Data Communications and Networking
Why is the current practice of securing the enterprise by hiding it behind hardened firewalls becoming extinct?
Firewalls are increasing losing their popularity in business operations. One of major reason towards abandoning current systems of the network is the introduction of new systems and better technology that brings effective and efficient security, privacy and confidentiality. Host-based firewalls which are also called personal firewall is one of technology that is being implemented and completely makes traditional forms of firewall unpopular. Network firewall has a high risk of being penetrated through attacks. It is designed with a purpose of protecting the perimeter of a network. Attackers have a high potential of attacking and penetrating through the perimeter of the network through sophisticated methods and techniques (Tony, 2015). Once intruders and hackers penetrate perimeter firewall, internal systems are left open and at high risk of being manipulated. The invention of better ways of big data handling has led organizations adopting cloud-based architecture to secure their systems.
Network firewall cannot protect all kinds of attacks. Hackers and intruders use hybrid worms through email systems and find a way into unsecured systems inside the system. The architecture of firewall is designed to create difficulties for penetrators to find a way into the system. It does not guarantee total security it just provides unfriendly interaction with attackers ensuring that it is unattractive to access. It has been noted that a firewall cannot prevent every intrusion. Network firewalls which include software based Microsoft Internet security and acceleration (ISA) as well as hardware based Nortel Networks Alteon Switched Firewall systems protect the perimeter of the network by watching packets traffic that enters and leaves (Tony, 2015). Host-based firewall protection architecture implements cloud computing architecture that secure personal sensitive data and information securing both perimeter and internal systems within the entire system. New security systems of implement protection technology applied by the Internet Connected Firewall (ICF). Cloud-based security and privacy control systems implements Windows server’s techniques to secure permanently (Steve, 2007).
The new technology of things has also influenced changes in abandoning firewall security techniques. Designing, maintaining, and controlling network is highly costly. Repairs and human involvement in monitoring networks are costly, unproductive and more time consuming. Business entities are emulating new technology by combining Internet of Things (IOT), cloud computing and Bring Your Device (BYOD) technologies to carry out business activities more economically (Mike, 2015). Implementation of such technologies has reduced the number of physical connections like wired connections; decreased the number of hardware components like servers, and minimized the cost of implementation (Tony, 2015). Such technologies have led to completely abandoning of the complex wired network that requires perimeter firewall within servers. It makes network firewall security an absolute system architecture to implement desired security.
What should network engineers expect to happen with security in 2 years?
Growth and development of technology have promoted a high number of people turning into the use of wearable devices, mobile devices, and personal device assistance. Increased use and proliferation of complex and sophisticated mobile devices has increased the need to apply such devices in organization transactions and operations. Mobile devices such as iPhone, Smartphone, iPad, and iPods provide powerful processing, reliable storage repository system, as well as increased applications has made organizations to rely more on personal devices (David et al., 2016). Currently personal data and information as well as organization sensitive information have been migrated to personal devices. BYOD is effective and efficiently overtaking traditional office working strategies to implement work at any location through handheld devices. Companies have encouraged workers to bring their handheld devices, install business applications and start operating and accomplishing office duties while at the comfort of far from office places (Mike, 2015). Company databases, transactions, and client information, have been migrated to individual personal and portable devices to facilitate easier and efficient transactions.
However, high threats are associated with current trends which include high chances of losing the personal device; handheld devices are getting stolen, as well as encountering hacking and intrusion attacks. Such problems have led to the invention of secure methods of securing sensitive data and information. New security techniques are being applied to ensure privacy and confidentiality of sensitive organization data (David et al., 2016). Data and information stored on the portable device can be controlled at a remote location. Device owner can delete and clear information when the device is stolen.
What will networks look like in 2 years, given the proliferation of mobile devices?
Due to the shift of technology, security on handheld devices is likely to advance and implement big data concepts. One of the major changes expected is an introduction to new and advanced Internet of Things (IOT) technology (Mike, 2015). Many hands held devices are likely to access protection through cloud-based technology whereby malware scanning systems shall be found within the cloud. Services such as penetration analysis software, intruder detection systems, and intruder prevention applications shall be accessible as an application through cloud-based architecture (Tony, 2015). Security to personal data shall implement security parameters such as encryption, biotechnology, passwords, and username authentication credentials. Facial, voice, and other sensitivity oriented protection shall be included on most BYOD.
David P., Rich Z., Anne G., & Matt C. (2016). Mobile Device Security in the Workplace: 5 Key Risks and a Surprising Challenge. Retrieved from: http://focus.forsythe.com/articles/55/Mobile-Device-Security-in-the-Workplace-5-Key-Risks-and-a-Surprising-Challenge
Mike K. (2015). Internet of Things Security Gets Personal. Retrieved from: https://www.virtualizationpractice.com/internet-things-security-gets-personal-32214/
Steve L. (2007) The Internet Firewall: R.I.P.? Retrieved from: http://bits.blogs.nytimes.com/2007/09/11/the-internet-firewall-rip/?_r=0
Tony N. (2015).Firewalls. Retrieved from: https://technet.microsoft.com/en-us/library/cc700820.aspx