SlideShare a Scribd company logo
1 of 4
Download to read offline
Network security architecture is the planning and design of the campus network to reduce
security risks in accordance with the institution’s risk analysis and security policies. It focuses on
reduc-ing security risks and enforcing policy through the design and con-figuration of firewalls,
routers, and other network equipment.
Network security is important because it is one of the means to enforce the policies and
procedures developed by the institution to protect information. It is often referred to as the “front
door” in broader discussions of IT security. To the extent that you can block network access to a
computer, you “lock” the door and provide bet-ter protection for that computer and its contents.
Traditional network design has focused on creating a secure net-work perimeter around the
organization and strategically placing a firewall at the point where the network is connected to
the Inter-net. For higher education, this traditional design is problematic; our constituents need
access from off campus to a large number of machines and services on campus. In addition,
because we have many computers on our campus that we cannot implicitly trust, we also must be
concerned about security threats from inside the perimeter protected by a traditional firewall.
These design issues require a different approach to network security. Although it is impossible to
do justice to the topic of network design in a few pages, there are some best practices that I feel
universities should focus on in terms of network design.
Step 1: Eliminate Network Components That Still UseShared Ethernet
Shared Ethernet switches (or hubs) were developed more than a decade ago to interconnect
multiple computers and networks. These hubs retransmit all network traffic to all computers
connected to that hub. The security implication is that if one computer has its security
compromised it can be used to monitor network traffic com-ing from any other computer that
shares the same hub. This could expose passwords and other sensitive information. Today,
switched Ethernet, which isolates traffic intended for one computer from the view of others on
the same switch, is very inexpensive and, hence, it is worth the cost of replacing older hubs.
Step 2: Embrace and Implement the Concept of Defense and Use Multiple Firewalls Within
Your Network
Commercial and Linux-based firewalls are inexpensive enough that you can deploy these in
multiple locations as needed. It is still bene-ficial to have a firewall separating your institutional
network from the connection to the Internet. This firewall, called a border firewall, will provide a
minimal level of protection for all computers on your net-work. The major benefit of this firewall
is that it allows your network and security staff to quickly block external access should a threat
arise, such as when the “SQL worm” was launched in January 2003 In addition to the border
firewall, consider adding internal firewalls to protect areas that require different levels of
security. For example, placing a firewall between the network segments containing the
computers that oper-ate the institutional business systems allows the institution to pro-vide more
restrictive security for those computers. Other areas that firewalls can strengthen include
residential networks and research labs. Each firewall can have different access controls, support
dif-ferent security policies, and allow for distributed administration— all of which are essential
to success in academia
Step 3: Implement Intrusion Detection Systems at Key Points Within Your Network to Monitor
Threats and Attacks
Anintrusion detection system(IDS) looks at the incoming network traffic for patterns that can
signify that a person is probing your net-work for vulnerable computers. The IDS can also look
at traffic leaving your institution for patterns that might indicate that a com-puter’s security has
been compromised. This probing from off cam-pus is usually the first step in attempting to
compromise the security of a computer on your network. IDSs historically have produced daily
reports showing what security vulnerabilities were being tar-geted the day before.
Some vendors are now integrating the IDS with the firewall and renaming these intrusion
prevention systems. When a threat is iden-tified, the IDS automatically works with the firewall to
adjust the firewall rules to protect the computers on the network. IDS prod-ucts are broadly
available through commercial vendors and the open-source community.
Step 4: Implement a Virtual Private Network Concentrator for Off-Campus and Wireless Access
A virtual private network (VPN) uses special software on each com-puter, called a VPN client,
to encrypt network traffic from that computer to a VPN concentrator on the institution’s network.
Using a VPN allows a member of your institution to securely con-nect to campus computers
from an off-campus computer. The VPN will establish an encrypted connection that allows the
off-campus computer to appear as if it were part of your internal campus net-work, thereby
granting access to resources that may be blocked by a border firewall
