Network security is a broad topic with multilayered approach. It can be addressed at the data link layer, network layer and application layer. The issues concerned are: packet intrusion and encryption, IP packets and routing tables with their update version, and host-level bugs occurred at data link layer, network layer and application, respectively.
The TCP/IP protocols are being used globally irrespective of the nature of the organization whether it belongs to general category of organizations or security specific sensitive organizations. The news -:”information about hacking of some website or portal by some undesired people is very common nowadays. This shows that TCP/IP protocols are susceptible to intercept. This generated a need to ensure all round security for the network in an organization. The task of network administrator had to widen to inc1ude the overall security of the network. He has to ensure that all parts of this network are adequately protected and adequate measures of security have been implemented within a TCP/IP network. He should be aware of an effective security policy. He should also be able to pinpoint the main areas of risk that the network may face. Basically, these main areas of risk vary from network to network depending upon the organization functioning. There are, therefore, various security-related aspects which have direct implications for network administrator along with the means to monitor the implemented measures of security effectively arid to tackle the problem of breach of security if it happens.
Basic Requirements of Network Security
The main objective of the network is to share information among its users situated locally or remotely. Therefore, it is possible that undesired user can hack the network and can prove to be harmful for the health of the network or user. There are few basic points which must be followed by network administrator to provide the network an adequate security other than network-specific security as in case of e-commerce, etc. These are given below:
- Networks are designed to share information. Therefore, the network must be clearly configured to identify the shareable information and non-shareable information.
2. The network should also clear with whom the shareable information could be shared.
3.With the increase of system security, the price for its management will also increase accordingly, therefore a compromising level between security and prices should be established as per the requirement of the network security system policy. This will largely depend upon the level of security needed to apply in the network, overall security requirements and the effective implementation of chosen level of security.
4. Division of the responsibilities concerning the network security must be clearly .defined between users and system administrator.
5. The requirements for security must be detailed within a network security policy of the organization that indicates the valuable data and their associated cost to the business. After defining the detailed network security policy and identifying the clear cut responsibilities in the organization, the system administrator should be made then responsible for ensuring that the security policy is effectively applied to the company environment, including the existing networking infrastructure,