Network security infrastructure - Essay Example

Comments (0) Cite this document
Individual, business, and government applications have multiplied on the internet. This development has an immediate benefit to the users. However, these internet-based services and applications sometimes…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.6% of users find it useful
Network security infrastructure
Read TextPreview

Extract of sample "Network security infrastructure"

NETWORK SECURITY INFRASTRUCTURE By: Network Security Infrastructure Recently, theuse of the Internet has continued to grow exponentially. Individual, business, and government applications have multiplied on the internet. This development has an immediate benefit to the users. However, these internet-based services and applications sometimes pose security threats to the internet users. Information is a delicate asset that must be properly protected. Without proper network security measures, many individual, government agencies and business enterprises risk losing their data.
Network security is basically a process by whbyich digital data assets are protected. On the other hand, Internet Security Infrastructure is the arrangement of components and tools, in a bid to offer the most effective internet protection. Before one settles on a particular plan to use, it is of the essence to clearly state the objectives of the plan.
In my case, the following, are the key goals I wanted to achieve through my plan:
a. Preventing Intrusions
b. Ensuring Network Availability
c. Controlling Data / Network Access
d. Protecting information in Transit
e. Responding to Incidences
I, as a result, had to carefully select a plan that would enable me achieve the above goals at the lowest cost possible. My plan includes firewall, web contents, protection against web pharming, and phishing.
The figure below shows the basic arrangement of the infrastructure chosen.
The following are the significant components and their functions:
a. Firewall
A firewall is a choke-point garget that consists of a set of rules and instructions specifying the type of data to allow in or out of the system. It basically controls the flow of data into and out of the system. There several types of firewalls in the market. In this case, I chose on Zone-Alarm based on its outstanding features and performance. Zone-Alarm is a multi-purpose firewall. It is capable performing several functions simultaneously. Such functions include protecting the system against internet exposure, protecting the system against web pharming and phishing. The firewall is programmed so as to prevent any malicious emails from getting into the mail server. The use of this type is very economical, in that it forms several functions at ago, hence saves on cost.
b. AAA server
This is a server program that is responsible for handling the end-user requests to access the system. AAA server gives authorization, authorization, and accounting services. It is at this station where the users request to access the system is either accepted or rejected.
c. Border Routers
Routers are referred to as traffic cops of a network system. Their function is to direct traffic into and out of the system. They also direct traffic within the network system. The process decision of a router is normally contained in a routing table. The routers are programmed so as to prevent the possible routing threats such as complete network chaos, dropped traffic, and traffic sent along invalid paths. The diagram below shows internet routers in action.
d. Virtual Private Networks (VPN)
VPNs are defined as protected network sessions created across unprotected channels such as the internet. Often, VPN are referenced based on the devices on the security perimeter that makes the encrypted sessions, such as Cisco -VPN Concentrator. A VPN allows an outsider to participate in the internal networks as if connected to them.
It can be concluded that when designing a Network Security Infrastructure, factors such as functionally of the system, costs and ease of use of the system should be put into consideration. However, it is also important to note that the cost should not be the key consideration as this may compromise on the efficiency of the system. The plan chosen depends on the type of company. Different companies require different Internet Security Infrastructures
References List
Harrington, J. (2005). Network security. Amsterdam: Elsevier.
Kaeo, M. (1999). Designing network security. Indianapolis, IN: Cisco Press.
Knipp, E. and Danielyan, E. (2002). Managing Cisco network security. Rockland, MA: Syngress.
Stallings, W. (2000). Network security essentials. Upper Saddle River, NJ: Prentice Hall. Read More
Cite this document
  • APA
  • MLA
(“Network security infrastructure Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Network security infrastructure Essay Example | Topics and Well Written Essays - 500 words. Retrieved from
(Network Security Infrastructure Essay Example | Topics and Well Written Essays - 500 Words)
Network Security Infrastructure Essay Example | Topics and Well Written Essays - 500 Words.
“Network Security Infrastructure Essay Example | Topics and Well Written Essays - 500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Network security infrastructure

IIS Networking Infrastructure Design

...navigation systems (GPS). There are two basic divisions of the corporate operations; consumer products and military products. The military products division needs isolation and special security classification owing to its top secret nature of operations. However, the present network infrastructure does not provide this isolation and security. The proposed corporate network is required to provide a complete solution for various offices of the IIS Corporation including Dallas Headquarter, Shanghai, Fairfax Va and London regional office and allied facilities. A three-layer Enterprise Network Infrastructure (ENI) is proposed...
11 Pages(2750 words)Essay

Network Infrastructure and Design

...? Network Infrastructure and Design Network Infrastructure and Design The IPv6 Implementation and its Configuration Plan Being the latest version of the Internet Protocol, the implementation of the IPv6 has been proposed. The implementation is hoped to serve as the protocol for primary communication and it is upon this protocol that the entire internet infrastructure will be founded. The implementation of the IPv6 will allow for the assignment of extra addresses, a situation which would be difficult with IPv4. Moreover, the choice of IPv6 has been arrived at following the realization that there are a number of compatibility issues while transiting from the IPv4. Thus, the choice has been made for the purpose of eliminating future... as it is...
18 Pages(4500 words)Term Paper

Network Infrastructure Term Paper

...? Full Paper Executive Overview Our organization’s network proposal assures significant cost savings by deploying the appropriate technology extracted by a solid risk assessment and cost benefit analysis for the network. For this reason, stakeholders will trust data and their investments, as the network proposal is strategically aligned with current and potentially planned new business objectives, seeking for future expansions of the computer network. Moreover, for addressing security, a comprehensive information security risk assessment is conducted that identifies critical assets and vulnerable points of the computer network. Likewise, adequate security controls that are considered within the network proposal are also justified... by the...
5 Pages(1250 words)Term Paper

Network Infrastructure Planning

...? Network Infrastructure Planning Network Infrastructure Planning Permissions are the core component of server security architecture that can be applied to manage the process of authenticating groups, users and computers to have access to files in a network (Bruce & Smith, 2011). Permission software are the most helpful infrastructure to help the fashion-ware company control the operations of the satellite branches at different times of the 24 hours in a day and still share the same resources at the central server at the head office. In a bid to reduce the cost of setting up new systems for each of the satellite branches,...
3 Pages(750 words)Research Paper

Network Infrastructure Planning

...of that data pool are remotely located, for example in an office branch with a sluggish connection to database server. Task workers. In setups where security is an issue and you want workers to mainly access only applications they have rights to access in order to perform their jobs, centralization of the administration to these users can be done using a terminal server. IT Admin tools. System administrators can easily perform tasks requiring Enterprise Administrator permissions on a server that has the necessary tools installed on the server. Deployment and Configuration of Terminal Services This is basically an installation that will allow users to connect to a terminal server, use network resources...
4 Pages(1000 words)Research Paper

Network Infrastructure Planning

...? Network Infrastructure Planning Lecturer: Introduction Microsoft has developed a powerful public cloud that can be used to achieve some computing objectives in various methods. For example. Windows Azure can be used to create web applications whose data is kept in a windows Azure datacenters. The application runs o site while the data that is worked on is stored in windows Azure. Windows azure can be used to build machines which are virtual where development and test runs SharePoint. Windows azure can assist in solving the storage issues since it offers unlimited space that can be used by very many users. One of the key computer features of windows SharePoint is its unique and powerful way of executing...
5 Pages(1250 words)Research Paper

Network Infrastructure Assignment

...DESIGNING A COMPREHENSIVE NETWORK INFRASTRUCTURE FOR A GEOGRAPHICALLY SPREAD RETAIL COMPANY 2007 TABLE OF CONTENTS Page PAGE. . . . . . . . . 1 TABLE OF CONTENTS . . . . . . . . 2 1. INTRODUCTION . . . . . . . . 3 2. NEEDS ANALYSIS . . . . . . . . 5 2.1. Analysis of company's networking needs . . . . 5 2.1.1. Business requirements . . . . . 5 2.1.2. Technical specifications . . . . . 6 2.2. Analysis of intranetworking and all necessary connectivity . . 6 2.3. Analysis of appropriateness of the backup, failsafe and load balancing solutions . . . . . . . 9 3. PROPOSED NETWORK INFRASTRUCTURE SOLUTIONS . . 10 4. TECHNICAL ISSUES AND...
12 Pages(3000 words)Assignment

Network Infrastructure

...-up with lower bitrates (which could be referred to as narrowband). (Wikipedia contributors, 2007) According to Virtual Private Network Consortium (2006), a virtual private network (VPN) is a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunnelling protocol and security procedures. A virtual private network can be contrasted with a system of owned or leased lines that can only be used by one company. The main purpose of a VPN is to give the company the same capabilities as private leased lines at much lower cost by using the shared public...
12 Pages(3000 words)Assignment

Network Infrastructure Basics

...Network Infrastructure Basics The network infrastructures or the network architecture is a set of standards describing how a computer can be physically connected. It also provides the mechanism or a network through which signals are passed between hosts. The well-known network architectures include Ethernet, Dial-up modem, Digital Subscriber Line (DSL), Integrated Services Digital Network (ISDN), and wireless network connections. Each of these network connections provides distinct sets of connection standards. Ethernet is a wired network connection that is mostly used in LANs for both home business networks (Blank, 2002). Dial-up networking facilitates computer connection to remote networks. It is usually used in home computers... /IP...
4 Pages(1000 words)Assignment

Network Infrastructure Basics

...Network Infrastructure Basics Lab 4.2.3 Summary As per the module 4.2.2 Fast Ethernet operates at 100 Mbps. Items that I selected for this LAB were 100BaseTX network adapter and Cat5e cable. A point to be noted here is that Cat5 cable can also be used for this network but was not available in the items list. I installed 100BaseTX Network Adapter on the PCI slot of the motherboard, and then attached one end of the Cat5e cable to the Ethernet RJ-45 slot of the Network Adapter and other end of the same cable to the network slot of the patch panel. Connection can easily be verified after switching ON the power of the...
2 Pages(500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Network security infrastructure for FREE!

Contact Us