Solution
Network security architecture is the planning and design of the campus network to reduce
security risks in accordance with the institution’s risk analysis and security policies. It focuses on
reduc-ing security risks and enforcing policy through the design and con-figuration of firewalls,
routers, and other network equipment.
Network security is important because it is one of the means to enforce the policies and
procedures developed by the institution to protect information. It is often referred to as the “front
door” in broader discussions of IT security. To the extent that you can block network access to a
computer, you “lock” the door and provide bet-ter protection for that computer and its contents.
Traditional network design has focused on creating a secure net-work perimeter around the
organization and strategically placing a firewall at the point where the network is connected to
the Inter-net. For higher education, this traditional design is problematic; our constituents need
access from off campus to a large number of machines and services on campus. In addition,
because we have many computers on our campus that we cannot implicitly trust, we also must be
concerned about security threats from inside the perimeter protected by a traditional firewall.
These design issues require a different approach to network security. Although it is impossible to
do justice to the topic of network design in a few pages, there are some best practices that I feel
universities should focus on in terms of network design.
Step 1: Eliminate Network Components That Still UseShared Ethernet
Shared Ethernet switches (or hubs) were developed more than a decade ago to interconnect
multiple computers and networks. These hubs retransmit all network traffic to all computers
connected to that hub. The security implication is that if one computer has its security
compromised it can be used to monitor network traffic com-ing from any other computer that
shares the same hub. This could expose passwords and other sensitive information. Today,
switched Ethernet, which isolates traffic intended for one computer from the view of others on
the same switch, is very inexpensive and, hence, it is worth the cost of replacing older hubs.
Step 2: Embrace and Implement the Concept of Defense and Use Multiple Firewalls Within
Your Network
Commercial and Linux-based firewalls are inexpensive enough that you can deploy these in
multiple locations as needed. It is still bene-ficial to have a firewall separating your institutional
network from the connection to the Internet. This firewall, called a border firewall, will provide a
minimal level of protection for all computers on your net-work. The major benefit of this firewall
is that it allows your network and security staff to quickly block external access should a threat
arise, such as when the “SQL worm” was launched in January 2003 In addition to the border
firewall, consider adding internal firewalls to protect areas that require different levels of
security. For example, placing a firewall between the network segments containing the
computers that oper-ate the institutional business systems allows the institution to pro-vide more
restrictive security for those computers. Other areas that firewalls can strengthen include
residential networks and research labs. Each firewall can have different access controls, support
dif-ferent security policies, and allow for distributed administration— all of which are essential
to success in academia
Step 3: Implement Intrusion Detection Systems at Key Points Within Your Network to Monitor
Threats and Attacks
Anintrusion detection system(IDS) looks at the incoming network traffic for patterns that can
signify that a person is probing your net-work for vulnerable computers. The IDS can also look
at traffic leaving your institution for patterns that might indicate that a com-puter’s security has
been compromised. This probing from off cam-pus is usually the first step in attempting to
compromise the security of a computer on your network. IDSs historically have produced daily
reports showing what security vulnerabilities were being tar-geted the day before.
Some vendors are now integrating the IDS with the firewall and renaming these intrusion
prevention systems. When a threat is iden-tified, the IDS automatically works with the firewall to
adjust the firewall rules to protect the computers on the network. IDS prod-ucts are broadly
available through commercial vendors and the open-source community.
Step 4: Implement a Virtual Private Network Concentrator for Off-Campus and Wireless Access
A virtual private network (VPN) uses special software on each com-puter, called a VPN client,
to encrypt network traffic from that computer to a VPN concentrator on the institution’s network.
Using a VPN allows a member of your institution to securely con-nect to campus computers
from an off-campus computer. The VPN will establish an encrypted connection that allows the
off-campus computer to appear as if it were part of your internal campus net-work, thereby
granting access to resources that may be blocked by a border firewall

