StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

The Features and Requirements of Network Security - Case Study Example

Comments (0) Cite this document
Summary
This case study describes the features and requirements of network security. This paper outlines features of network technology, cabling, network interfaces, network protocols, requirements for all these parts, data and security requirements, firewall and network performance…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.8% of users find it useful
The Features and Requirements of Network Security
Read TextPreview

Extract of sample "The Features and Requirements of Network Security"

Download file to see previous pages This will reduce the administrative work on the network for the network administrator. The client/server architecture is designed on a star topology. Any maintenance activity of this network type will be conducted, while the clients will not be aware of it. The current network scenario does not contain proper security measures, contingency planning, back up procedures, data synchronization, data traffic analysis, network congestion prevention.
The client-server architecture starts degrading its performance when there is a large number of data fetching and executions as this will result in network congestion. Server downtime will severely affect the network and all the operations and activities on the network will be halted.
Hubs should be replaced by the Fast Ethernet 10/100 Mbps switches. By replacing hubs, we can considerably minimize the unwanted traffic on the network which may degrade the performance of the network. As the organization is certified ISO9000, the network has to support the features which are required by the ISO Certification.
As the organization size is not under consideration, for example, if a large number of employees are working on the network and transferring data at the same time also accessing network drives, this will degrade the network performance as in the client-server architecture, all the data is processed by the server itself. As this is an SME, 10/100 Mbps CAT 5 is sufficient enough for the transmission of data.
If the network design will be implemented using Wi-Fi technology, then the scenario will be different. A lot of security issues will be taken into consideration. Password encryption methods will be used.
The CAT 5 cabling scheme uses both data and voice communication. The forensic lab needs communication between different employees on different stages of the investigation. The cabling should support a variety of communication standards, keeping in mind the future aspect of the upcoming technologies as compatibility issues are sometimes so costly that whole network architecture and design need to be created. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Features and Requirements of Network Security Case Study, n.d.)
The Features and Requirements of Network Security Case Study. Retrieved from https://studentshare.org/information-technology/1731061-network-security-case-study
(The Features and Requirements of Network Security Case Study)
The Features and Requirements of Network Security Case Study. https://studentshare.org/information-technology/1731061-network-security-case-study.
“The Features and Requirements of Network Security Case Study”. https://studentshare.org/information-technology/1731061-network-security-case-study.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF The Features and Requirements of Network Security

Network security

.... There is a requirement of a powerful vulnerability assessment and management tool that will facilitate the network security team in crises situations. Moreover, there is one more challenge for the network administrators i.e. they are not able to find traces for the threat that has already penetrated into a distributed network environment. Likewise, distributed network is a merger of two or more networks and may be operational on a broad spectrum. Moreover, the existing network security controls are not capable to detect the worm, as the distributed network is connected to one or more networks; it is difficult to analyze specific anomalies and patterns of unknown activity on the distributed network. Furthermore, the combination of infinite...
8 Pages(2000 words)Essay

Network security

...? Network Security and Its Business Impact in Educational s By Mohammed Abdul Rahman Supervisor: Dr. Kim Heng Teo Master project undertaken in partial fulfillment of the requirements for the M.Sc. in Business Information Technology University of xxxxx June 2011 DISSERTATION DECLARATION FORM University of xxxxx The declaration form is to be completed and attached within the project dissertation. The student should read and sign the declaration. Student Particulars Name: Mohammed Abdul Rahman Student Id: xxxxxxxxxx Project Title: Network Security and Its Business Impact in Educational institutions Student Declaration I declare that 1. I understand what plagiarism is; 2. The consequences of plagiarism have been explained to me by my...
50 Pages(12500 words)Dissertation

Network Security

.... However, frequent updates are required, for firmware and hardware, to keep them updated for potential threats that may disrupt data or perform any security breach. From time to time, the hackers and cyber criminals develop new threats. Even the updated security hardware is not sufficient for securing the network , because there is always a probability of a new threat, which may bypass the security mechanism anytime. Moreover, hackers and cyber criminals also conduct research on security products in order to develop a threat, which may intrude and sidestep the security of these products. The main objectives of a cyber criminal includes, bank account hacking, credit card hacking to achieve money. The uprising of Information Technology has...
24 Pages(6000 words)Essay

Network Security

... of Network Security Policy Since forming a high-quality security policy offers the basics for the flourishing application of security allied activities in the upcoming period. In this scenario, the initial movement in improving a business’s security is the performance of a specific however applicable security policy of the business. The purpose of this policy is to inform the business staff on the diverse features of their tasks, broad utilization of business’s resources and clarifying that how susceptible business out to be managed. In addition, the business security policy will as well express fully the implication of suitable utilization, as well as defining illegal tasks and responsibilities (Danchev; Kim, Lee and Han; Bakry). Moreover...
13 Pages(3250 words)Research Paper

Network security

...?NETWORK SECURITY Network Security Affiliation Table of Contents Table of Contents 2 Type of Network Security 3 User and Password Based Access: 4 Firewalls 4 Antivirus Software 5 Data Backups 5 Network Security Devices 5 Security Cameras 5 DVDs/Tapes 6 Hardware Discussed 6 Printers and Scanners 6 Switch 6 Computer Server 6 Personal Computers 7 Recommendations 7 Staff Training 7 Update Passwords 7 Update Antivirus Regularly 7 Cloud-based Backup 8 References 9 Executive Summary In the past few years network security has turned out to be a serious challenge for the business organizations that heavily rely on business data and information. The basic purpose of implementing a computer network is to allow a number of staff members to enter...
5 Pages(1250 words)Essay

Network Security

The Internet has become a staple of the business world today It is because of this that a company should remain continually up to date with the latest security measures. Vulnerabilities due to designs flaws, poor security management, incorrect implementation, and malicious intent can all contribute to the loss of company assets. Therefore, it is paramount to implement a comprehensive security plan urgently. With carefully planned countermeasures and strict security, the odds of a successful intrusion can be minimized greatly. Overview of Network Security Fundamentals, Security Threats, and Issues Whenever a network is connected to the Internet it is potentially subjected to attacks from malicious programs such as viruses, Trojans,...
3 Pages(750 words)Case Study

Network security

Network security s of Learning Discuss the term confidentiality as it applies to data. How can data confidentiality be assured on a network?
Data confidentiality entails allowing authorized users to access particular data, while preventing unauthorized access of data by intruders. When access eavesdrops into particular data, the principle of confidentiality will not hold. In networks, encryption is the principle techniques of maintain data confidentiality. This process is achieved using encryption algorithms that are used to generate keys for encrypting and decrypting data.
2. Explain the concept of technical security controls. What are some the major components that make up technical control?
Technical security controls...
2 Pages(500 words)Essay

Network Security

... guarantees authentication, availability, integrity and confidentiality is important to note that “network security is not absolute” (Canavan 2001, p.10). Network security should be perceived as a continuum that moves from very unsecure to very secure which makes it possible for organizations to rank their network security based on comparison with other security systems to determine whether is secure or less secure. The security level of any network also depends on the organizational needs where some might deem information highly valuable therefore requiring that only authorized users gain access while others would allow outsiders to access information but ensure protection against attempts to modify the available information. At the same...
10 Pages(2500 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic The Features and Requirements of Network Security for FREE!

Contact Us