Securing Your Network

Network security is no-longer an option but rather a necessity. As technology grows, the more we need to up our game in securing data and the network environment. To achieve this we need to employ all possible solutions to have a 360 coverage starting from Packet Filtering, Application Gateway, Circuit level Gateway and Stateful Packet Inspection. One mode is not enough since attackers are gaining new tricks by the day. We no-longer think of the most basic attacks such as ping floods but rather SYN attacks as well which are on the rise. And in order to be on the safe side then we need to secure our network right from the devices as follows;

Host-based. Using the software solutions that come with operating systems such as windows firewall. The most significant concern in this scenario is that, no matter how good the firewall solution is, it is contingent upon the underlying operating system. In such a scenario, it is critical that the machine hosting the firewall have a hardened operating system. Hardening the operating system refers to taking several security precautions including:

  • Ensuring all patches are updated
  • Uninstalling unneeded applications or utilities
  • Closing unused ports
  • Turning off all unused services

Router-Based Firewall.Administrators can implement firewall protection on a router. In fact, even the simplest, low-end routers today have some type of firewall included. In larger networks with multiple layers of protection, this is often the first layer of protection. Although various types of firewalls can be implemented on a router, the most common type uses packet filtering. Users of a broadband connection in a home or small office can get a packet filtering firewall router to replace the basic router provided by the broadband company. Another valuable way to implement router-based firewalls is between subsections of a network. If a network is divided into segments, each segment needs to use a router to connect to the other segments. Using a router that also includes a firewall significantly increases security. If the security of one segment of the network is compromised, the rest of the network is not necessarily breached.

Screened Hosts. A screened host is really a combination of firewalls. In this configuration, a combination of a bastion host and a screening router is used. The combination creates a dual firewall solution that is effective at filtering traffic. The two firewalls can be different types. The bastion host might be an application gateway and the router packet screener (or vice versa). The most significant concern when using the screened host is that it essentially combines two firewalls into one. Therefore, any security flaw or misconfiguration affects both firewalls. When you use a DMZ there are physically two separate firewalls, and the likelihood of any security flaw being propagated to both is low.

All said and done, no matter how many firewalls you put in place in securing your network, make sure you get it right on where to place them in your network and to get the configurations right.

NOTE:The human element is the weak link towards cyber-security hence the need for user education, implementation of user policies and continuous training.

Trizah Ngugi

Senior Key Account Manager

4y

very educative..... well done! 

Like
Reply

To view or add a comment, sign in

More articles by Duncan Azenga

  • Security Information and Event Management

    Security Information and Event Management

    Network Security is a very important component in today’s cyberspace with the increasing level of technology. Major…

Insights from the community

Others also viewed

Explore topics