More Related Content

Similar to Network security architecture is the planning and design of the camp.pdf

Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)Amare Kassa
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
Industry Best Practice against DDoS Attacks
Industry Best Practice against DDoS AttacksIndustry Best Practice against DDoS Attacks
Industry Best Practice against DDoS AttacksMarcelo Silva
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...SubmissionResearchpa
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...IAEME Publication
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdfahmed53254
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System SecurityAmber Wheeler
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber lawDivyank Jindal
 
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docxRunning Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docxtoltonkendal
 

Similar to Network security architecture is the planning and design of the camp.pdf (20)

Firewall
FirewallFirewall
Firewall
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
Network security
Network securityNetwork security
Network security
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Industry Best Practice against DDoS Attacks
Industry Best Practice against DDoS AttacksIndustry Best Practice against DDoS Attacks
Industry Best Practice against DDoS Attacks
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
Approach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed FirewallsApproach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed Firewalls
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System Security
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Network security
Network securityNetwork security
Network security
 
Firewall
FirewallFirewall
Firewall
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docxRunning Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
 

More from aquazac

Answer Every investor expects dividend from his investments.Dividen.pdf
Answer Every investor expects dividend from his investments.Dividen.pdfAnswer Every investor expects dividend from his investments.Dividen.pdf
Answer Every investor expects dividend from his investments.Dividen.pdfaquazac
 
Ans. Gene is defined as the segment of DNA that gives a functional p.pdf
Ans. Gene is defined as the segment of DNA that gives a functional p.pdfAns. Gene is defined as the segment of DNA that gives a functional p.pdf
Ans. Gene is defined as the segment of DNA that gives a functional p.pdfaquazac
 
additional optmization techniques for underlying IP network must1.pdf
additional optmization techniques for underlying IP network must1.pdfadditional optmization techniques for underlying IP network must1.pdf
additional optmization techniques for underlying IP network must1.pdfaquazac
 
According to the given equation, aqueous carbon dioxide reacts with .pdf
According to the given equation, aqueous carbon dioxide reacts with .pdfAccording to the given equation, aqueous carbon dioxide reacts with .pdf
According to the given equation, aqueous carbon dioxide reacts with .pdfaquazac
 
a) mean = 1.43Thus distribution is Poisson(4.2)P(X = 4) = 4.2^4.pdf
a) mean = 1.43Thus distribution is Poisson(4.2)P(X = 4) = 4.2^4.pdfa) mean = 1.43Thus distribution is Poisson(4.2)P(X = 4) = 4.2^4.pdf
a) mean = 1.43Thus distribution is Poisson(4.2)P(X = 4) = 4.2^4.pdfaquazac
 
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdfaquazac
 
A person may not choose to participate in the labour force due to La.pdf
A person may not choose to participate in the labour force due to La.pdfA person may not choose to participate in the labour force due to La.pdf
A person may not choose to participate in the labour force due to La.pdfaquazac
 
Well.. 1) Ionic bonds are almost always metal to .pdf
                     Well.. 1) Ionic bonds are almost always metal to .pdf                     Well.. 1) Ionic bonds are almost always metal to .pdf
Well.. 1) Ionic bonds are almost always metal to .pdfaquazac
 
1. The answer is d) Environmental EffectsEnvironmental effects ca.pdf
1. The answer is d) Environmental EffectsEnvironmental effects ca.pdf1. The answer is d) Environmental EffectsEnvironmental effects ca.pdf
1. The answer is d) Environmental EffectsEnvironmental effects ca.pdfaquazac
 
clear clc close all Use polyfit to solve for the phase l.pdf
 clear clc close all Use polyfit to solve for the phase l.pdf clear clc close all Use polyfit to solve for the phase l.pdf
clear clc close all Use polyfit to solve for the phase l.pdfaquazac
 
The oxygen appears in both step reactions. But, i.pdf
                     The oxygen appears in both step reactions. But, i.pdf                     The oxygen appears in both step reactions. But, i.pdf
The oxygen appears in both step reactions. But, i.pdfaquazac
 
PART A The element Si belongs to IVA group. Therefore, four electro.pdf
  PART A The element Si belongs to IVA group. Therefore, four electro.pdf  PART A The element Si belongs to IVA group. Therefore, four electro.pdf
PART A The element Si belongs to IVA group. Therefore, four electro.pdfaquazac
 
The two contributions to the cohesive energy of t.pdf
                     The two contributions to the cohesive energy of t.pdf                     The two contributions to the cohesive energy of t.pdf
The two contributions to the cohesive energy of t.pdfaquazac
 
If you are talking about an extraction design, th.pdf
                     If you are talking about an extraction design, th.pdf                     If you are talking about an extraction design, th.pdf
If you are talking about an extraction design, th.pdfaquazac
 
Yes ,its true. Though both gibbons and rhesus monkeys belong to pr.pdf
Yes ,its true. Though both gibbons and rhesus monkeys belong to pr.pdfYes ,its true. Though both gibbons and rhesus monkeys belong to pr.pdf
Yes ,its true. Though both gibbons and rhesus monkeys belong to pr.pdfaquazac
 
When something boils, it changes states of matter. It would go from .pdf
When something boils, it changes states of matter. It would go from .pdfWhen something boils, it changes states of matter. It would go from .pdf
When something boils, it changes states of matter. It would go from .pdfaquazac
 
We need to discuss why there is an importance of adding residents to.pdf
We need to discuss why there is an importance of adding residents to.pdfWe need to discuss why there is an importance of adding residents to.pdf
We need to discuss why there is an importance of adding residents to.pdfaquazac
 
