Research and select a current trend in the area of telecommunications. Prepare a 10-15 page paper in Microsoft Word (counts as 11% of the final grade) AMU approved APA format (see Writing@APUS in the Resources Center) (350 words per page). At a minimum include the following:
- Detailed description of the area researched
- Technology involved in the area
- Future trends in the area
- Example companies involved in the area
- Regulatory issues surrounding the area
- Global implications for the area
- References (minimum of 10)
Part 2.
Prepare a 10-12 slide Microsoft PowerPoint highlighting the content from the paper.
As part of your presentation, you will be required to record voice overs in your presentation. Each slide should have a voice narration explaining the slide and adding any additional content you feel is appropriate. You can find out how to do voice overs from this web site.
The paper must by at least 10 pages double-spaced, 1" margin all around, black 12 point fonts (Times New Roman, Arial, or Courier) with correct citations of all utilized references/sources, (pictures, graphics, etc are extra – allowed but extra for the minimum page count). The title page and references are also required but don't count in the minimum page count. The PowerPoint of 10-12 slides is a summary of this paper. No new topics, ideas or concepts are introduced in the PowerPoint that is not included in the paper. A minimum of 10 references are needed. The paper will be subjected to checking against plagiarism.
1
2
Network Security: Principles, Protocols, and Practices
Prince Boateng
Instructor: Dr. Felix Hernandez
American Military University
Class: ISSC231
6/6/2024
I. Introduction
Keeping networks and computer systems safe from various threats requires continued attention to network security. In order to address some of the most significant questions raised on the subject, this paper's main goal is to review and analyze the fundamentals of network security as well as the associated protocols, procedures, and protocols (Ghiasi et al., 2023).
II. Fundamental Concepts of Network Security
Certain terms are defined, such as risks, vulnerabilities, and threats. Network attacks can be classified as either passive (sniffing) or aggressive (interception, grieving, and denial of service). Fink outlines a few of the information system-supported security objectives, such as non-repudiation, availability, confidentiality, integrity, and authentication.
III. Network Security Protocols
The necessity of implementing security measures to safeguard the networks is examined. Additionally examined are the functions and applications of the TLS and SSL protocols. IPsec, its subtypes (AH, ESP), and its modes of operation (Transport, Tunnel) are the subjects of discussion. Discussed are SSH features, as well as the usage of the internet in businesses and ideas like WEP, WPA, WPA2, and WPA3.
IV. Network Security Technologies and Tools
Stateful inspection, proxy firewalls, and packet filtering are explained. Two distinct IDPS methods—one based on signatures and the other on anomalies—are investigated. This section describes the benefits and drawbacks of both site-to-site VPNs and remote access VPNs.
V. Best Practices in Network Security
Reiterated is the importance of formal security rules and procedures. Periodically performing a thorough examination of security, assessing its risk level, and testing for vulnerabilities are advised (Mughal, 2022). Users must also receive education and training in order for them to understand the risks and hazards associated. The need of incident response planning and response teams is emphasized .
VI. Case Studies and Real-World Applications
Common missteps in data protection including the Target and Equifax information breaches are discussed to draw lessons for the future. Security implementation in organizations is described with emphasis made on various forms of successful outcomes adopted here and there.
VII. Future Trends in Network Security
Both new attack strategies and new threats are discussed. This topic also covers blockchain, artificial intelligence, security technologies, and applications of AI (Sun et al., 2021).
VIII. Conclusion
The document highlights the main issues, restates the enduring vulnerability issue, and offers research topics for more network security analysis.
References
Ghiasi, M., Niknam, T., Wang, Z., Mehrandezh, M., Dehghani, M., &Ghadimi, N. (2023). A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future. Electric Power Systems Research, 215, 108975.
Mughal, A. A. (2022). Well-architected wireless network security. Journal of Humanities and Applied Science Research, 5(1), 32-42.
Sun, X., Yu, F. R., & Zhang, P. (2021). A survey on cyber-security of connected and autonomous vehicles (CAVs). IEEE Transactions on Intelligent Transportation Systems, 23(7), 6240-6259.