Case Study - Securing the Network

623 Words3 Pages
Case Study Strayer University SEC 305 It is vital to ensure the safety of a central computer system that is accessed by multiple branches, staff members and remote users. The diversity of an enterprise environment dictates the need to consider multiple aspects when planning for access. Normally, an internal LAN is considered a secure network. Due to its broadcast nature, wireless communications are not considered as secure. Such networks are vulnerable to eavesdropping, rogue access points, and other cracking methods. For remote access, VPN solutions such as dial-up, IPSec VPN, and SSL VPN are commonly used and any access to data center devices must be protected and secured. In the data center,…show more content…
Wireless networks are designed for high mobility and flexibility. Mobility means that a user can move between various locations while staying connected to the network. Remote access enables users to access company resources from practically any location. The major requirement is to provide access to several user groups (authorized users, partners, customers), and associate them with the resources that they are allowed access. Internal LANs are usually considered more secure than wireless and remote access networks; however, opening the internal LAN to any user is a security risk. Many wired networks allow the majority of communications to go unencrypted. Therefore, wired networks are just as susceptible to eavesdropping as wireless networks, especially when an outsider can get a physical connection. Endpoint security encompasses the security measures that should be checked before a client is granted access to a resource. Endpoint security is a proactive way to make sure that only clients who pass all security policies are allowed access. It is a proactive way to prevent any virus or malware from entering the corporate network. Security measures could be different for different client device types (such as laptop, PDA or public area using Wi-Fi), and consist of checking the client antivirus software and version to validate personal firewall settings and verify client
Open Document