What is the largest decimal integer that can be represented with the.pdf
What is the largest decimal integer that can be represented with the.pdfWhat is the largest decimal integer that can be represented with the.pdf
What is the largest decimal integer that can be represented with the.pdfaquazac
 
Throwing.javaimport java.util.InputMismatchException; import jav.pdf
Throwing.javaimport java.util.InputMismatchException; import jav.pdfThrowing.javaimport java.util.InputMismatchException; import jav.pdf
Throwing.javaimport java.util.InputMismatchException; import jav.pdfaquazac
 
This electron transport is accompanied by the protons transfer into .pdf
This electron transport is accompanied by the protons transfer into .pdfThis electron transport is accompanied by the protons transfer into .pdf
This electron transport is accompanied by the protons transfer into .pdfaquazac
 

More from aquazac (20)

Answer Every investor expects dividend from his investments.Dividen.pdf
Answer Every investor expects dividend from his investments.Dividen.pdfAnswer Every investor expects dividend from his investments.Dividen.pdf
Answer Every investor expects dividend from his investments.Dividen.pdf
 
Ans. Gene is defined as the segment of DNA that gives a functional p.pdf
Ans. Gene is defined as the segment of DNA that gives a functional p.pdfAns. Gene is defined as the segment of DNA that gives a functional p.pdf
Ans. Gene is defined as the segment of DNA that gives a functional p.pdf
 
additional optmization techniques for underlying IP network must1.pdf
additional optmization techniques for underlying IP network must1.pdfadditional optmization techniques for underlying IP network must1.pdf
additional optmization techniques for underlying IP network must1.pdf
 
According to the given equation, aqueous carbon dioxide reacts with .pdf
According to the given equation, aqueous carbon dioxide reacts with .pdfAccording to the given equation, aqueous carbon dioxide reacts with .pdf
According to the given equation, aqueous carbon dioxide reacts with .pdf
 
a) mean = 1.43Thus distribution is Poisson(4.2)P(X = 4) = 4.2^4.pdf
a) mean = 1.43Thus distribution is Poisson(4.2)P(X = 4) = 4.2^4.pdfa) mean = 1.43Thus distribution is Poisson(4.2)P(X = 4) = 4.2^4.pdf
a) mean = 1.43Thus distribution is Poisson(4.2)P(X = 4) = 4.2^4.pdf
 
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf
 
A person may not choose to participate in the labour force due to La.pdf
A person may not choose to participate in the labour force due to La.pdfA person may not choose to participate in the labour force due to La.pdf
A person may not choose to participate in the labour force due to La.pdf
 
Well.. 1) Ionic bonds are almost always metal to .pdf
                     Well.. 1) Ionic bonds are almost always metal to .pdf                     Well.. 1) Ionic bonds are almost always metal to .pdf
Well.. 1) Ionic bonds are almost always metal to .pdf
 
1. The answer is d) Environmental EffectsEnvironmental effects ca.pdf
1. The answer is d) Environmental EffectsEnvironmental effects ca.pdf1. The answer is d) Environmental EffectsEnvironmental effects ca.pdf
1. The answer is d) Environmental EffectsEnvironmental effects ca.pdf
 
clear clc close all Use polyfit to solve for the phase l.pdf
 clear clc close all Use polyfit to solve for the phase l.pdf clear clc close all Use polyfit to solve for the phase l.pdf
clear clc close all Use polyfit to solve for the phase l.pdf
 
The oxygen appears in both step reactions. But, i.pdf
                     The oxygen appears in both step reactions. But, i.pdf                     The oxygen appears in both step reactions. But, i.pdf
The oxygen appears in both step reactions. But, i.pdf
 
PART A The element Si belongs to IVA group. Therefore, four electro.pdf
  PART A The element Si belongs to IVA group. Therefore, four electro.pdf  PART A The element Si belongs to IVA group. Therefore, four electro.pdf
PART A The element Si belongs to IVA group. Therefore, four electro.pdf
 
The two contributions to the cohesive energy of t.pdf
                     The two contributions to the cohesive energy of t.pdf                     The two contributions to the cohesive energy of t.pdf
The two contributions to the cohesive energy of t.pdf
 
If you are talking about an extraction design, th.pdf
                     If you are talking about an extraction design, th.pdf                     If you are talking about an extraction design, th.pdf
If you are talking about an extraction design, th.pdf
 
