Nobody downloaded yet

Computer Network Security - Case Study Example

Comments (1) Cite this document
This essay discusses that network security is continuously evolving and becoming a challenging aspect for organizations maintaining highly sensitive and customer data. New technologies derive benefits as well as new risks that are not limited to logical threats, physical and human threats…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.7% of users find it useful
Computer Network Security
Read TextPreview

Extract of sample "Computer Network Security"

Download file to see previous pages In order to protect digital information, organizations are keen to implement technical controls such as firewalls, Intrusion Detection Systems, honeypots and Demilitarized zones. These controls are considered as logical and provide security on the logical layer. However, often the important aspect i.e. information security management is not addressed to the optimal level. A typical information security program is led by an information security manager who establishes a steering committee for discussing security aspects focusing not only on the IT department but every department within the enterprise. Some of the management controls that are implemented by the information security manager are IT governance, Risk management, monitoring Key Process Indicators (KPI) and Key Goal Indicators (KGI). KPI demonstrates the current state of security within an organization and KGI demonstrates the level of security to be achieved. As per the current scenario, critical data must be protected by implementing Firewalls to secure the network from external logical threats and Virtual Private Network will be implemented for securing the data transmission on the Wide Area Network. 2 Detailed Network Security Recommendations 2.1 Fundamentals of Firewall and VPN Network security appliances are implemented for providing three fundamental functions i.e. prevention, detection, and correction. Some of the most commonly adopted security appliances are Firewalls and Intrusion Detection Systems. Firewall is defined as “a piece of software or hardware device that ? filters the information coming through the Internet connection into a private network or a computer system. Firewall enforces an access control policy between two or more networks with two key functions: to block unwanted traf?c, and to permit wanted traf?c” (Firewall.2007). Similarly, as per network dictionary, Intrusion detection system is defined as “Intrusion detection system (IDS) is a type of security management system for computers and networks. An IDS gathers and analyzes information from various areas within a computer or a network to identify possible security breaches, which include both intrusions and misuse”. 2.2 Recommendation for Firewall and VPN Remote access ‘VPN’ provide emulation of a workstation to a remote user. It can extend every application related to data, video or voice communication. Remote access ‘VPN’ can provide highly customizable and secure remote access to employees anywhere anytime with any compatible device (Vachon & Graziani,). They can access the network resources and data access with any compatible device. The remote access ‘VPN’ portrays a realistic user experience as the user access his own system. The access is more flexible and easy because it can be operated by any compatible computing device. Remote access ‘VPN’ supports a wide variety of connectivity options and platforms, fulfilling the user requirements efficiently. 2.3 Recommended Solution for the Enterprise-A recommended solution for the enterprise will be a hardware-based firewall that is also called as Adaptive Security appliance ASA 5500 from Cisco. The ‘Cisco ASA 5500 Series Security Appliances’ personalize the security for specific network requirements such as securing credit card transactions.  ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Computer Network Security Case Study Example | Topics and Well Written Essays - 1250 words”, n.d.)
Retrieved from
(Computer Network Security Case Study Example | Topics and Well Written Essays - 1250 Words)
“Computer Network Security Case Study Example | Topics and Well Written Essays - 1250 Words”, n.d.
  • Cited: 0 times
Comments (1)
Click to create a comment or rate a document
queenierolfson added comment 5 months ago
Student rated this paper as
The topic of "Computer Network Security" is quite popular among the tasks in college. Still, this document opens a brand new perspective of seeing the question. I’ll use the idea for my own paper.

CHECK THESE SAMPLES OF Computer Network Security

Network Security

...and how molecules move through the wall of a cell, how tornadoes and hurricanes form, and other complex natural and engineered phenomena” (About NCSA). The primary objectives for the National Center for Supercomputing Applications are: (About NCSA): To support powerful and reliable computing, for data and network resources, so that the researchers may assist themselves, from solving demanding engineering and science obstacles. Moreover, development and exploration is also conducted for architectures and techniques to amplify scientific computing. Assisting the researchers to facilitate them for full exploitation for astonishing resources that are available on the Internet i.e. with cyber...
24 Pages(6000 words)Essay

Computer Network Security

...Computer Network Security For minimize risks and vulnerabilities from the organization; certification for an information security standard is a key aspect that addresses design, deployment and operational processes. Certification process takes a lot of time and addresses systems that are considered as high availability systems. Likewise, it also addresses patch management issues that frequently updates security patches on systems. There is no way of completely securing a network, system and applications. However, periodic penetration testing and code reviews are conducted by security professionals and consultants for exploiting vulnerabilities and security flaws within an application and computer network. It is now considered... to provide...
4 Pages(1000 words)Essay


