Network of protocols. The protocols of various layers

Network and System Technology is a key technology for a wide variety of applications. It’s an important demand in current scenario networks, there’s a big lack of security strategies which will be simply enforced. The developers of security technology and developers of network have a “communication gap” between them. Network design is a developed process that is depends on the Open System Interface (OSI) model. There is many advantages in OSI model when designing network security.

It offers ease-of-use, flexibility, modularity and standardization of protocols. The protocols of various layers are often simply combined to make stacks which allow standard development. In distinction to secure network design is not a well-developed method. There is not a methodology to manage the quality of security requirements. Once considering about network security, it ought to be emphasised that the entire network is secure. It does not solely concern with the security within the computers at every end of the communication chain.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

When transferring from one node to a different node data the communication should not be prone to attack. A hacker can target the communication, get the information, and decrypt it and re-insert a duplicate message. Although securing the network is simply as necessary as securing the computers and encrypting the message. These are the objectives that ought to be unbroken in mind whereas securing a network.Confidentiality, Integrity and Availability as known as CIS triad which is a model that intended to control the policies for data security inside an organization. There are three most critical parts of security in elements of the triad to be considered. Confidentiality implies that only the authorized individuals or systems can view sensitive or classified data.

The data being sent over the network should not be accessed by unauthorized people. The attacker may attempt to capture the data using different tools available on the Internet and gaining access to your data. An essential method to avoid this issues is by using an encryption techniques to safeguard all data and prevent the attacker gains access to your data and they do not be able to decrypt it. The standards of encryption including AES (Advanced Encryption Standard) and DES (Data Encryption Standard). There is another way in protecting the data which is through a Virtual Private Network (VPN) tunnel. VPN will helps to securely move the data over the network. Integrity is the ability to guarantee the reliability of information resources. Integrity of information refers to protect information from being modified and changed by unauthorized people or parties.

Data must not be changed in transit, and steps must be taken to guarantee that data cannot be altered by unauthorized people and it should be predictable and exact. Similarly as data confidentiality, cryptography assumes a major part in ensuring data integrity. Normally used methods to ensure data integrity includes hashing the data that receive and comparing it with the hash of the original message.

The corruption of data is a failure to maintain data integrity. Thus, using a hash function to prevent our data not been modified. There are two common types which are SHA and MD5.

SHA stands for Secure Hash Algorithm and MD5 is Message Direct 5.

x

Hi!
I'm Casey!

Would you like to get a custom essay? How about receiving a customized one?

Check it out