Yes ,its true. Though both gibbons and rhesus monkeys belong to pr.pdf
Yes ,its true. Though both gibbons and rhesus monkeys belong to pr.pdfYes ,its true. Though both gibbons and rhesus monkeys belong to pr.pdf
Yes ,its true. Though both gibbons and rhesus monkeys belong to pr.pdf
 
When something boils, it changes states of matter. It would go from .pdf
When something boils, it changes states of matter. It would go from .pdfWhen something boils, it changes states of matter. It would go from .pdf
When something boils, it changes states of matter. It would go from .pdf
 
We need to discuss why there is an importance of adding residents to.pdf
We need to discuss why there is an importance of adding residents to.pdfWe need to discuss why there is an importance of adding residents to.pdf
We need to discuss why there is an importance of adding residents to.pdf
 
What is the largest decimal integer that can be represented with the.pdf
What is the largest decimal integer that can be represented with the.pdfWhat is the largest decimal integer that can be represented with the.pdf
What is the largest decimal integer that can be represented with the.pdf
 
Throwing.javaimport java.util.InputMismatchException; import jav.pdf
Throwing.javaimport java.util.InputMismatchException; import jav.pdfThrowing.javaimport java.util.InputMismatchException; import jav.pdf
Throwing.javaimport java.util.InputMismatchException; import jav.pdf
 
This electron transport is accompanied by the protons transfer into .pdf
This electron transport is accompanied by the protons transfer into .pdfThis electron transport is accompanied by the protons transfer into .pdf
This electron transport is accompanied by the protons transfer into .pdf
 

