StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Assignment 2: Building on Prior Success - Research Paper Example

Cite this document
Summary
All computers within the establishment have the capability to support this version of Microsoft windows. This version of operating system…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.4% of users find it useful
Assignment 2: Building on Prior Success
Read Text Preview

Extract of sample "Assignment 2: Building on Prior Success"

Building on Prior Success Inserts His/Her Inserts Grade Inserts 22.02 Building on Prior Success The network operating system that could properly function with the proposed network installation would be Microsoft’s Windows Vista. All computers within the establishment have the capability to support this version of Microsoft windows. This version of operating system contains numerous security protocols that could significantly enhance security of the network system once installed. Protecting the contained data from unauthorized access remains critical to the success of the network; therefore, installation of an operating system with security protocols remains essential (Christianson, 2010).

The secure socket tunneling protocol from Microsoft would work efficiently with other supporting security protocols in providing secure connections. This tunnel provides a mechanism for safely transporting encryptions through almost all proxy servers and firewall. Upgrading the system would include the addition of several servers into the network, to enhance information storage. The servers need to be installed within a central location, to allow information to be retrieved from a single point.

The head office could serve as the point where the new server can be installed. This would essentially allow users in regional offices to access information from the servers through the internet. Similarly, remote employees would also access relevant files from the central servers from different locations. Installation of the servers in a central place is likely to enhance information security as information can be protected from a single source (Chander, 2008). Confidentiality of information can be immensely enhanced through sender authentication at the central server.

This could allow information to be safely relayed to the desired persons. The conventional Virtual Private Network can be used to access the network within the regular office setting. The connection would be essential within the office setting in enabling access to the network. This network, however, comes with numerous limitations regarding access to the network. The conventional VPN could pose serious dangers to the computers when the network connection gets interrupted (Fowler, 1999). Interruption at the network tunnel could be catastrophic as information could easily be lost.

The interruption also poses an imminent danger of crashing the computing device when the network tunnel becomes interrupted. The limitation for this network remains the capability to access networks from remote locations. The network remains limited to the desktop computers and other fixed computing devices. The best way for employees to remotely access the network would be through utilizing mobile virtual private network. This network setting functions efficiently in a situation where the endpoint VPN contains multiple access points.

The mobile network can also be accessed using cellular devices carrying data between several Wi-Fi access points. This network connection allows a user to roam seamlessly between networks and utilizes wireless connection (Zseby, 2009). The advantage of utilizing this connection remains the ability for the network to connect between different IP addresses without losing the data contained in other applications. The mobile VPN allows users to maintain several applications continuously open. While performing this function, the network also allows passing of data, securely over public networks.

This capability would immensely assist employees Ocper Inc to access the network continually from several remote locations. ReferencesChander, A. G. (2008). Securing privacy in the Internet age. Stanford, Carlifornia: Stanford University Press.Christianson, B. E. (2010). Security Protocols: 15th International Workshop. Brno, Czech Republic: Springer Publishers.Fowler, D. (1999). Virtual private networks: making the right connection. San Fransisco: Morgan Kauffman Publishers.Zseby, T. (2009).

Future Internet - FIS 2009. Second Future Internet Symposium, FIS 2009 (pp. 57-59). Berlin: Springer Publishers.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Assignment 2: Building on Prior Success Research Paper”, n.d.)
Assignment 2: Building on Prior Success Research Paper. Retrieved from https://studentshare.org/information-technology/1589744-assignment-2-building-on-prior-success
(Assignment 2: Building on Prior Success Research Paper)
Assignment 2: Building on Prior Success Research Paper. https://studentshare.org/information-technology/1589744-assignment-2-building-on-prior-success.
“Assignment 2: Building on Prior Success Research Paper”, n.d. https://studentshare.org/information-technology/1589744-assignment-2-building-on-prior-success.
  • Cited: 0 times

CHECK THESE SAMPLES OF Assignment 2: Building on Prior Success

Project Management Applicatio

Before Health insurance Portability and Accountability Act (HIPAA) was implemented, there were no prior standards of determining whether health cares should securely store patient's information.... I order to mitigate the risks involved physical safe guards such as building of alarm systems as well as use of extensive monitoring screen should be widely implemented....
2 Pages (500 words) Assignment

A Day in the Life of Alex Sander

Accordingly, proper communication, training, building interpersonal relationship, proper feedback towards their problems with needful authority, accountability and responsibility will help to overcome shortcomings that limit effectiveness of employees with difficult personality should be mitigated in order to enhance operational efficiencies (Lipman, 2012; Collins & Greiner, 2008)....
4 Pages (1000 words) Assignment

Project Teamworker

Teamworker is a web-based project that teams of up to six students to gain access to a platform that can facilitate the learning process and provide a level of oversight to those educators that seek to monitor it; prior to delivering a final grade.... Project Teamworker is designed to create a web-based portal that allows students, tutors, supervisors and unit coordinators that ability to monitor team projects effectively as they progress....
6 Pages (1500 words) Assignment

Business Success through Negotiation

This paper “Business success through Negotiation” will be based upon business culture οf international business and who would best manage these businesses.... Business culture is a central element in negotiation.... Every company has its own corporate culture....
11 Pages (2750 words) Assignment

Series Effect Appointment

The paper "Series Effect Appointment" presents that it was a comfortable environment, and the members of the group were allowed to sit wherever they wanted to sit and the whole atmosphere was relaxing and calm.... There was a bigger sofa and many chairs that were comfortable-looking.... hellip; Social interactions improve cognitive skills in groups and individuals to develop communication, language skills, solve problems, intellect, knowledge, technology, among others....
8 Pages (2000 words) Assignment

Operational and Management Factors that Influence Success in Event Management

In order to deal with issues associated with the location of the Christmas event, the event management team will seek a prior consent from the management and authoritative committee of the institution regarding the use of LCUCK B6 for organizing the proposed Christmas event.... The primary objective of this assignment is to develop an event management plan of hospitality contract for the Christmas event in the institution campus....
8 Pages (2000 words) Assignment

A Portfolio Management Methodology

… Prince 2 Project Management MethodologyPrince 2 is just a simplification of Prince that is an improved version of PINCE.... Prince is just an acronym-meaning project in controlled environment.... Definitively, it implies that a project is under control in Prince 2 Project Management MethodologyPrince 2 is just a simplification of Prince that is an improved version of PINCE....
11 Pages (2750 words) Assignment

External Fire Spread between Buildings and Determination of Unprotected Areas

1 Means of warning and escape: Requirement:By B1, schedule 1, of the buildings' regulation, there should be a prior warning concerning fire and most suitable means of escaping in the event of fire outbreak.... … IntroductionThe aim of this project is to guide the users concerning the fire safety tragedy of an academic building with a capacity of six thousand people.... This will undoubtedly help them to apply in real life situation and escape safely in case of IntroductionThe aim of this project is to guide the users concerning the fire safety tragedy of an academic building with a capacity of six thousand people....
15 Pages (3750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us