Sign In
Not register? Register Now!
Pages:
5 pages/β‰ˆ1375 words
Sources:
Check Instructions
Style:
APA
Subject:
IT & Computer Science
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 30.38
Topic:

Detecting and Preventing Unauthorized Outbound Traffic In Network Security

Essay Instructions:

Write 6 page paper for the topic Detecting and Preventing Anonymous Proxy Usage.
Please provide 5 five references

Essay Sample Content Preview:

Detecting and Preventing Unauthorized Outbound Traffic in Network Security
Student’s Name
Institutional Affiliation

Detecting and Preventing Unauthorized Outbound Traffic in Network Security
Many security experts are more concerned with controlling inbound than outbound traffic. In particular, outbound traffic entails the information that is going out of a specific network. Indeed, it poses unique risks that should not be forgotten when securing or designing a computer network. Since it is difficult to close all ports and maintain access to the Internet, it is also not possible to eradicate all risks that are linked to outbound traffic. The most significant thing that security experts need to understand is the risks associated with different ports so that they can make informed decisions when securing a particular network. Renowned ports start from 0-1023, registered ones from 1024-49151, and dynamic ports from 49152-65535. For example, port 20 and 21 facilitate file transfer protocol (FTP), port 443 enhances hypertext transfer protocol security (HTTPS), and port 5050 is a multimedia control tool. In reality, detecting and preventing unauthorized outbound traffic in network security is a significant strategy that can enable security experts to make pragmatic decisions when designing or securing computer networks.
For any organization using computers to access the Internet, there must be communication between the hosts and the web. In other words, networks are usually designed to allow the flow of traffic within the corporate local area network (LAN) and to access relevant resources from the Internet. Specifically, the traffic is limited to the User Datagram Protocol (UDP) and the Transmission Control Protocol (TCP) ports and the destination Internet Protocol (IP) address (Wippich, 2007). In one scenario, the traffic might communicate over a known port but on an unintended protocol. In the other scenario, the traffic can use the protocol that it is intended to but tunnel data in other unintended protocols. In both ways, there is a likelihood that security controls might engage in activities that are against corporate policies. Some of the risks linked to outbound network traffic based on the integrity, availability, and confidentiality triad include the access of malicious websites that might result in the compromise or infection of hosts, denial of services, malware distribution, and phishing. Others are insider information theft, unauthorized remote access, sniffing, and access to compromised network resources.
Outbound traffic is a significant weakness that makes numerous enterprises vulnerable to cyber-attacks. Organizations must devise proper ways to monitor their outbound connections. In some cases, legitimate applications can create outbound traffic without users realizing it. Some applications run in the background without being approved and utilize a firm’s resources unknowingly. They can create thousands of outbound connections, which are not identifiable on the process schedule. However, the only way that an organization can detect such outbound web connections is by monitoring its web logs regularly. That way, it becomes possible to identify unauthorized outbound connections and terminate t...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!