StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Rapid Freight Converged Network Security - Case Study Example

Cite this document
Summary
In the report, it is stated that implementation of a converged network system is the key adjustment that the CIO of Rapid Freight should consider. The network system merges phone, voice, and data services under one platform and it will also enable ease of monitoring all aspects of the organization…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.6% of users find it useful
Rapid Freight Converged Network Security
Read Text Preview

Extract of sample "Rapid Freight Converged Network Security"

Rapid Freight Converged Network SecurityImplementation of a converged network system is the key adjustment that the CIO of Rapid Freight should consider. The network system merges phone, voice, and data services under one platform. The network will boost portability of technology by enhancing the use of Personal Digital Assistants and soft phones. The network will also enable ease of monitoring all aspects of the organization while reducing challenges in security (Paul, 2011).Implementation of the system introduces some security challenges.

If a threat penetrates the network, it will easily infiltrate across the domain due to the single line flow. The challenges are both external and internal to the organization. External challenges arise from unauthorized software or data that seek entry into the organization’s domain. Internal challenges, on the other hand, can be either accidental or intentional. Accidentally, internal threats occur when people use their portable devices outside the network then plug them back in importing viruses and other malware.

Some members of staff might be malicious and try to access unauthorized segments (Paul, 2011).External threats are easily kept at bay through the implementation of firewalls. A firewall allows flow of data from known sources to the webserver or specified destination while rejecting unknown traffic. If the firewall is compromised, it severs the connecting of the system to the internet host. Notwithstanding, firewalls are not perfect and should not be used solely (Stewart, 2010).Unified Access Control and Network Access Control ensure that device users are authorized to use the network.

Account management system registers network users and signals any illegal activity. Coupled with Personalization, the intervention will keep the network safe from internal threats of any nature (Gregory, CISA, & CISSP, 2007).Implementing session management features such as Virtual Private Networks (VPNs) will overcome challenges posed by use of VoIP phones, Video conferencing and PDAs. IPSec VPN scrambles traffic from the phone and safely connects to the corporate network without fear of infiltration.

Soft phone users will require authentication into the Converged network. Secure Socket Layer VPN (SSL VPN) ensures that users are logging in from healthy computers when accessing the network remotely. Intrusion Detection and Prevention software (IDS and IPS) will further enhance overall security by scanning entire network to identify and report signatures or suspicious traffic arrays (Gregory et al, 2007).Figure 1. Security measures framework. This figure illustrates how various security measures will be incorporated into the proposed Converged NetworkReferencesGregory, P.H., CISA., & CISSP. (2007).

Converged Network Securities for Dummies. Hoboken, NJ: Wiley Publishing Inc.Paul, S. (2011). Digital Video Distribution in Broadband, Television, Mobile and Converged Networks: Trends, Challenges and Solutions. Hoboken, NJ: Wiley Publishing Inc.Stewart, J. M. (2010). Network security firewalls & VPNs. Mississauga, Ont: Jones & Bartlett Learning.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Rapid Freight Converged Network Security Case Study”, n.d.)
Rapid Freight Converged Network Security Case Study. Retrieved from https://studentshare.org/information-technology/1604371-case-study-archetcectural-diagram
(Rapid Freight Converged Network Security Case Study)
Rapid Freight Converged Network Security Case Study. https://studentshare.org/information-technology/1604371-case-study-archetcectural-diagram.
“Rapid Freight Converged Network Security Case Study”, n.d. https://studentshare.org/information-technology/1604371-case-study-archetcectural-diagram.
  • Cited: 0 times

CHECK THESE SAMPLES OF Rapid Freight Converged Network Security

The Computer Rootkits

This paper ''the Computer Rootkits'' discusses that the effects of rootkits are evident and prevalent.... Most of these effects directly or indirectly negatively affect the functionality or profitability any business enterprises using the recent technology.... nbsp;… However, invention and implementation of technology has resulted to spread of viruses and worms....
8 Pages (2000 words) Report

NPS Deploying Network Policy Server

The security of information that goes via the internet is aided by ensuring that the channel that it goes through is the right one.... Because of the reason above, the best way in ensuring data security in for one central park and at the same time being economical to the company is by investing it in the team's technology.... When a principal instructs the vendor to direct or educate the employees on information system security the concerned employees feel that their contribution to the company is valued....
8 Pages (2000 words) Report

Conducting Cyber Intelligence and Restricting Cyber Attacks on Organizations

nbsp;Cyber intelligence is a method through which security threats are tracked, countered and analyzed in a number of different ways.... nbsp; This study highlights that cyber intelligence is a method through which security threats are tracked, countered and analyzed in a number of different ways.... The network administrators within these organizations have understood their roles well and thus have found out the best possible mechanisms which will take care of these cyber attacks....
12 Pages (3000 words) Essay

Architectural Diagram: Rapid Freight Converged Network

It has to identify and… se network solutions that will enhance speed, efficiency and effectiveness in service delivery and propel the firm towards greater heights in maximizing the shareholder's value. These types of network solutions include the following Information systems, device, hardware, rapid freight converged network rapid freight converged network Rapid freight's increasing demand for better and quality services and the stiff competition needs an integrated network solution that will improve all the entire process for the firm to remain competitive, survive and grow in the ever-expanding economy....
2 Pages (500 words) Research Paper

Wireless Communication

This paper "Wireless Communication" discusses the fastest-growing segment of the communications industry.... Wireless technology has brought about a revolution in how people communicate.... This paper will trace the history of wireless communications and then compare GSM technology with CDMA technology....
8 Pages (2000 words) Case Study

The Use of Policy-Based Network Management

Policy-based network management has come out as a novel paradigm for managing network, particularly for QoS and security.... The profit of policy-based management will cultivate as network systems turn out to be extra intricate and offer additional services like QoS and security service (Westerinen et al, 2001).... The paper "The Use of Policy-Based network Management" highlights that network management market has developed over time with the growth of software and hardware resolutions that has facilitated administrators to sustain and follow the status of enterprise networks....
9 Pages (2250 words) Research Paper

The Consideration of the Effectiveness of the Computer Misuse Act 1990

It is argued in this paper that the social network phenomenon exemplifies the interrelationship between new communication channels and modes of computer use; which legislation has to address in countering potential computer misuse in order to be effective.... In particular, the online social network model has resulted in the phenomenon of leading social networks such as MySpace, Bebo, Facebook, and Twitter....
10 Pages (2500 words) Term Paper

Social Networks Link Terrorists

With the rapid developments in information technology, it has become easy to achieve the desired results without necessarily having to strain hard to communicate decisions to various interested parties worldwide due to the fact that the world has been brought together digitally to form a single digital village....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us