StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

LAN and LAN to WAN Infrastructure - Essay Example

Cite this document
Summary
This paper will analyze a security problem, a proposed technical change to address the problem and an estimated budget of the proposed solution. The problems to be discussed in the paper revolve around improving the security domains of the organization, more specifically the LAN domain and LAN to WAN domain…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.8% of users find it useful
LAN and LAN to WAN Infrastructure
Read Text Preview

Extract of sample "LAN and LAN to WAN Infrastructure"

LAN AND LAN TO WAN INFRASTRUCTURE LAN and LAN to WAN Infrastructure Security is often easier to define when it is broken down into parts and sections. An information system is made up of the operating system, application software and hardware that seamlessly work together to store, process and collect data for organizations and systems. King (2007) stated that it is the sole responsibility of organizations and businesses to protect their data in addition to ensuring that their customer information and privacy is safe. Subsequently, this paper will analyze a security problem, a proposed technical change to address the problem and an estimated budget of the proposed solution. The problems to be discussed in the paper revolve around improving the security domains of the organization, more specifically the LAN domain and LAN to WAN domain. The Current Problem and Its Significance Adequate internet security is one of the major challenges faced by businesses in today’s economy and the world at large. Vital information transferred over internet applications and networks on which governments and businesses depend on is usually facing unauthorized access. The process of organizing, gathering, finding, analyzing and managing of vital business information is crucial to the survival and success of a business. In 2003, computer viruses caused 55 billion in losses to businesses worldwide. In 2011, a solitary instance of unauthorized access cost Sony more than $170 million. On the other hand, Google suffered a $500,000 loss in 2005 as a result of hacking. According to King (2007), single hacking instances can cost a firm or organization as much as $7 million a day. However, this also depends on the company’s revenue. In addition to the financial cost, hacking leads to time wastage. This is because employees remain idle while the systems are down.King (2007) implied that while big organizations have the financial capacity to absorb the costs emanating from such events /attack and revenue can be quite detrimental to operations of small firms. In this regard, a firm or business is often faced with a lot of vulnerabilities. Design flaws, incorrect implementation, poor security management, social engineering, and IT vulnerability are among the major sources of security weakness in an organization.The organization has a weak and outdated LAN and LAN to WAN infrastructure. This exposes the company to a lot of risks. As a result, personal, intellectual and private data handled by the organization can be easily accessed by unauthorizedpersonnel A Technical Solution The LAN domain is an amalgamation of computers, which are interconnected to one another or to a common medium. Mediums include radio waves, wires or fiber optic cables. The organization’s LANs are organized by department or organization. The network interface card (NIC) is the first component of our new setup. The NIC is the interface inbetween the physical media and the computer. The NICpossesses a 6 byte media access control which acts as its unique identifier. Ethernet LAN is the second physical component. This component will be based on the 10/100/1000 mbps’s IEEE 802.3 CSMA/CD Ethernet networking. An unshielded cabling with RJ-45 jacks and connectors will be the third component. This will help in connecting physically to the LAN switch. King (2007) defined a LAN switch as a device which connects the relevant workstations with the Physical Ethernet LAN. Additionally, the system will have wireless access points within the network. Since the organization is small, a single access point will be enough. However, more access points can be introduced as the organization grows. The access point will act as radio Trans receivers. As such, it will transmit IP packets to a WAP from a WLAN NIC. WLAN signals are transmitted by the WAP to mobile laptops. Unshielded pair cabling will connect the LAN switch back to the WAP. LAN and Router Layout The major part of the LAN domain is made up of system administration and file and directory services. The latter consists of directories, folders and servers to which a user can get access while system administration is made up of user accounts with the relevant log in and password controls. In order to tackle LAN vulnerabilities, data centers, computer rooms and wiring closets will be made secure. Vulnerabilities may arise from within the OS itself or the LAN server softwares. Strict and firm access control standards, policies, guidelines and procedures have to be defined in order to increase the network safety. Additionally, second level access checks will be employed for individuals accessing sensitive applications, data and systems. Moreover, server/laptop/desktop vulnerabilities will also be addressed by reviewing vulnerability policiesand guidelines. In addition to these security measures, a vulnerability assessment will have to be conducted periodically to identify security gaps and lapses. According to King (2007) a vulnerability assessment can be defined as a review undertaken on softwares with an aim of identifying software threats. These threats will be mitigated via software fixes and patches. The implementation of this domain will enable the firm to drastically minimize data loss or unauthorized access. To enable outside users to access the company information, a LAN to WAN domain will be created. It links the company to the world. IP routers, firewalls, intrusion prevention systems, demilitarized zones, proxy servers, email quarantine systems and web content filters will be instituted in order to guarantee the organization’s security. Designing and Implementing a Security Plan The following steps will be followed while implementing the security plan: first, Identify information to be processed and collected. Second, survey the regulatory and legal landscape. Third, examine/gather internal policies. Fourth, assemble the IT team to evaluate the program risks, Design and implement the solutions to the identified problem. The cost of implementing this program that ranges between 1 to 2.5 million will be valued by independent auditors and valuers. However, it’s cheaper to implement this system than wait to suffice the costs associated with a security breach. A privacy design approach will be employed in addressing data and privacy risks when the solution is being developed. In other words, legal compliance, data protection and customer privacy will be the major focus through the lifecycle of data collection, processing, and storage.Lastly, a breach response plan is necessary in every organization. This part is very critical to a security plan. It details and maps out how to respond to an actual or suspected breach. For the plan to be effective, breach response leaders should be identified so as to guide the team of experts in case of an emergency. Additionally, the plan should be scenario based and easy to follow. Estimated budget Item Cost ($) Computer 20 200, 000 . Ethernet LAN 80, 000 NIC 50, 000 WLAN signals 120, 000 Total 450, 000 Schedule Start project Date Purchase of all materials 1st month Connections 2nd Month Testing for operations 3rd Month Beginning of operations End of 3rd month References King, P. (2007). In the new converged world are we secure enough?. Information Security Technical Report, 12(2), 90-97. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“LAN and LAN to WAN Infrastructure Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/english/1671609-lan-and-lan-to-wan-infrastructure
(LAN and LAN to WAN Infrastructure Essay Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/english/1671609-lan-and-lan-to-wan-infrastructure.
“LAN and LAN to WAN Infrastructure Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/english/1671609-lan-and-lan-to-wan-infrastructure.
  • Cited: 1 times

