StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

The Basic Architecture of a Secured Network - Case Study Example

Comments (0) Cite this document
Summary
The paper "The Basic Architecture of a Secured Network" highlights that each component of the entire network can be simulated using a model and the theoretical values of Overall Security Values can be determined. This would help in rightly choosing the modifications required to the existing network…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.9% of users find it useful
The Basic Architecture of a Secured Network
Read Text Preview

Extract of sample "The Basic Architecture of a Secured Network"

Download file to see previous pages The security of servers becomes an important issue when it is exposed to such an un-trusted network.
A DMZ is a network implementation aiming at securing the internal network of an organization. It isolates the external connections requiring public services from the hosts on the internal private network.
The architecture of the network shown in the diagram is to provide web-based services to the external (internet) users and LAN services to the internal (corporate staff) users by employing a certain level of security.
If two different firewalls (from different vendors) having different security implementations can be used, the system becomes more secure. This is because if an intruder manages to get through the first firewall, the same algorithm cannot be used to get through the second one. Ample time would be available for the company’s network administrators to trace and shut down the intrusion.
The Outer firewall usually has two network interfaces; one for Internet and the other one for the DMZ. The firewall hides the addresses of the DMZ servers by using NAT (Network Address Translation) so their public addresses are the same as the address of the Outer firewall.
The setup is called “back-to-back perimeter network” and is located in between two firewalls. Having a DMZ in between two firewalls adds an extra layer of security since the inner firewall and the border firewalls can come from different vendors or be of different types if the DMZ is attacked, there is still a firewall left between the attacker and the internal network.
The inner firewall has more rules than the outer firewall, like TCP-port 80 (HTTP) is closed since it does not need to be open in order for the workstations of regular users, only for web servers. The firewall usually has two network interfaces: one for the DMZ and one for the internal network. ...Download file to see next pages Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(Network security Case Study Example | Topics and Well Written Essays - 1500 words, n.d.)
Network security Case Study Example | Topics and Well Written Essays - 1500 words. https://studentshare.org/information-technology/1715773-network-security
(Network Security Case Study Example | Topics and Well Written Essays - 1500 Words)
Network Security Case Study Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1715773-network-security.
“Network Security Case Study Example | Topics and Well Written Essays - 1500 Words”. https://studentshare.org/information-technology/1715773-network-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF The Basic Architecture of a Secured Network

Basic Network Technology, Structure, and Protocols

...The Basic Architecture of a Secured Network... The Basic Architecture of a Secured Network... computer networking has become the basis of communicating, collaborating and sharing files or resources between businesses established around the world. Keeping this fact in mind, the two tutorials selected were the ones that shed light on the basic technical details of this client server interaction. Tutorial 1 (Gal, Ilan & Shreiber, 2005) provided an insight into how by entering a website’s address into a browser, all the content of website gets loaded, while Tutorial 2 (Podolsky & Margolis, 2005) provided slightly advanced detail of the steps in-between request placement and content delivery. In Tutorial 1 described that every networked computer is...
2 Pages (500 words) Research Paper

Basic Network Technology, Structure, and Protocols

...The Basic Architecture of a Secured Network... The Basic Architecture of a Secured Network... NETWORK TECHNOLOGY, STRUCTURE, AND PROTOCOLS Basic Network Technology, Structure, and Protocols Affiliation Networking is the way of linking two or more computer systems, devices or even networks jointly with the intention of distributing and sharing useful information and data. Additionally, networks are created using a combination of computer software and hardware. In addition, there are diverse kinds of computer networks. One technique is to define the kind of network according to the massive area it covers. For instance, LANs (Local area networks) normally cover the area over a single home, on the other hand WANs (wide area networks), have access to...
3 Pages (750 words) Research Paper

Basic Network Technology, Structure, and Protocols

...The Basic Architecture of a Secured Network... The Basic Architecture of a Secured Network... Basic Network Technology, Structure, and Protocols Introduction The importance of computer technology in this age cannot be gainsaid. In essence, computers have been incorporated in almost every part of the society in such a way that living without them seems to be a mirage. However, while computers have been used for almost two decades, it is appalling that very few people have a complete knowledge as to the operation of computer networks. Many are times when people will make pretty dumb statements not because they would like to do that but rather because, they do not know much about computer networks. This is not excusable in the 21st century hence...
3 Pages (750 words) Essay

