You are on page 1of 4

1 Running head: NETWORK SECURITY PLANNING

Networking security planning Networking security planning is essential in all organization and businesses. A network security plan is a statement that defines security purposes and goals of an organization. The policy governs communication of the organization between external and internal network. Implementation of an appropriate security policy assists in protecting organization data and systems. This paper will create a network security plan inclusive of identifying and analyzing network assets, security risks, security requirements, and security policy. Identifying and analyzing network assets To ensure effective security plan, network assets of an organization should be analyzed and identified. Inappropriate and damage of network assets is a high risk to organizations. Network assets include network data, internetworking devices, network hosts, company reputation, trade secrets, and intellectual property. Untrained users and unfriendly intruders to the network mainly cause network risks (Stauffer, 2001). Security risks There are different security risks that affect organizations network. One of the security risks is unauthorized access to the network. This is where the network of an organization is accessed by unauthorized persons. The second risk is organization information disclosure. This is

where valuable information is disclosed to people outside. The third risk is denial of service. This is a serious problem to organizations especially with one work station. Security requirements There are different types of security requirements for an effective network security is an organization. One of the requirements is time. Good quality time is necessary to design the network security system. The second requirement is the list of network services in the organization and reference network topology. The third requirement is the list of specification of the people using the network. The fourth requirement is the level of support of the employees. Security policy The security policy informs the technical staff, managers, and users their roles in the organization. Network administrator and security jobs are defined to enhance organization information security. The software must be updated frequently to enhance security. This assists in tracking network intruders. Users should change their password frequently to enhance information security (Waters, 2002). Network management strategies These are strategies that assist an organization in achieving security goals, performance, and availability. Likewise, they assist in facilitating scalability by analyzing network behavior and trouble shooting. In addition, they help in determining data collection methods. There are different types of network management processes. Performance management is one of the management processes. This process monitors the performance of the security system. The second management process is fault management. The process detects, diagnoses, isolates and

corrects problems. Additionally, it tracks trends and reports condition of the system to managers and end users. The third management process is configuration management. It maintains a record of network assets, operating systems, and network device configuration. The fourth management process is security management. The process generates, store and distribute encryption keys, distribute passwords and user names, analyzes configuration and collect, examine and store security logs. The fifth management process is Account management. The process tracks network usage in different departments. NMS (Network management components) include network management systems, managed device and the agent. NMS displays management data communicates with the agents and controls the managed devices. Managed devices stores and collects information managed. They include servers, bridges, switches and routers among others. The agent is network management software (Young, 2001). In conclusion, network security plan provides a more secure network in organizations. The security strategy enhances the ability of an organization to respond, prevent, and identify threats. This improves business applications for an organization, which increases productivity of an organization. Network management strategies assist an organization in achieving security goals, performance, and availability.

References Stauffer, D. (2001). Nothing but Net Business the Cisco Way. New Jersey: Wiley. Waters, J. K. (2002). John Chambers and the Cisco Way: Navigating Through Volatility. New Jersey: Wiley. Young, J. S. (2001). Cisco Unauthorized: Inside the High-Stakes Race to Own the Future. New York: Prima Lifestyles.

You might also like