CHECK THESE SAMPLES OF LAN and LAN to WAN Infrastructure

Custom Building of an IT Infrastructure of an Organization

The aim of the paper “Custom Building of an IT infrastructure of an Organization” is to analyze the selection of the right IT infrastructure for the organization.... nbsp;Once the organization has come to an understanding with the IT department too custom build the IT infrastructure, there are various methods which can be of great help in achieving this.... This method of building your IT infrastructure is the best so far since in as much you get expert advice on how you can solve your problems with their diverse experience and knowledge; they will give you different alternatives and then help you in deciding the right avenue for your organization....
10 Pages (2500 words) Assignment

Plan an effective IT infrastructure based on the needs of an organization

The connection is Effective IT infrastructure based on the organization's needs Number Internet technologies employed for in-home access vary according to the needs of the homeowner.... The historical 1984 ruling to break up AT&T had an important effect on the telephone infrastructure in the USA.... It infrastructure & its management.... IT infrastructure architecture:infrastructure building blocks and concepts....
2 Pages (500 words) Essay

Bloomington Meals on Wheels Organization

nfrastructureThe study agenda of infrastructure at The Bloomington Meals on Wheels organization will constitutes the staff, volunteer, organizations, information and funding.... Further studies will focus how; infrastructure involves human resource where work force, skills, abilities, and knowledge is propelled by the human resource....
2 Pages (500 words) Essay

Influence of the development of low carbon infrastructure in future

A low carbon infrastructure refers to a system of networks that allows a similar level of service like the one existing traditionally, but one which reduces the carbon emissions markedly, compared to the traditional approaches (Chester, et al.... Thus, the attempt to alter the existing infrastructure through replacing it with the one that produces s carbon emissions would mean that certain tradeoffs must be made between meeting the societal needs the way they were traditionally met, and achieving the new objective....
8 Pages (2000 words) Essay

Assessing Infrastructure Failure

This essay discusses that infrastructure plays an important function in the communities through sustains and acts in response to natural calamities to lessen their brunt, such as buildings for safe haven and bridges for flight.... hellip; In today's global warming, extreme weather conditions pose a high risk of structural failure of infrastructure.... Natural disasters like the Hurricane in the United States and the earthquake in China caused inconsiderate damage to the infrastructure that the public and industries relied on....
1 Pages (250 words) Essay

Impact of Globalization on Managing an IS Infrastructure

The author speaks about the extremely complicated management of the IS infrastructure.... Hence, it can be apparently avowed that both configuration and preventive maintenance is essential to manage an organization's pertinent IS infrastructure.... This study looks into the ability to accept a variety of innovative technologies....
5 Pages (1250 words) Research Paper

Influence of The Development of Low Carbon Infrastructure in Future

This work called "Influence of The Development of Low Carbon infrastructure in Future" describes climate change as threatening human life on earth with its effects already being felt in some parts of the world.... infrastructure is one area that emits a substantial amount of carbon compounds to the atmosphere....
7 Pages (1750 words) Essay

Managerial Issues in Managing an Organizations Is Infrastructure

This essay is about the "Managerial Issues in Managing an Organization's Is infrastructure".... This paper is made to focus on managerial issues related to managing an affiliation's Information structure infrastructure.... Another managerial issue related to managing an affiliation's information structure's infrastructure is working on a responsive and adaptable information system infrastructure.... Another issue related to managing an affiliation's IS infrastructure is making and Managing Scattered Structures....
4 Pages (1000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us