Networking and Internet Security
The aim of developing the Web was to deliver information, although it was hard to envision the vast amounts of information that would have involvement of the nature of the information. Furthermore, few people would forecast the potential flaws in the way networks and the Web would be designed. Although the networks are useful in the sharing of information among numerous people that are interconnected, there should be the integrity of the information whether in storage or during transit. That is because the attackers also leverage the internet and the advancement of technology to come up with malicious codes that pose a threat to the integrity of the information being sent through the Web and the networks. The firewalls that had developments over a decade ago are no longer providing the required security that can counteract all types of malicious codes.
Why is the current practice of securing the enterprise by hiding it behind hardened firewalls becoming extinct?
Security is insufficiently addressed in businesses and the systems that these enterprises build and operate. The idea of securing their networks by hiding them behind hardened firewalls is not going to work due to the trends in the security issues and the broad range of the security paradigm. It is crucial to note that security is a broad area, and this makes it challenging to define secure business processes as well as to develop and operate the associated systems and applications in a secure manner (Mouratidis & Giorgini, 2006). The hardened firewalls were built without the envisioning of the position of the networks in the years to come. They were sufficient in securing networks the time they were being built, but it is not uncommon many times to hear about the intruders breaking into networks and accessing the enterprise networks hidden behind the hardened firewalls.
These firewalls will no longer adequately secure those organizational networks also because of the increasing openness of the enterprises and their corresponding systems, because of the rise of the Web as well as the e-business technologies. That makes it very difficult to achieve sufficient security for these networks especially by leveraging the hardened firewalls in today’s distributed environments, because many individuals, organizations, mechanisms, and technical components have involvement. Additionally, as modern business processes are becoming more complex, the problems space can no longer be easily understandable for the people involved in designing these firewalls. Thus, because these firewalls can no longer secure networks, in two years to come they will not be useful.
What the network engineers expect to happen with security in 2 years
Because many of the security issues are new and complicated, the network engineers expect that into years to come there will be the development of complex solutions that will counteract those security problems that are prevalent in today’s networking. The designer of the security solutions is likely to devote themselves to gain more knowledge codified via the standards and the literature regarding the security patterns. These designers will make use of the network security patterns and come up with a solution that is far much smarter compared to the current security solutions such as the firewalls. If the network engineers do not devote themselves to the security technologies, mechanisms, issues, and their complexity thereof, it will be hard for them to understand the evolution of enterprise security. The software developers will leverage the security patterns to untangle the tricky problems to something that is elegant, direct and versatile (Mouratidis & Giorgini, 2006).
However, no pattern is an island. Even though pattern aims at offering a self-contained solution for addressing one specific issue, patterns are independent of one another. There are many relationships between patterns. One of the most important relationships that exists between patterns is their refinement, that is, the security solution proposed by a given pattern can have implementation via the help of other patterns that in turn aiding solving the subproblems of the major problem. That association between the patterns, along with the genericity will allow them to have combination and integration with one another to form large software architecture as well as the security designs that are consistently and coherent in their whole and their comprehensiveness (Hybertson et al., 2013). The approaches that were applicable in securing networks by the network engineers would no longer be useful in 2 years to come.
Networks 2 years, given the proliferation of mobile devices
One of the most challenging situations for organizations in this era of BYOD (bring your device) is the way to maintain the security and control of the devices that have usage in accessing proprietary data (Jensen, 2013). As the enterprises are enabling a broader access to more information including the critical and highly sensitive information, there will need to make sure that the access is secure and that more control tackles pace over these devices. In 2 years to come, we expect the network and the associated technologies to allow for remote management of the devices, their de-authorization, and the disposable of information on those devices but in a secure manner. The management of the enterprise networks will no longer have confinement within the organizational premises, but it will have to give a large measure of control across the entire network that incorporates even the mobile devices.
The Internet and the networks are evolving day by day due to the advancement of the technologies that are used to manage or access them. The security devices having usage in securing networks will become extinct, and there will be a need for the development newer devices that addresses the increasing complexity of network security. The network engineers should be prepared for the evolution of the network security solutions as they will not be the same as they are today. The security and manageability of the networks will also take into consideration the proliferation and the interconnectivity of the mobile devices.
Top of Form
Bottom of Form
Top of Form
Hybertson, D., Sommerlad, P., Schumacher, M., Buschmann, F., & Fernandez-Buglioni, E. (2013). Security patterns: Integrating security and systems engineering. Hoboken, N.J: Wiley.
Jensen, G. (2013). Mobile device management within your enterprise. Retrieved from https://blogs.oracle.com/OracleIDM/entry/mobile_device_management_mdm_within
Mouratidis, H., & Giorgini, P. (2006). Integrating security and software engineering: Advances and future visions. Hershey, PA: Idea Group Pub. Bottom of Form.