The various steps in management of network security
The network security management has been allowing the administrators to control the network. This has comprised of the virtual and physical firewalls from a centralized location (Kim & Feamster, 2013). The different steps in managing network security are demonstrated by the following answers.
1. Listing the six ways by which an attacker can gain access to network:
The six ways by which an attacker gains access to a network are packet sniffing, buffer overflow, dictionary attack, password cracking, brute force attack and social engineering (Barcena & Wueest, 2015).
2. Response on blocking the ICMP packets:
The ICMP can lead to reconnaissance. It is the cause to block. The pings could be used to find whether any host is on. Apart from this it also helps in determining whether the time exceeds the part of the traceroute for mapping the network architectures (Piskozub, 2014). A thoughtful, rational and measured approach is to be taken for the protections. To block the ICMP ultimately is not the proper idea. However, picking and selecting the ting prevented and found the origin would help to achieve the aim.
3. Features required delivering an effective VPN connection:
To make the VPN connection at first, the available account is to be found. The employees must be consulted to obtain the access this account. Then the scopes must be researches to the new report. For this, the type of privacy, security and the bandwidth required is to be considered (Houidi, 2016). As the VPN is purchased from the provider, payment should be made for the service. Then the provider would supply the data need to access the VPN.
The administrators have required solutions of network security management for receiving a massive level of visibility. This is towards the network behavior enforcing global policies, delivering the single management interface for the virtual and physical systems and so on. Thus the study shows that the management of network security supplies the visibility to the network. This must generate data for the assets, VPNs, security policies and so on. Moreover, ICMP comprises of essential features. As some of them are helpful in troubleshooting, some are vital to make the network function properly.
Barcena, M. B., & Wueest, C. (2015). Insecurity in the Internet of Things. Security Response, Symantec.
Houidi, Z. B. (2016, November). A Knowledge-Based Systems Approach to Reason About Networking. In Proceedings of the 15th ACM Workshop on Hot Topics in Networks (pp. 22-28). ACM.
Kim, H., & Feamster, N. (2013). Improving network management with software defined networking. IEEE Communications Magazine, 51(2), 114-119.
Piskozub, A. (2014). Modern Approaches Of Securing Computer Networks From Denial Of Service Attacks
International Journal of Computing, 4(2), 95-