Device Hardening and Secure Network Design

Bragg, Rhodes-Ousley, amp. Strassberg (2009) stated that routers have the capability to carry out IP packet check and filter. Access control lists (ACLs) could be configured to authorize or refute UDP and TCP network traffic. These factors are foundational upon the destination or source address, or together, and on the UDP or TCP port numbers enclosed in a packet. Additionally, the firewalls are implemented for additional in-depth examination. tactically positioned router ACLs thus they augment network security. For instance, access control lists could be employed on border routers to drop visibly not needed traffic, eliminating the burden from the border firewalls. Access control lists can as well be employed on WAN links to drop broadcast and additional needless traffic (Bragg, Rhodes-Ousley, amp. Strassberg, 2009).Servers are intended to bring data in a protected and dependable style for web-based users. Thus, they need to make sure that data confidentiality, integrity, and accessibility are maintained. However, one of the main steps to attain this guarantee is to make sure that the servers are maintained and installed in a way that they could stop illegal access, illegal utilization, and disturbances in service. Additionally, the reason for establishing the server hardening policy is to express the requirements for installing a new server in a secure fashion and maintaining the security integrity of the server and application software. In addition, the server hardening process offers the comprehensive information necessary to harden a server as well as have to be applied for UTEP IT official approval. A number of the wide-ranging steps incorporated in the server hardening process contain (Microsoft Press, 2005). At present, network security has become the most important subject of discussion. Additionally, there are many networking security management and handling measures are available.

You Might Also Like