Reflections — Module 5

Zwivhuya
2 min readApr 25, 2021

Cybersecurity architecture

Image by Michal Jarmoluk from Pixabay

In this module, I learnt about network security principles and secure network management. The first unit dealt with how an information system architecture system can be optimised. The optimisation of networks remains guided by the five pillars of network security which include confidentiality, integrity, availability, authenticity, and non-repudiation. Nine design principles that can be leveraged to ensure that a network architecture addresses major vulnerabilities were suggested. Additionally, five technical network security measures that can be used to establish a basic level of cybersecurity were suggested. These measures are aimed at preventing unauthorised users from gaining access into networks.

The second unit dealt with the secure management of networks. The literature elaborated on the defence-in-depth strategy and the design of secure networks. An effective approach in securing information systems makes us of a layered and systematic approach to securing all elements that make up the networks. The defence-in-depth strategy dictates that when network security architectures are designed, every layer of the design must be secured in a manner such that an attacker faces unique challenges at every phase of their attack efforts. The idea is that by securing various layers of the network, the attackers activities can be detected and their responses can be depleted before further information assets are compromised. The strategy focuses on people, processes and policies. Secure network design principles include the creation of and secure of network security zones, and email and file transfer security.

To what degree is a technical understanding of computer networks and cyberthreats necessary in order to secure a network?

It is imperative that organisations have an information security team that consists of professionals who are experts in management and technical understanding of cybersecurity. Cybersecurity has various areas of expertise and each area is beneficial to the success of a cybersecurity program. The cybersecurity team should ideally consists of experts in difference areas of cybersecurity. Some expertise maybe be outsourced however some member of the team should be competent enough to articulate the activities of third parties in securing their network and how it affects the organisation netowrk. It is important that competent or highly skilled professional implements the technical measures to secure networks. It is important that every member of the security team has an appreciation of the various disciplines in cybersecurity however not all members of the team have to be technical experts in computer networks or threats.

How could you supplement your existing knowledge to bridge any gaps?

My knowledge in the high level/managerial understanding of the cybersecurity policy frameworks, and principles governing the design and management of networks has increased significantly. The principles for developing cybersecurity awareness programs has also increased significantly. I am considering enrolling for other advanced technical courses in cybersecurity.

--

--