StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Data Networks, IP, and the Internet - Essay Example

Cite this document
Summary
This essay "Data Networks, IP, and the Internet" discuss technology solutions that can be classified under an independent contractor. It is a sole proprietorship offering consultancy services. The situation herein involves the legal existence of the firm and also inappropriate regulatory compliance…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.8% of users find it useful
Data Networks, IP, and the Internet
Read Text Preview

Extract of sample "Data Networks, IP, and the Internet"

Together with that, I was hired as an independent contractor thus restricted to certain information concerning the confidentiality of the business. The reason that leads to restriction of certain information is merely because such contracts are short lived. The firm may, therefore, fear providing all the essential information that may affect if revealed.  Under the IT contracts that the contract was based upon, contractors lack the technical and/or the operational history in examining the contracts.                                                                                                                     A contractor takes up a project without any knowledge of whatever might happen during the implementation of the strategy. The firm provided no information concerning the background history of the project and thus it becomes difficult to retrieve any information. In this case, in order to avoid future complication, the IT contracts should be reviewed and amended since this is a problem that is in existence. There is a need for the contractors to read the contractual agreement, understand it, and, agree to it after being convinced that it adheres to the required principles (Clark, 2003).     

Q62.

 What is the difference between Encryption, Virus, VPN and Firewall Securities?

The moment a computer is interlinked to other computers on a network, its content is vulnerable to risk. Thus, there is the urgent need to secure the computer from emerging threats such as viruses and hackers. Within the computing environment, it is very important to offer detection, prevention, and remedial actions for virus attacks. For this reason, there is the need of making a comprehensive analysis based on the vulnerability of computers to the security threats (Clark, 2003).

Difference between the firewall and encryption

Traffic to and from a computer is filtered by a Firewall while Encryption makes the traffic incomprehensible.

Difference between firewall and Anti-Virus

A firewall can either be hardware or software which prevents connections from malicious users while Anti-Virus finds executable programs such as Trojans which would rather damage files in the computer.

Difference between Firewall and Virus

A firewall prevents the computer from network attacks and limits exposure while a computer Virus is referred as a software program that can cause immense harm to the computer because of its ability of reproducing itself.

  1. a) Encryption is mostly used in electronic commerce in order to offer to protect customers’ private financial data. There have been instances where hackers steal credit card numbers and hence the need to use data encryption programs.

Viruses that are harmless may just cause a cryptic message to emerge when the computer is turned on since it is engineered to copy itself into other programs. A virus can be used in copying viral code into several numbers of files and other programs stored in the computer.

VPN is used in creating a wide area networks in a vast geographical area. This technology has been adopted by mobile users and companies that have branch offices because it can configure itself within a public network as a private network.

Firewall keeps the computer secure from intruders because they give secure access to the internet. Also, it separates the company’s public webserver from its internal network thereby making filtering unwanted packets.

  1. b) Prevention and resistance is the most effective means of dealing with external threats. With this in mind, the use of preventive measures such as Firewalls will keep intruders at bay.
  2. c) A diagram illustrating intranet and extranet.

Source: Clark, M. (2003).Data networks, IP, and the Internet: protocols, design, and operation, Chicago: John Wiley and Sons.

  1. d) The security diagram is fail safe because there is a Firewall which will filter unwanted packets. While the Company has a secured VPN and this will mean that its branches are secure. It is cost effective in the sense that it will save time and money. Given that, when a computer is affected by a virus it means that the company will have to shut its operations (Clark, 2003).

 

 

 

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Exam Essay Example | Topics and Well Written Essays - 500 words - 1”, n.d.)
Exam Essay Example | Topics and Well Written Essays - 500 words - 1. Retrieved from https://studentshare.org/business/1590923-exam
(Exam Essay Example | Topics and Well Written Essays - 500 Words - 1)
Exam Essay Example | Topics and Well Written Essays - 500 Words - 1. https://studentshare.org/business/1590923-exam.
“Exam Essay Example | Topics and Well Written Essays - 500 Words - 1”, n.d. https://studentshare.org/business/1590923-exam.
  • Cited: 0 times

CHECK THESE SAMPLES OF Data Networks, IP, and the Internet

Advances in Wireless Networks

Seeing the growing importance of computer networks in today's modern world, the management of University of Iland has decided to implement a new and more sophisticated network technology structure to better manage university tasks and operations.... Seeing the growing importance of computer networks in today's modern world, the management of University of Iland (UoI) has decided to implement a new and more sophisticated network technology structure to better manage university tasks and operations....
10 Pages (2500 words) Essay

Named data networking

Indeed, current networks have many innovations that have transformed how data are shared between various computers connected to the internet.... Indeed, current networks have many innovations that have transformed how data are shared between various computers connected to the internet.... How named data network works The development of the named data networking is based on a number of concepts that work to improve how data is shared across the internet....
5 Pages (1250 words) Term Paper

Network Access Protocols, Data Delivery

(Hall, 2000)the internet Protocol is a common internetwork protocol, which is used in x-stream.... Packets are taken from ip and are formatted by data-link management protocols to be transferred over the media (Gaffin, 2007).... The paper "Network Access Protocols, data Delivery" states that the information, which is found in the header of PDU at layer 4, does not find a destination network or a destination host.... Therefore, the port number is used to determine the process or application that is the right destination for data, when received (Insam, 2003)....
8 Pages (2000 words) Essay

Use of the Border Gateway Protocol

Data Networks, ip and the internet: Protocols, Design and Operation.... This comes into existence as the address provision in the internet is not in comparison as hierarchical to telephone dialing strategy, a number of the routers contained in the.... BGP is Introduction Border Gateway Protocol (BGP) is the routing protocol that necessitates the internet to operate.... This comes into existence as the address provision in the internet is not in comparison as hierarchical to telephone dialing strategy, a number of the routers contained in the service provider main networks partake in exchanging of information around a number of IP prefixes....
2 Pages (500 words) Essay

Web Application Optimisation

In order to reduce the amount of data needed to download these files, they should not be loaded at the header of the HTML document rather be loaded at the bottom(Sorensen, 2008).... The paper "Web Application Optimisation" states that the hosts of web accounts have no direct relationship with an optimization that is about to be performed (Cross, 2007)....
8 Pages (2000 words) Essay

Living in a Network-Centric World

The world has become a global village due to the introduction of data networks, especially the internet.... the internet has brought many resources, which range from cooking recipes to weather forecasts (Dye & Reid, 2014).... There are numerous advancements in the computers and data networks and their impact on communication, which are the outcomes of solid-state technology and the advent of large-scale integration (Bertsekas & Gallager, 1992)....
5 Pages (1250 words) Case Study

AOC Network Solution

The paper "AOC Network Solution" pinpoints the design of a LAN requires to consider the topology chosen dependent on the number of clients and servers making up the network.... The cost of the system has to in line with the client's budget.... It will determine the types of hardware and software to use....
5 Pages (1250 words) Essay

Conceptual Framework of Network

The most common example of a mesh topology is the internet.... Therefore, it transmits data in one given direction.... An excellent example of the bus topology is implemented in a computer in which the CPU, I/O devices, and the memory are connected on a common data and address bus.... Therefore, each node sends its data and relays signals from other nodes.... The main advantage of this topology is that various devices transmit data simultaneously, which means that the whole network can withstand high levels of traffic....
10 Pages (2500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us