Recently uploaded

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

Network security architecture is the planning and design of the camp.pdf

  • 1. Network security architecture is the planning and design of the campus network to reduce security risks in accordance with the institution’s risk analysis and security policies. It focuses on reduc-ing security risks and enforcing policy through the design and con-figuration of firewalls, routers, and other network equipment. Network security is important because it is one of the means to enforce the policies and procedures developed by the institution to protect information. It is often referred to as the “front door” in broader discussions of IT security. To the extent that you can block network access to a computer, you “lock” the door and provide bet-ter protection for that computer and its contents. Traditional network design has focused on creating a secure net-work perimeter around the organization and strategically placing a firewall at the point where the network is connected to the Inter-net. For higher education, this traditional design is problematic; our constituents need access from off campus to a large number of machines and services on campus. In addition, because we have many computers on our campus that we cannot implicitly trust, we also must be concerned about security threats from inside the perimeter protected by a traditional firewall. These design issues require a different approach to network security. Although it is impossible to do justice to the topic of network design in a few pages, there are some best practices that I feel universities should focus on in terms of network design. Step 1: Eliminate Network Components That Still UseShared Ethernet Shared Ethernet switches (or hubs) were developed more than a decade ago to interconnect multiple computers and networks. These hubs retransmit all network traffic to all computers connected to that hub. The security implication is that if one computer has its security compromised it can be used to monitor network traffic com-ing from any other computer that shares the same hub. This could expose passwords and other sensitive information. Today, switched Ethernet, which isolates traffic intended for one computer from the view of others on the same switch, is very inexpensive and, hence, it is worth the cost of replacing older hubs. Step 2: Embrace and Implement the Concept of Defense and Use Multiple Firewalls Within Your Network Commercial and Linux-based firewalls are inexpensive enough that you can deploy these in multiple locations as needed. It is still bene-ficial to have a firewall separating your institutional network from the connection to the Internet. This firewall, called a border firewall, will provide a minimal level of protection for all computers on your net-work. The major benefit of this firewall is that it allows your network and security staff to quickly block external access should a threat arise, such as when the “SQL worm” was launched in January 2003 In addition to the border firewall, consider adding internal firewalls to protect areas that require different levels of
  • 2. security. For example, placing a firewall between the network segments containing the computers that oper-ate the institutional business systems allows the institution to pro-vide more restrictive security for those computers. Other areas that firewalls can strengthen include residential networks and research labs. Each firewall can have different access controls, support dif-ferent security policies, and allow for distributed administration— all of which are essential to success in academia Step 3: Implement Intrusion Detection Systems at Key Points Within Your Network to Monitor Threats and Attacks Anintrusion detection system(IDS) looks at the incoming network traffic for patterns that can signify that a person is probing your net-work for vulnerable computers. The IDS can also look at traffic leaving your institution for patterns that might indicate that a com-puter’s security has been compromised. This probing from off cam-pus is usually the first step in attempting to compromise the security of a computer on your network. IDSs historically have produced daily reports showing what security vulnerabilities were being tar-geted the day before. Some vendors are now integrating the IDS with the firewall and renaming these intrusion prevention systems. When a threat is iden-tified, the IDS automatically works with the firewall to adjust the firewall rules to protect the computers on the network. IDS prod-ucts are broadly available through commercial vendors and the open-source community. Step 4: Implement a Virtual Private Network Concentrator for Off-Campus and Wireless Access A virtual private network (VPN) uses special software on each com-puter, called a VPN client, to encrypt network traffic from that computer to a VPN concentrator on the institution’s network. Using a VPN allows a member of your institution to securely con-nect to campus computers from an off-campus computer. The VPN will establish an encrypted connection that allows the off-campus computer to appear as if it were part of your internal campus net-work, thereby granting access to resources that may be blocked by a border firewall Solution Network security architecture is the planning and design of the campus network to reduce security risks in accordance with the institution’s risk analysis and security policies. It focuses on reduc-ing security risks and enforcing policy through the design and con-figuration of firewalls, routers, and other network equipment. Network security is important because it is one of the means to enforce the policies and procedures developed by the institution to protect information. It is often referred to as the “front door” in broader discussions of IT security. To the extent that you can block network access to a
  • 3. computer, you “lock” the door and provide bet-ter protection for that computer and its contents. Traditional network design has focused on creating a secure net-work perimeter around the organization and strategically placing a firewall at the point where the network is connected to the Inter-net. For higher education, this traditional design is problematic; our constituents need access from off campus to a large number of machines and services on campus. In addition, because we have many computers on our campus that we cannot implicitly trust, we also must be concerned about security threats from inside the perimeter protected by a traditional firewall. These design issues require a different approach to network security. Although it is impossible to do justice to the topic of network design in a few pages, there are some best practices that I feel universities should focus on in terms of network design. Step 1: Eliminate Network Components That Still UseShared Ethernet Shared Ethernet switches (or hubs) were developed more than a decade ago to interconnect multiple computers and networks. These hubs retransmit all network traffic to all computers connected to that hub. The security implication is that if one computer has its security compromised it can be used to monitor network traffic com-ing from any other computer that shares the same hub. This could expose passwords and other sensitive information. Today, switched Ethernet, which isolates traffic intended for one computer from the view of others on the same switch, is very inexpensive and, hence, it is worth the cost of replacing older hubs. Step 2: Embrace and Implement the Concept of Defense and Use Multiple Firewalls Within Your Network Commercial and Linux-based firewalls are inexpensive enough that you can deploy these in multiple locations as needed. It is still bene-ficial to have a firewall separating your institutional network from the connection to the Internet. This firewall, called a border firewall, will provide a minimal level of protection for all computers on your net-work. The major benefit of this firewall is that it allows your network and security staff to quickly block external access should a threat arise, such as when the “SQL worm” was launched in January 2003 In addition to the border firewall, consider adding internal firewalls to protect areas that require different levels of security. For example, placing a firewall between the network segments containing the computers that oper-ate the institutional business systems allows the institution to pro-vide more restrictive security for those computers. Other areas that firewalls can strengthen include residential networks and research labs. Each firewall can have different access controls, support dif-ferent security policies, and allow for distributed administration— all of which are essential to success in academia Step 3: Implement Intrusion Detection Systems at Key Points Within Your Network to Monitor Threats and Attacks Anintrusion detection system(IDS) looks at the incoming network traffic for patterns that can
  • 4. signify that a person is probing your net-work for vulnerable computers. The IDS can also look at traffic leaving your institution for patterns that might indicate that a com-puter’s security has been compromised. This probing from off cam-pus is usually the first step in attempting to compromise the security of a computer on your network. IDSs historically have produced daily reports showing what security vulnerabilities were being tar-geted the day before. Some vendors are now integrating the IDS with the firewall and renaming these intrusion prevention systems. When a threat is iden-tified, the IDS automatically works with the firewall to adjust the firewall rules to protect the computers on the network. IDS prod-ucts are broadly available through commercial vendors and the open-source community. Step 4: Implement a Virtual Private Network Concentrator for Off-Campus and Wireless Access A virtual private network (VPN) uses special software on each com-puter, called a VPN client, to encrypt network traffic from that computer to a VPN concentrator on the institution’s network. Using a VPN allows a member of your institution to securely con-nect to campus computers from an off-campus computer. The VPN will establish an encrypted connection that allows the off-campus computer to appear as if it were part of your internal campus net-work, thereby granting access to resources that may be blocked by a border firewall