Healthcare Computer Network Architecture

...The Basic Architecture of a Secured Network... The Basic Architecture of a Secured Network... of the of the 10 February Healthcare Computer Network Architecture Answer Internet Protocol (IP) is a numeric address that configured on each computing device that wishes to communicate with other devices on a computer network. Likewise, this address demonstrates the address of a specific device on the network. For example, a computer that is configured on the network will possess an IP address: 192.168.1.2. However, for establishing connectivity, subnet mask, gateway and other relevant protocols contribute for successful data transmission. Likewise, a version 4 IP address comprises of five classes i.e. Class A, Class B, Class, C , Class D and Class E....
3 Pages (750 words) Coursework

Virtual Private Network Architecture

...The Basic Architecture of a Secured Network... The Basic Architecture of a Secured Network... PRIVATE NETWORK ARCHITECTURE Virtual Private Network Architecture Affiliation This paper presents an overview of the virtual cloud environment. The basic purpose of this research is to analyze the process whereby virtual clouds (tangible machines) are used to link to virtual private networks (VPNs) that interacts with virtual enterprise architectures or enterprise resource planning systems architectures. This paper also evaluates the migration and real-time transmission processes of the networks. At the present, business organizations prefer to run and maintain their server applications in data centers, which provide them with a wide variety of storage...
3 Pages (750 words) Essay

Network Architecture Selection

...The Basic Architecture of a Secured Network... The Basic Architecture of a Secured Network... ARCHITECTURE SELECTION In considering the most appropriate system or network architecture, several factors need to be considered. In more ways than one, designing the architecture of a network is parallel to planning and building a house or physical structure. It is important for the designer to consider the functionality of the network. Moreover, the purpose of each component to be included in the design must likewise be taken into consideration. Basically, selecting the network's architecture entails answering several questions which each play a part in determining the most appropriate choice. However, it must be noted that there is no one type of arch...
5 Pages (1250 words) Essay

Global Network Architecture

...The Basic Architecture of a Secured Network... The Basic Architecture of a Secured Network... Network Architecture Report Specifications A global company has its headquarters in Paris (France) with offices in London (UK), Berlin (Germany), Madrid (Spain), Cairo (Egypt), Berne (Switzerland), Beijing (China), Shanghai (China) and Singapore. These offices are interconnected by telecommunications links provided by several Telcos as shown below. Each of the above telecommunications links are rated at the capacity indicated in the following table. Telecommunication Links End A End B Capacity Paris London 2 Mbps Paris Berlin 2 Mbps Paris Madrid 512kbps Paris Berne 256 kbps Paris Cairo 256 kbps London Berlin 2 Mbps Berlin Beijing 256 kbps Beijing Shangh...
4 Pages (1000 words) Research Paper

Secured Bonds

...The Basic Architecture of a Secured Network... The Basic Architecture of a Secured Network... Bonds Secured Bonds Some bonds are ified as “secured” when it is “backed by a collateral such as a mortgage or lien, the title of which will be transferred to the bondholders in case of default” (WebFinance, Inc., 2011). There are different types of secured bonds and the most common form are mortgage bonds which are backed by real estate or physical equipment that may be liquidated. These bond are perceived to have very little risk; thus, being high-grade bonds (WebFinance, Inc., 2011). Another form of a secured bond is the equipment trust certificates. The collateral for equipment trust certificates are company equipment such as trucks, airplanes and...
1 Pages (250 words) Research Paper

Basic Network Technology, Structure, and Protocols

...The Basic Architecture of a Secured Network... The Basic Architecture of a Secured Network... NETWORK TECHNOLOGY, STRUCTURE, AND PROTOCOLS Basic Network Technology, Structure, and Protocols Introductory and General ials RAD University Tutorials The RAD University tutorials available from the RAD University tutorials page is tutorials for Data Communications, telecommunications and computer networking. The tutorials available on the site page also include projects done by students and some by the dean. Anyone can submit a tutorial on any topic to be added to the online directory of tutorials provided by RAD University. The tutorials are meant for computer scientists and engineers of the future. The introductory and general tutorials are categorize...
2 Pages (500 words) Essay

Network Security Architecture

...The Basic Architecture of a Secured Network... The Basic Architecture of a Secured Network... head: Secure Wireless LAN Architecture SECURE WIRELESS LAN ARCHITECTURE According to Hermans (2005) there are two major methods for implementing WLAN networks today, both of which involve Wireless 802.11 standard. These two approaches, however, entail some basic differences which majorly impact deployment costs, management and security. These architectures are namely the Centralized and Distributed AP WLAN architectures. The former requires one or multiple servers or switches to be deployed while the latter approach is more coherent to the IEEE 802.11 standard. The IEEE 802.11 specifies a group of technologies governing wireless Ethernet connecti...
1 Pages (250 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic The Basic Architecture of a Secured Network for FREE!

Contact Us