Technical Paper

2647 WordsOct 18, 201411 Pages
center23002311409410012100center818008227695Goodman, Jeremy Yaw Frimpong, Ph.D.CIS 502 Theories of Security Management September 1, 2014 941009200Goodman, Jeremy Yaw Frimpong, Ph.D.CIS 502 Theories of Security Management September 1, 2014 center700007040880Abstract Risk Assessment for Global Finance, Inc. Network. 9410010000Abstract Risk Assessment for Global Finance, Inc. Network. -5715003009900Week 10 Technical PaperRisk Assessment 036300Week 10 Technical PaperRisk Assessment Introduction Global Finance, Inc. (GFI) is a hypothetical company, which has grown rapidly over the past year. GFI has invested in its network and designed it to be fault tolerant and resilient from any network failures. However, although the…show more content…
PSTN is the world 's collection of interconnected voice oriented public telephone networks, both commercial and government-owned. It 's also referred to as the Plain Old Telephone Service (POTS) CITATION Lin05 \l 1033 (Lin, 2005). The GFI network supports a virtual private network (VPN). A VPN is a private network that uses a public telecommunication infrastructure, usually the internet, to securely connect remote sites or individuals together with secure access to an organizations network. Instead of using a dedicated connection, a VPN allows remote client workstations to use a special key exchange that must be authenticated by the VPN. Once authentication has been verified, a secured network connection, also known as a tunnel, is established between the workstation and the access point of the organizations network. All traffic is encrypted through the VPN tunnel, which provides an additional level of encryption and security CITATION She11 \l 1033 (Shelly & Rosenblatt, 2011). A VPN ensures privacy through security procedures and tunneling protocols such as the Layer 2 tunneling Protocol (L2TP). Data is encrypted at the sending end and decrypted at the receiving end. Basically the protocols, by encrypting data at the sending end and decrypting it at the receiving end, send the data through a tunnel that cannot be entered by data that is not properly encrypted. An additional level of security

More about Technical Paper

Open Document