer to a VPN concentrator on the institution’s network. Using a VPN allows a member of your institution to securely con-nect to campus computers from an off-campus computer. The VPN will establish an encrypted connection that allows the off-campus computer to appear as if it were part of your internal campus net-work, thereby granting access to resources that may be blocked by a border firewall Solution Network security architecture is the planning and design of the campus network to reduce security risks in accordance with the institution’s risk analysis and security policies. It focuses on reduc-ing security risks and enforcing policy through the design and con-figuration of firewalls, routers, and other network equipment. Network security is important because it is one of the means to enforce the policies and procedures developed by the institution to protect information. It is often referred to as the “front door” in broader discussions of IT security. To the extent that you can block network access to a
  • 3. computer, you “lock” the door and provide bet-ter protection for that computer and its contents. Traditional network design has focused on creating a secure net-work perimeter around the organization and strategically placing a firewall at the point where the network is connected to the Inter-net. For higher education, this traditional design is problematic; our constituents need access from off campus to a large number of machines and services on campus. In addition, because we have many computers on our campus that we cannot implicitly trust, we also must be concerned about security threats from inside the perimeter protected by a traditional firewall. These design issues require a different approach to network security. Although it is impossible to do justice to the topic of network design in a few pages, there are some best practices that I feel universities should focus on in terms of network design. Step 1: Eliminate Network Components That Still UseShared Ethernet Shared Ethernet switches (or hubs) were developed more than a decade ago to interconnect multiple computers and networks. These hubs retransmit all network traffic to all computers connected to that hub. The security implication is that if one computer has its security compromised it can be used to monitor network traffic com-ing from any other computer that shares the same hub. This could expose passwords and other sensitive information. Today, switched Ethernet, which isolates traffic intended for one computer from the view of others on the same switch, is very inexpensive and, hence, it is worth the cost of replacing older hubs. Step 2: Embrace and Implement the Concept of Defense and Use Multiple Firewalls Within Your Network Commercial and Linux-based firewalls are inexpensive enough that you can deploy these in multiple locations as needed. It is still bene-ficial to have a firewall separating your institutional network from the connection to the Internet. This firewall, called a border firewall, will provide a minimal level of protection for all computers on your net-work. The major benefit of this firewall is that it allows your network and security staff to quickly block external access should a threat arise, such as when the “SQL worm” was launched in January 2003 In addition to the border firewall, consider adding internal firewalls to protect areas that require different levels of security. For example, placing a firewall between the network segments containing the computers that oper-ate the institutional business systems allows the institution to pro-vide more restrictive security for those computers. Other areas that firewalls can strengthen include residential networks and research labs. Each firewall can have different access controls, support dif-ferent security policies, and allow for distributed administration— all of which are essential to success in academia Step 3: Implement Intrusion Detection Systems at Key Points Within Your Network to Monitor Threats and Attacks Anintrusion detection system(IDS) looks at the incoming network traffic for patterns that can
  • 4. signify that a person is probing your net-work for vulnerable computers. The IDS can also look at traffic leaving your institution for patterns that might indicate that a com-puter’s security has been compromised. This probing from off cam-pus is usually the first step in attempting to compromise the security of a computer on your network. IDSs historically have produced daily reports showing what security vulnerabilities were being tar-geted the day before. Some vendors are now integrating the IDS with the firewall and renaming these intrusion prevention systems. When a threat is iden-tified, the IDS automatically works with the firewall to adjust the firewall rules to protect the computers on the network. IDS prod-ucts are broadly available through commercial vendors and the open-source community. Step 4: Implement a Virtual Private Network Concentrator for Off-Campus and Wireless Access A virtual private network (VPN) uses special software on each com-puter, called a VPN client, to encrypt network traffic from that computer to a VPN concentrator on the institution’s network. Using a VPN allows a member of your institution to securely con-nect to campus computers from an off-campus computer. The VPN will establish an encrypted connection that allows the off-campus computer to appear as if it were part of your internal campus net-work, thereby granting access to resources that may be blocked by a border firewall