...organization apart from wireless network and data transmission, storage, modification, monitoring and protection. All the other departments of Organization will be facilitated by their respective support functions. 3.1.11. In case of non-compliance, information security management must consider business justifications and allow waivers accordingly. 3.2. Acceptable Use Requirements Any vulnerability detected in the Organization computer security must be reported to the adequate security staff. Vulnerabilities in computer systems are detected by unknown software or abnormal system behavior that may lead to accidental invasion of...
10 Pages(2500 words)Assignment

Computer system Network Security

...Network Security Network security is essential component as now-a-days information is computers are connected worldwide. Information is wealth for organisations. The computer systems are linked both internally and externally. The computers receive and send unlimited information2. Information lost is regarded as financial loss. As organisations are implementing paperless media and computerizing data the need for securing data at various stages become essential. Data is stored in various modes both online and offline1. The data stored online and offline opens up a threat by falling trap to potential hackers who intrude into our systems or network The issue of computer security first arose in the 1970s as individuals began to break... into...
5 Pages(1250 words)Essay

Computer Network Security Methods

...Running head: A CRITICAL ANALYSIS OF COMPUTER NETWORK SECURITY METHODS A Critical Analysis of Computer Network Security Methods ------------------------------------- Abstract The paper presents a detailed overview of network security issues with critical examination of mechanisms and tools that have been developed to provide protection to networks. The paper brings out the network vulnerabilities, describing the types of probable attacks followed by the counter measures that can be adopted to safeguard against these attacks. All existing technical mechanisms like, cryptography, network security applications and network security systems, related to network security, are briefly explained (not physical measures). Finally... , an...
24 Pages(6000 words)Essay

Taha Computer Network Security Services

...Taha Computer Network Security Services Executive Summary This is a business plan for a computer network security company known as Taha. The plan gives a description of the business, the services offered, the company’s competitive advantage, mission, business goals, management, marketing plan, and financial plan. Business Description Taha Computer security services business is a new organization that will offer computer security services to its clients since the world is in the midst of a global technological revolution, which will bring change in all proportions of the...
3 Pages(750 words)Essay

Computer Network

...infrastructure of WLA Company hinders the development of the company. This is due to the fact that the infrastructure is insufficient, the data stored is not secure i.e. can easily be compromised by unauthorized person and above all, the data backup plan is not efficient as the mode of backup is prone to disasters such as earth quakes and floods in the location of the company. Moreover, there is no documentation for the current IT infrastructure. There is no documentation explaining the network setup in the company. Also, the software and the hardware are outdated. Considering that the computers are still running windows XP, it implies that the OS may not support the current versions of...
5 Pages(1250 words)Essay

Computer Network

... A wireless protocol transmits over a channel 20 MHz wide over a noiseless channel. How many bits/sec can be sent if 64 level digital signals are used? Channel bandwidth = 20 MHz = 20 * 106 Using the Nyquist theorem; C = 2Blog2M C = 2 * 20 *106 * log 264 =240Mbps 2) If a binary signal is sent over a 20 3KHz MHz channel whose signal-to-noise ratio is 40 20 dB, what is the maximum achievable data rate? We know that 10log10S/N = 40dB It follows that S/N = 100 Now from the Shannon theorem; The maximum number of bits per second = H* log2 (1 + S/N) = 20KHz * log2(1+100) Log2(101)= 6,658 = 20 * 6658 =133160 Now from the Nyquist theorem; The maximum number of bits per second = 2 * H * log2V = 2 * 20 * log22 =40 The Nyquist theorem gives...
1 Pages(250 words)Essay

Computer Network

...and solutions. Vehicular Communications, 1(1), 13–21. Figueiredo, J. De. (2006). E-Rulemaking: Bringing Data to Theory at the Federal Communications Commission. Duke Law Journal, 55, 969–993. Retrieved from Lee, J., Yi, Y., Chong, S., & Jin, Y. (2014). Economics of WiFi offloading: Trading delay for cellular capacity. IEEE Transactions on Wireless Communications, 13(3), 1540–1554. Niyato, D., & Hossain, E. (2007). Wireless broadband access: WiMax and beyond - Integration of WiMAX and WiFi: Optimal pricing for bandwidth sharing. IEEE Communications Magazine, 45(5), 140–146....
3 Pages(750 words)Essay

Computer network

...networking even enables an organization to decrease its operational cost as it does not require organizations to purchase expensive peripheral devices in huge quantities. A third major benefit of using computer networking is that it helps in keeping files as well as hardware secure from the access of unauthorized individuals (Elahi, 2001, p.4). In an organization, access to various files is limited to a small number of people. These files mostly include secretive information and are only limited to the access of the most important and trustworthy individuals of an organization. Computer networking allows organizations to encrypt and...
8 Pages(2000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Computer Network Security for FREE!

Contact Us