Security Technologies Involved In Network Modeling Computer Science Essay

The topology and arrangement of hosts within the web, the choice of hardware and package engineerings and the careful constellation of each constituent are the of import factors which are to be considered to construct and accomplish a well secured web.

SECURITY TECHNOLOGIES INVOLVED IN NETWORK MODELING

The dashing undertaking of procuring a web substructure is divided into manageable subdivisions in the proposed Network Security Model ( NSM ) . The development of the OSI theoretical account brings integrity in the architecture of web as such integrity can construct in procuring webs with the outgrowth of Network Security Model.

The NSM is used to repair and turn up an implicit in issue if an onslaught has succeeded on a web. There are three different beds in networking theoretical account.Any web security can analyze, implemented and maintained utilizing a well - structured NSM. The web patterning have three different beds.

DIFFERENT LAYERS IN OSI MODEL

Layer: 1

Physical Layer

ACL ( Access Control List )

Layer: 2,3

Data nexus bed and Network bed

VPN

Layer: 4

Transport bed

Port Security

Layer: 5,6

Presentation and session bed

IDS/ IPS

Layer: 7

Application bed

Firewall

ACL ( Access Control Lists ) :

Access control list identifies each object security property.

Get quality help now
Bella Hamilton
Bella Hamilton
checked Verified writer
star star star star 5 (234)

“ Very organized ,I enjoyed and Loved every bit of our professional interaction ”

avatar avatar avatar
+84 relevant experts are online
Hire writer

An entry for each system user with entree privilege is provided by Access Control Lists. Security property provides a list of objects and user entree privileges such as read, write or put to death, and users who have entree it. Security property is alone for each object. Access control list will be in the signifier of table which provides the item about the peculiar system object user such as single file or file directory to a computing machine runing system.

Get to Know The Price Estimate For Your Paper
Topic
Number of pages
Email Invalid email

By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email

"You must agree to out terms of services and privacy policy"
Write my paper

You won’t be charged yet!

ACL gives permission and ignorance to the host to entree in the web. It will be easy to command the onslaught if the Access Control Lists are strong. The power to supply permission and ignorance to traffic resource those who are allowed or non allowed to see for other webs is provided by the entree control lists. It limits the web traffic by which the web public presentation is increased. By curtailing the bringing of everyday updates, traffic flow control is maintained by ACL. It acts as an extra security which controls the type of traffic forwarded or blocked by the router Hence this entree control list Acts of the Apostless as the chief portion in beds of networking theoretical account.

ACCESS CONTROL LIST TYPES:

1. Standard access-list

2. Drawn-out entree lists

3. Masks entree lists

ACCESS CONTROL LIST BENEFITS:

1. It is really simple to implement

2. It is good mapped to our organisational constructions.

3. It is good known.

4. It is really easy to explicate

ACCESS CONTROL LIST DRAWBACKS:

1. , and the security system can be broken if checking is missed anyplace.

2. Any plan can be broken down with ace user permission.

3. It is unable to back up deputation.

PN ( Virtual private webs ) :

The unafraid transmittal of informations to unbarred webs is provided by a Virtual Private Network ( VPN ) .Using a practical private web remote sites and users can entree their web information without the cost connected with long distance calls or leased lines.A privateness in YPN is maintained utilizing security process s and tunneling protocols. A foreign protocol travel across a web by wrapping inside the host web pockets is enabled by burrowing. An extra security is provided through coding the informations by security protocol before transmittal.

VPN types:

1. Site-to-site VPN

2. Distant entree VPN

Protocols used by VPN:

VPN use three different types protocol.They are,

1. PPTP ( Point-to-Point Tunneling Protocol )

1. L2TP ( Layer Two Tunneling Protocol )

3. IP Sec ( Internet protocol security )

Benefits of VPN:

1. The information can be accessed remotely to any other topographic point utilizing VPN.

2. The information is kept secured and encrypted when we connect the web through VPN.

DRAWBACKS OF VPN:

1. VPN devices are non wholly fault tolerant even though there are attempts underway to turn to this issue.

2. While implementing VPN there are diverse picks.

Port Security:

The user -defined group of Stationss are limited utilizing secured ports. The portion of procuring the port is defined as the size of reference table.Any pocket with the beginning of references provided by us will non be forwarded to any outside group of references when you portion unafraid addresses to a secure port. The full bandwidth of the port is offered as security to the work station when there is merely one reference tabular array with merely one reference outside the group of references.

IDS/IPS:

Intrusion sensing engineering ( IDS ) is normally an extension of Intrusion -Prevention Technology. An art of observing inappropriate, incorrect or unknown activity is known as Intrusion Detection. It is used to find whether a computing machine web or waiter has experienced an unauthorised invasion or non. It is used to unplug the connexions holding unauthorized informations and bead packages of informations in bar system.

Updated: May 19, 2021

Similar topics:

Essay on Computers
Cite this page

Security Technologies Involved In Network Modeling Computer Science Essay. (2020, Jun 02). Retrieved from https://studymoose.com/security-technologies-involved-in-network-modeling-computer-science-new-essay

Security Technologies Involved In Network Modeling Computer Science Essay essay
Live chat  with support 24/7

👋 Hi! I’m your smart assistant Amy!

Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.

get help with your assignment