Network Security - Research Activity
For each of the tools:
DMZ (Demilitarized Zone)
Description
DMZ is a secure server where as an additional security that acts as an immigration between the Local Area Network (LAN) and the Internet.
Purpose
It checks whether the user is authorized or unauthorized to access to the Internet.
Advantages
- Adding the DMZ on the Local Area Network (LAN) can improve the network security.
- Unauthorized user cannot stole any information because they are restricted from accessing to the network.
Disadvantages
- Some users or employees cannot upload and download the web pages or other files.
- The DMZ can only be used to one network only (Cannot combine with private and public network on the same system).
The organization needs to implement the DMZ because the it can enhance or improved the Local Area Network (LAN) of the organization.
If its not configured/set up properly, the employees inside the organization cannot access to some of the network where the employees cannot just access to the website by the web server, but they also cannot use the printer which use the print server).
https://getthehelp.wordpress.com/2015/09/08/advantage-disadvantage-of-using-dmz/
NAT (Network Address Translation)
Description
NAT is a process where one or more local IP address are translated or converted into another IP address in order to make the network secure.
Purpose
It is used to hide the real local IP address of the user from the Internet.
Advantages
- To hide the real IP address from unauthorized access of system by the hacker.
- Improved the flexibility when connecting onto the public internet.
Disadvantages
- It can cause a delay on the IPv4 communication
- It can cause loss of IP traceability from the end-device to end-device.
The organization needs to implement the NAT because it can prevent from the unauthorized user from stealing the IPv4 addresses and access the local IP address of the employees inside the organization.
If its not configured properly, some of the technologies and the network applications will not be functioning.
https://whatismyipaddress.com/nat
http://www.omnisecu.com/cisco-certified-network-associate-ccna/advantages-and-disadvantages-of-nat.php
FWs (Firewalls)
https://www.quora.com/What-are-the-impacts-of-incorrect-firewall-configurations
Description
Firewall is a system which is designed to prevent from unauthorized access to the network by blocking the Internet. Firewall can be a software and also a hardware.
Purpose
It is used to check and prevent the unauthorized internet to access to the network.
Advantage
-
-
Disadvantage
-
-
The organization needs to implement the Firewalls because this can make sure that the employees from the organization can access to the trusted website only and therefore, this can secure the network by preventing the employees from accessing to unknown website.
If its not set up properly, Firewalls will not work and the users cannot know whether the website that they access are secure or not.
https://searchmidmarketsecurity.techtarget.com/definition/network-scanning
https://www.techopedia.com/definition/4160/vulnerability-scanning
https://www.cwps.com/blog/the-advantages-to-using-a-network-monitoring-service
https://searchnetworking.techtarget.com/definition/network-monitoring
- Provide the description
- Discuss its purpose
- Give the advantages (2) and disadvantages (2)
- Explain why organizations need to implement it
- Explain what will happen if it is not configured / set up properly
DMZ (Demilitarized Zone)
Description
DMZ is a secure server where as an additional security that acts as an immigration between the Local Area Network (LAN) and the Internet.
Purpose
It checks whether the user is authorized or unauthorized to access to the Internet.
Advantages
- Adding the DMZ on the Local Area Network (LAN) can improve the network security.
- Unauthorized user cannot stole any information because they are restricted from accessing to the network.
Disadvantages
- Some users or employees cannot upload and download the web pages or other files.
- The DMZ can only be used to one network only (Cannot combine with private and public network on the same system).
The organization needs to implement the DMZ because the it can enhance or improved the Local Area Network (LAN) of the organization.
If its not configured/set up properly, the employees inside the organization cannot access to some of the network where the employees cannot just access to the website by the web server, but they also cannot use the printer which use the print server).
https://getthehelp.wordpress.com/2015/09/08/advantage-disadvantage-of-using-dmz/
NAT (Network Address Translation)
Description
NAT is a process where one or more local IP address are translated or converted into another IP address in order to make the network secure.
Purpose
It is used to hide the real local IP address of the user from the Internet.
Advantages
- To hide the real IP address from unauthorized access of system by the hacker.
- Improved the flexibility when connecting onto the public internet.
Disadvantages
- It can cause a delay on the IPv4 communication
- It can cause loss of IP traceability from the end-device to end-device.
The organization needs to implement the NAT because it can prevent from the unauthorized user from stealing the IPv4 addresses and access the local IP address of the employees inside the organization.
If its not configured properly, some of the technologies and the network applications will not be functioning.
https://whatismyipaddress.com/nat
http://www.omnisecu.com/cisco-certified-network-associate-ccna/advantages-and-disadvantages-of-nat.php
FWs (Firewalls)
https://www.quora.com/What-are-the-impacts-of-incorrect-firewall-configurations
Description
Firewall is a system which is designed to prevent from unauthorized access to the network by blocking the Internet. Firewall can be a software and also a hardware.
Purpose
It is used to check and prevent the unauthorized internet to access to the network.
Advantage
-
-
Disadvantage
-
-
The organization needs to implement the Firewalls because this can make sure that the employees from the organization can access to the trusted website only and therefore, this can secure the network by preventing the employees from accessing to unknown website.
If its not set up properly, Firewalls will not work and the users cannot know whether the website that they access are secure or not.
https://searchmidmarketsecurity.techtarget.com/definition/network-scanning
https://www.techopedia.com/definition/4160/vulnerability-scanning
https://www.cwps.com/blog/the-advantages-to-using-a-network-monitoring-service
https://searchnetworking.techtarget.com/definition/network-monitoring
Comments
Post a Comment