3 General Ideas:
The three general ideas which are interesting to my preference would be,
• Network Security
• Network Architecture and
• Artificial Intelligence
1. Network Security:
Keeping a network secured is always mandatory because information cannot be share by a person who is unauthorized and network security is an advanced procedure where it will prevent possible access or misuse of information on network or modify any data on the network without having an access to it. There are several ways of network security by which a network can be secured.
The three sub-areas which I have selected in Network Security are,
Data Loss Prevention: Any company which has a network and few work stations which work on this network should make sure
…show more content…
So, NAC (Network Access Control) is the process which will be giving limited access depending on their designation.
2. Network Architecture:
This is one of the most important phase while creating a secured network. Network architecture will discuss the design of network which has both software and hardware connectivity along with process of transmission and communications in both wired or wireless networks. There are few topologies (star, bus, loop or mesh) and types of networks (LAN, WAN or MAN) which are to be considered and then need to work on the architecture accordingly.
The three sub-areas which I have selected for Network Architecture are,
Planning of Network Design: A proper planning of a network design will always lead to better results. Planning should be done in such a way that network should always run properly and should be secured 24/7. Strong firewalls and updated components are to be picked for proper planning of network. There should always be a space in network so that we can either expand or add few more components to network which will make network even more big. Blueprints of networks must be made prior to network design because they are the ones which will be helpful in designing the actual network.
Data Transfers within the network: Making sure that data is
Also one has to know what type of network has been worked on, what network topologies the security is going on. The ring topology is going to be different from a bus or star topology. The hybrid is going to be different from the mesh topology or even wireless, this can be one of the hardest networks to protect. Also one has to think about size when it comes to building a network. Most people most of the time can’t tell the different between a big network and a small network. Big networks mostly consist of multiple several servers, computers and other device which connects to the network from the outside. All these devices need to be protected or secured when it’s connected to the internet and the network. Big networks are used mostly in bigger institution and organization where by 30 or more computers and server are used and are all linked to the network. Also speed is a factor when it comes to the internet networks but most importantly it’s important to bigger institutions and companies. Policy is one thing that most organization needs because if they want their network and the use of internet to be secured. Policies have to cover all aspect that the network is in. There has to be a lot of thought put in and all devices and how they connect to the outside world has to be considered. Small networks sometimes don’t have benefits and the down fall bigger networks have. Although speed is a factor, one
In this modern day and age of computing, networks are a huge part of IT. It is important now more than ever that data sent over any network, whether it be a LAN (Local Area Network) or WAN (Wide Area Network; The Internet) is kept safe, private (when required) and uninterrupted in
Security is almost certainly the most difficult aspect of a network to perfect. It is important to have the correct procedures and components in place to make certain network security is being accounted for and addressed on any given network. The journal, “Future Generation Computer Systems” elaborates on this necessity for an information system. “Future Generation Computer Systems”, this component of a network is discussed thoroughly. “Essentially securing an Information System (IS), involves identifying unique threats and challenges which need to be addressed by implementing the appropriate countermeasures” (Dimitrios Zissis, Dimitrios Lekkas, 2012). This was achieved through configuring access lists as well as CHAP configuration on the routers connecting to the edge
5. What are the three primary methods for implementing security on this network, as well as the advantages and disadvantages each?
contains the case narrative, related figures, and a set of questions and problems. These do not have one unique solution. There are too many alternatives when dealing with LANs, WANs, MANs, BNs, and the Internet, so a reallife network design and development problem can have several workable answers.
Peterson, L. L., & Davie, B. S. (2011). Computer Networks, Fifth Edition: A Systems Approach (The Morgan Kaufmann Series in Networking). Morgan Kaufmann.
While analyzing the network for vulnerabilities, risks, threats and ways to secure the network, the below information are my findings.
If the employee was behind the data loss then security privileges for employees must be updated. The company can increase remote access security by employing VPN services with validation through RSA tokens or biometric data. In addition, the employee should not have been able to access technical information and employee data. The companies User Access Controls need to be updated to comply with security standards. A clear demarcation needs to be established between difference divisions of the companies. The password requirements need to be updated to prevent simple password creation for access to company
Because of a staggering influx of Internet business, the network administrator’s task is to boost network performance and availability as much as possible. The company also wants a network design that’s easy to reconfigure and change because workgroups form and disband frequently, and their membership changes regularly. All computers must share sensitive data and control access to customer files and databases. Aside from the customer information and billing databases, which run on all servers, employees’ desktop computers must run standard word-processing and spreadsheet programs. Use the following write-on lines to evaluate the requirements for this network. After you finish, determine the best network topology or topology combination for the company. On a blank piece of paper, sketch the network design you think best suits EBiz.com’s needs. Remember: High performance and easy reconfiguration are your primary design goals!
Security is a fundamental aspect of any network infrastructure. The goal is to always have the most up to date programs and protocols to ensure the protection of the network. No aspect is too small to over look. That could mean the difference between a secure network and a compromised network. The best way to achieve this is to break down every level and approach each one as a separate entity and secure it. Then you can modify it to suit the needs of your network.
The computer networks should be made secure such that the hackers could not access the interior of the network. This should be achieved through the strong authentication, antivirus software, firewalls, and intrusion detection systems.
Design a defense in depth network. Research the latest technology such as firewalls, IDS, IPS, VPN, Virus Protection, and Malware Protection. Describe your design and the technologies used. Defend your design and provide a logical diagram of the system.
Before going further on this document, first we need discuss some basics of networking, so that it would be easy to understand the topics easily.
Network security has changed significantly over the past years. There is more and more data to monitor and analyze in order to detect the activity of your data and systems. Securing a network has many variables. Password authentication, network access, patches, anti-virus protection, intrusion detection, firewall and network monitoring tools are just a few of the things you can do to protect yourself.
The architecture of a network layout shows a detailed view of resources and a across-the-board framework of all the resources accessible to the organization. The networks physical layout is influenced with security in mind. Things to be considered are, where the servers are to be placed, firewalls and other hardware components. This includes the types of devices, printers, routers and other peripherals, including table decisions and other hardware component parts useful communication. The access method topology you use determines how and where the physical wireless connections need to be placed as well as what protocols and software rules will be used to regulate the network architecture. Network architecture in most scenarios is developed and organized by a network administrator. A larger network would require coordination with network design engineer. A network architect needs many areas of experience to determine will the network be wired or wireless. Other areas to consider are,will the network be classified as a LAN, MAN or WAN. The best topology needs to be decided based on the equipment layout, such as star, loop, bus, mesh, etc; .The network architect needs to put direct rules for security, recognize and prevent potential problems, and document everything done. The first and most important item to be addressed is to set goals to work within a given budget while designing the most