provide replies to below two Discussions each in 150 words

Question Description

main que:What are three network security management best practices

dev-

As most of the companies and organizations use internet, Information systems security. Computer and network security, it has become complex system and changes occur every day. It is important to develop a strong security strategy involves keeping one eye on the reality of Internet-speed changes in threats and technology, and the other on the reality of the corporate environment. It is necessary that the companies should know how and what to protect and what controls to put in place. This includes planning, policy development and the design of procedures. According to the January 2000 Internet Software Consortium’s Internet Domain Survey (www.isc.org/ds), there are more than 72 million hosts on the Internet. Given that many organizations do not advertise their internal name spaces, we know that many more computers are connected in some fashion to the Internet. Changes in network and security architectures, network security management is far more challenging and complex than just a few years ago (Bodhe, Masuti & Umesh, 2016).

Three network security management best practices

  1. Companies need to have an overview of their network. There are various services such as routing rules, access rules, NAT, VPN, hosts, including all products (and versions), services, vulnerabilities, and patches; and assets, including asset groupings and classifications. Security teams should view hosts in the network, as well as configurations, classifications and other pertinent information. A network map or model is both a useful visualization tool and a diagnostic tool, providing analysis that is only possible when considering an overall view. Sophisticated analytics can be conducted quickly and accurately in a model-based environment, without disrupting the live network. Access path analysis helps to validate changes and can troubleshoot outages or connectivity issues (Park, Lim, Kwon & Choi, 2017).
  2. Micro view is needed for device management. Information must be considered within the framework of the broader network, such as segments or zones, routing, routers, switches, intrusion prevention systems (IPS), and firewalls. Daily or weekly reviews of all devices on the network is unattainable with a manual process and reviewing device configurations less frequently puts network security and compliance at risk. Automating policy compliance helps ensure compliance and consistency and preserves IT resources.
  3. Attacks should be simulated for preparation. Attack simulation technology looks at network context, asset criticality, business metrics, and existing security controls when determining the impact of a potential attack. Attack simulation technology looks at network context, asset criticality, business metrics, and existing security controls when determining the impact of attack simulation can also evaluate potential options to block an attack, providing intelligence for decision support (Park, Lim, Kwon & Choi, 2017).

sow-

Securing Hardening, preparing are three best practices in network

Network attacks are developing, and former resolutions might not be adequate to prevent future risks and attacks. This is the reason for one of the vital parts where network security best practices came into picture and having antivirus up to date in the system. Software updates should be installed, having effective anti-virus in the system will almost protect over 90 percent of instances. Installing patches is also an important aspect to be considered. System should be always secure and up-to-date. Logging should be enabled to track how is doing what, who logged into the system. Giving access on need base and eliminating privileges and access rights should be implemented as top network security standard. System administrators and network administrators should be able to identify the weaknesses.

Hardening helps in solving known as well as predictable while preparing provides solution for unknown and unpredictable solutions. Always update the procedures and policies according to the trend. Implementing and exploring new tools to update configurations, policies and procedures as required.

Best security management practices should me focused on four fields. They are when planning and executing the deployment on systems. Integrity maintenance. Providing awareness to the employees on security issues.

Security teams support compliance mandates internally and externally, permit new facilities, improve routine, confirm obtainability, and provision the capability to troubleshoot professionally on mandate with no scope for mistake. That is a portion for steadiness when handling network security.

Prevention is top network security practice.

By the period to determine that the association has suffered a data breach, the damage will have already been done. Therefore, it’s so important to prepare ahead of time. After all, in terms of network security, an ounce of prevention is worth far more than a pound of cure. Computers should be configured in a way that they should be less vulnerable to any kind of malicious attacks. Integrity is an important aspect to be considered for deployments. Employees should be aware of all the security issues that’s are taking place in recent times. They should be trained to follow compliance and regulations. Disaster recovery and incident report are the best practices for a company to keep them in a place.

Securing networks according to the requirements and categories of data must be handled with proper care on computers. Building servers on a tight security system and they should be dedicated for solitary purpose. Multifactor Authentication is the best practice for login system to attain a token-based authentication. Encryption should be implemented to protect certain assets. Recognize the security apprehensions associated to daily administration. Traffic monitoring should be done on an isolated network and network traffic should be captured on internal hosts.

Get your college paper done by experts

Do my question How much will it cost?

Place an order in 3 easy steps. Takes less than 5 mins.

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *