StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network security infrastructure - Essay Example

Cite this document
Summary
Individual, business, and government applications have multiplied on the internet. This development has an immediate benefit to the users. However, these internet-based services and applications sometimes…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
Network security infrastructure
Read Text Preview

Extract of sample "Network security infrastructure"

NETWORK SECURITY INFRASTRUCTURE By: Network Security Infrastructure Recently, theuse of the Internet has continued to grow exponentially. Individual, business, and government applications have multiplied on the internet. This development has an immediate benefit to the users. However, these internet-based services and applications sometimes pose security threats to the internet users. Information is a delicate asset that must be properly protected. Without proper network security measures, many individual, government agencies and business enterprises risk losing their data.

Network security is basically a process by whbyich digital data assets are protected. On the other hand, Internet Security Infrastructure is the arrangement of components and tools, in a bid to offer the most effective internet protection. Before one settles on a particular plan to use, it is of the essence to clearly state the objectives of the plan.In my case, the following, are the key goals I wanted to achieve through my plan:a. Preventing Intrusionsb. Ensuring Network Availabilityc. Controlling Data / Network Accessd.

Protecting information in Transite. Responding to IncidencesI, as a result, had to carefully select a plan that would enable me achieve the above goals at the lowest cost possible. My plan includes firewall, web contents, protection against web pharming, and phishing. The figure below shows the basic arrangement of the infrastructure chosen. The following are the significant components and their functions:a. FirewallA firewall is a choke-point garget that consists of a set of rules and instructions specifying the type of data to allow in or out of the system.

It basically controls the flow of data into and out of the system. There several types of firewalls in the market. In this case, I chose on Zone-Alarm based on its outstanding features and performance. Zone-Alarm is a multi-purpose firewall. It is capable performing several functions simultaneously. Such functions include protecting the system against internet exposure, protecting the system against web pharming and phishing. The firewall is programmed so as to prevent any malicious emails from getting into the mail server.

The use of this type is very economical, in that it forms several functions at ago, hence saves on cost.b. AAA serverThis is a server program that is responsible for handling the end-user requests to access the system. AAA server gives authorization, authorization, and accounting services. It is at this station where the users request to access the system is either accepted or rejected.c. Border RoutersRouters are referred to as traffic cops of a network system. Their function is to direct traffic into and out of the system.

They also direct traffic within the network system. The process decision of a router is normally contained in a routing table. The routers are programmed so as to prevent the possible routing threats such as complete network chaos, dropped traffic, and traffic sent along invalid paths. The diagram below shows internet routers in action.d. Virtual Private Networks (VPN)VPNs are defined as protected network sessions created across unprotected channels such as the internet. Often, VPN are referenced based on the devices on the security perimeter that makes the encrypted sessions, such as Cisco -VPN Concentrator.

A VPN allows an outsider to participate in the internal networks as if connected to them.It can be concluded that when designing a Network Security Infrastructure, factors such as functionally of the system, costs and ease of use of the system should be put into consideration. However, it is also important to note that the cost should not be the key consideration as this may compromise on the efficiency of the system. The plan chosen depends on the type of company. Different companies require different Internet Security InfrastructuresReferences ListHarrington, J. (2005). Network security.

Amsterdam: Elsevier.Kaeo, M. (1999). Designing network security. Indianapolis, IN: Cisco Press.Knipp, E. and Danielyan, E. (2002). Managing Cisco network security. Rockland, MA: Syngress.Stallings, W. (2000). Network security essentials. Upper Saddle River, NJ: Prentice Hall.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network security infrastructure Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Network security infrastructure Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1676565-network-security-infrastructure
(Network Security Infrastructure Essay Example | Topics and Well Written Essays - 500 Words)
Network Security Infrastructure Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1676565-network-security-infrastructure.
“Network Security Infrastructure Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1676565-network-security-infrastructure.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network security infrastructure

Implementing Network and Personnel Security Measures

Equipment List of network security Devices that would be needed to ensure the Integrity and Sensitivity of Private Information The network security devices can be characterized into three major categories namely Internet Router and Firewall, Intrusion Protection System and Traffic Shaping device.... In relation to the present network security manufacturing industry, Cisco and IBM can be considered as the leading corporations which provide safe and steady internet environment within the networks of the different global institutions....
5 Pages (1250 words) Research Paper

Networking Security and Administration

hellip; Integrating the security infrastructure of two organizations involves several complex policy administration, engineering, implementation, and managerial tasks.... Integrating the other company's existing network infrastructure into my organization's one requires several network and security issues.... ntegration of one company's existing network infrastructure into the others may need structural changes in the existing network.... The paper "Networking security and Administration" tells us about security Policies and Server Systems....
6 Pages (1500 words) Essay

Providing Integrated Telecommunication Infrastructure for Three Merged Companies

The ultimate purpose of the project, Providing Integrated Telecommunication infrastructure for Three Merged Companies, is providing integrated telecommunication infrastructure for three merged companies: TV broadcasting company, radio broadcasting company, and publishing company.... Integrated telecommunication infrastructure for the three companies includes hardware.... nbsp;Moskowitz defines a virtual private network (VPN) as a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network....
6 Pages (1500 words) Essay

Social Marketing, Sustainability and Racism in Australia

Corporate IT and network security is a complex area and new businesses, individuals and corporation are paying more attention on this paradigm.... Curtin (1997) outlines that IT and network security can be defined as the set of procedures a business or individual can take or apply to protect their network computer system (s), as well as it is a major concern for every person or business that uses computers (Curtin, 1998).... Therefore, it is imperative that organization takes account of their network for security threats and for this hire a security expert who guides the management on how to secure organization's network and… In addition, it is yet vital and significant to maintain exceptional security in a networked structure....
15 Pages (3750 words) Essay

MEMETECH Technical Infrastructure Security Plan

The paper "MEMETECH Technical infrastructure Security Plan" discusses that the plan will be designed to respond to a dynamic environment, as well as providing the adaptable framework in addressing the emerging and evolving risk to crucial infrastructure.... hellip; The infrastructure security plan established the approach for setting plans, identify the infrastructure and combine threat information, vulnerability, and consequence to produce a rational assessment, systematic, or company risk and develop security mechanisms and resilience strategies, and measure their effectiveness....
7 Pages (1750 words) Case Study

Secure Wireless Networking

1 as effective principles that ensure to conserve the reliability and compatibility of the products used within a particular WLAN infrastructure that ensures wireless security for each computing device connected with the developed WLAN.... the report also emphasizes developing a strong shield that can protect users from external threats such as hacking and build strong security protocols for the wireless network.... In order to increase the security efficiency of wireless connectivity, the report would also provide an effective Bluetooth standard for Personal Area Networks (PAN) and on the IEEE 802....
7 Pages (1750 words) Term Paper

Significance of Critical Infrastructure

The paper "Significance of Critical infrastructure" discusses that the main factor that can help in the deterrence of cyber intrusions is education.... nbsp; Moreover, government institutions should take raising awareness seriously because knowledge is the key in the area of securing critical infrastructure.... Securing critical infrastructure is no longer a choice but a must for a country to thrive.... Cyber threats to critical infrastructure continue to increase prompting governments to develop policies that would enhance security....
5 Pages (1250 words) Essay

Network Infrastructure Improvement

This analysis "Network infrastructure Improvement" tries to provide a permanent and sustainable solution to technological improvements of the DoD by first analyzing the existing IT and telecom applications and services, the network architecture, the existing business needs.... 4), the current network infrastructure of the DoD is isolated from the public ATM network infrastructure.... The internal network is also subject to possible network intrusions, there is a possibility of external intrusion through physical network interruption, hacking of the network infrastructure (Wong, 2009)....
10 Pages (2500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us