Network Security - A Layered Approach: H. I. M. T. Greater Noida, D. N. College, Hisar, G. P. Hisar
Network Security - A Layered Approach: H. I. M. T. Greater Noida, D. N. College, Hisar, G. P. Hisar
Network Security - A Layered Approach: H. I. M. T. Greater Noida, D. N. College, Hisar, G. P. Hisar
Kanchan Bala1, Barjeena Lucky2, Surinder Pal Garg3 H. I. M. T. Greater Noida, 2D. N. College, Hisar, 3G. P. Hisar.
Abstract
Security issues are critical for the success of pervasive computing. Because pervasive computing and ebusiness may provide millions of people with the power to move trillions of dollars in goods or money by a few mouse clicks, the security of e-business transaction is a top priority. With the number of security threats on the rise, network security has become an essential part of maintaining the privacy and integrity of an enterprise. Network security provider has the technology to help you define your network against attacks by implementing preventative security solutions. Cryptography is a minor tool to obtain Network Security. Our layered approach to network security was designed with the knowledge that no single tool can protect every segment of network from harming. In reality, the surge of blended threats has resulted in the need for integration between individual security products in order to reduce possible gaps in protection.
methodical approach to network security. In many industries enhanced security is not an option-its mandatory federal regulation such as sarbnessoxelyGLBA and other require organizations such as financial institutions, health care providers and federal agencies to implement stringent security programs to protect digital assets. Now we are introducing you to a layered approach for securing your network. This layered approach is both a technical strategy, espousing adequate measures be put in place at different levels within your network infrastructures. The layered approach centers on maintaining appropriate security measures and procedures at five different levels within IT department. 1. Perimeter 2. Network 3. Host 4. Application 5. Data
1. Introduction
Network layer security is a key aspect of the internet based security mechanism. Originally; people were concentrating only on application level security. However, new security requirements demand that even the lower level data units should be protected. With the view in mind, network security mechanism has emerged and is being used extensively in real life.
Figure 2. The security level in the layered approach and the technologies that function on each.
Figure 1. Network security A Layered Approach Network security is a mission-critical concern for enterprises, government agencies, and organizations of all sizes. Todays advanced threats demand a
2.3 VPN
A VPN is a mechanism of employing encryption, authentication and integrity protection so that we can use a public network (Such as the Internet) as if it is a private network. A VPN is a mechanism to simulate a private network over a public network. It essentially creates an encrypted tunnel across the Internet, approximating the security and confidentiality of a private network. A VPN tunnel can terminate on a VPN- enabled router, firewall or server within the DMZ. Enforcing VPN connections for all remote and wireless network segments is an important bestpractice that is relatively easy and inexpensive to implement.
2.1 Firewall
A firewall is typically installed on a server connected to the inside and the outside of the network perimeter. A firewall performs three general functions: 1. Traffic Control 2. Address Translations 3. VPN terminations A firewall acts like a sentry. If implemented, it guards a corporate network by standing between the network and the outside world. All the traffic between the network and the internet in either direction must pass through the firewall. The firewall decides if the traffic can be allowed to flow or whether it must be stopped from proceeding further. It ensures that only permissible requests are allowed through. Additionally, firewalls help secure the network by translating internal IP addresses to IP addresses that are visible to the internet. This prevents the disclosure of critical information about the structure of the network inside the firewall. A firewall can also terminate VPN tunnels.
3.1 Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)
IDS and IPS technologies analyze traffic moving across your network in much greater detail than your firewall. Similar to antivirus systems, IPS and IDS devices analyze traffic and compare each packet to a database of known attack profiles. The difference is that anti- virus inspects files on the system, whereas IDS and IPS inspects packets within network traffic. When attacks are detected, IDS/IPS technologies take action. IDS alert and IPS block the harmful traffic. In fact, most IPSs have an IDS at their core. The key difference between the technologies is implied by their names. IDS products only detect malicious traffic, while IPS products prevent such traffic from entering your network.
6.1 Encryption
Data encryption schemes are commonly implemented at the data, the application, and the operating systems levels. Common encryption strategies include PKI, PGP and RSA.
7. Conclusion
Hackers and cyber terrorist are launching network attack combines with increasing frequency and sophistication. The traditional approach to securitynamely a firewall combined with an anti-virus in incapable of protecting. However, erect a formidable defense by implementing network security using a layered approach.
8. References
[1] R.T. Morris, 1985, A Weakness in the 4.2BSD Unix TCP/IP Software, Computing Science Technical Report No. 117, AT&T Bell Laboratories, Murray Hill, New Jersey. [2] S.M. Bellovin, Security Problems in the TCP/IP Protocol Suite, Computer Communication Review, Vol. 19, No. 2, pp. 32-48, April 1989. [3] Y. Rekhter, R. Moskowitz, D. Karrenberg, G. de Groot, E. Lear, ``Address Allocation for Private Internets.'' RFC 1918. [4] J.P. Holbrook, J.K. Reynolds. ``Site Security Handbook.'' RFC 1244. [5] M. Curtin, ``Snake Oil Warning Signs: Encryption Software to Avoid.'' USENET <sci.crypt> Frequently Asked Questions File.