Need Help With This Assignment?

Let Our Team of Professional Writers Write a PLAGIARISM-FREE Paper for You!

Network Control Journal Entry

Network Control Journal Entry

An initial appraisal of the security control system of the existing network should appropriately be conducted to enhance the control of our network. This includes establishing the current wired and wireless network infrastructure, mapping all available access points, and assessing the current security architectures implemented. For the weaknesses to be proffered, it should be easy to pinpoint them by drawing a detailed map of the network so as to effectively label all the connected devices and possible access points.

The next consideration is to evaluate general security and the operation of the networks and include issues such as firewalls, IDS, and encryption schemes. These systems need to be updated and configured appropriately to prevent any other problems that may interfere with their utility. The security tests include the audit and vulnerability scans that need to be conducted at regular intervals to detect potential loopholes that may be exploited by hackers.

Future considerations should also factor in how scalable and secure the network should be. Access control is an important aspect of a security plan, and thus, an effective control measure would not allow any other individual, apart from a user with authorization, to access the network. This would mean using security features, such as multi-factor authentication, and requiring all users to have a very difficult-to-guess and frequently changed complex password (Boyle & Panko, 2020).

For wired connection, access control is important as Ethernet cables need to be safeguarded from unauthorized physical connection. The same can be affected through NAC systems to ascertain that devices that want to get connected to the network have to fulfill the firms’ security policies. Security managers can evaluate, define, and permit or deny devices depending on their compliance with certain standards of security.

The next most important issue is access controls, especially on the wireless access points. It is noteworthy that wireless networks are most prone to unauthorized connections, given that these connect signals across a region. The wireless access points should be encrypted using the best form of encryption available, such as WPA3, and the SSID should not be broadcast to keep it hidden from anyone who wishes to penetrate the network. Additionally, the connectivity of only authorized devices on the network can be limited by MAC address filtering (Aboba & Simon, 2008).

References

Aboba, B., Simon, D., & Eronen, P. (2008). Extensible authentication protocol (EAP) key management framework (No. rfc5247).

Boyle, R. J., & Panko, R. R. (2020). Corporate computer security (5th ed.). Pearson Education (US).

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question 


You are responsible for strengthening the controls on the network. How would you review the current state and future state and provide recommendations for the network? Why would you need to set access control for the wired connections and wireless access points?

Network Control Journal Entry

Network Control Journal Entry

Your journal entry must be at least 200 words in length. No references or citations are necessary.