StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Network and Communication Security Protocols - Research Paper Example

Cite this document
Summary
This research paper "Network and Communication Security Protocols" focuses on potential and advanced persistent threats along with their impact on different governmental sectors of the country. It incorporates surveys, statistics and quantitative data pertaining to the main thesis. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.9% of users find it useful
Network and Communication Security Protocols
Read Text Preview

Extract of sample "Network and Communication Security Protocols"

Download file to see previous pages

The wide area network connects two or more remote offices that are separated region-wise, country wise and even continent wise. The current WAN of Riordan Manufacturing is based on T1 links that are terminating on an external CSU / DSU. Subscribed bandwidth for Albany is 256 kbps and 256 kbps committed information rate (CIR) for emails. Moreover, bursting is also supported up to 1.5 Mbps o CIR. The plastic fan plant in China is also equipped with T1 that is terminating directly on the router. The custom plastic parts plant located in Pontiac is similar to the Albany site that includes a 256 kbps bandwidth for Internet, and 256 kbps committed information rate (CIR) for emails.

The connection is terminating on an external CSU / DSU with a router on the backbone. Headquarter at San Jose is also demonstrating the same WAN architecture that is similar to the site located in China. There is a requirement of monitoring the network on a continuous basis for possible threats and vulnerabilities. In order to establish a secure and robust WAN architecture, three factors need consideration. The first factor is security. As per the current WAN architecture, there is no adequate security and the network is vulnerable once the firewall is bypassed.

Incorporation of an Intrusion detection system (IDS) is compulsory as it will penetrate deep in the network and detect unknown activities related to unauthorized access, viruses and hacking. There are many types of IDS, the recommended IDS is an anomaly-based IDS. An anomaly-based intrusion detection system is based on a data driven methodology that complies with data mining techniques. The functionality of an anomaly-based IDS involves the creation of profiles associated with normal behavior and activities within the network.

If any unknown activities initialize that are not similar to the normal profiles, is considered as anomalies or attacks.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Network and Communication Security Protocols Research Paper Example | Topics and Well Written Essays - 7750 words, n.d.)
Network and Communication Security Protocols Research Paper Example | Topics and Well Written Essays - 7750 words. https://studentshare.org/information-technology/1793370-1-networking-and-communications-security-or-2-communications-project-management
(Network and Communication Security Protocols Research Paper Example | Topics and Well Written Essays - 7750 Words)
Network and Communication Security Protocols Research Paper Example | Topics and Well Written Essays - 7750 Words. https://studentshare.org/information-technology/1793370-1-networking-and-communications-security-or-2-communications-project-management.
“Network and Communication Security Protocols Research Paper Example | Topics and Well Written Essays - 7750 Words”. https://studentshare.org/information-technology/1793370-1-networking-and-communications-security-or-2-communications-project-management.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network and Communication Security Protocols

TLS/SSL and IPSec Paper

In this scenario, the computer connected with an IPsec VPN service is considered a part of the business network and has accurately analogous access as if it was in office.... Compare these two protocols and discuss the advantages and disadvantages of each protocol from the following angles in particular: Full security?... IPSec Both TLS/SSL and IPSec provide a security protocol for the Internet protocol suite.... So this is the basic reason that TLS/SSL based security structures are becoming extremely popular....
3 Pages (750 words) Essay

Man in the middle and secrity in multichannel

Because of these attacks, the computer technological sector has derived various ways to secure to the communications in the systems in Multichannel and Multi-level Authentication security protocols.... The man in the middle attack takes advantage of weak network communication protocols to convince a host to route the information through the attacker instead of through the normal router.... )Works CitedAl-Fairuz, M and Renaud, K 2010, Multi-channel, Multi-level Authentication for More Secure eBanking 2010, Viewed 9 March 2012, Christianson, B and Li, J 2012, Multi-channel Key Agreement using Encrypted Public Key Exchange 2012, Viewed 9 March 2012, Diaz, J et al 2012, Formal security analysis of registration protocols for interactive systems: a methodology and a case of study2012, Viewed 9 March 2012, Lin, P 2010, IP ADDRESS SECURE MULTI-CHANNEL AUTHENTICATION FOR ONLINE TRANSACTIONS 2010, Viewed 9 March 2012, OWASP 2009, Man-in-the-middle attack 2009, Viewed 9 March 2012, Search Security 2012, man in the middle attack (fire brigade attack) 2012, Viewed 9 March 2012, < http://searchsecurity....
2 Pages (500 words) Essay

Multicast routing in mobile networking

his is my last simulation result that shows how the three protocols performed in terms of average end-to-end delay.... There is no clear winner among the protocols in our case, since different mobility patterns seem to give different performance rankings of the protocols.... The quest for security in mobile ad hoc networks.... In Proceedings of the SCS communication Networks and Distributed Systems modeling and Simulation ConferenceJ....
2 Pages (500 words) Essay

Cracking time for different protocols

Different security protocols have different types and numbers of weak points that hackers need for infiltration or intrusion.... For… Another example is widely used security protocols that do not normally entail the provisions for dependable authentication as part of the central protocol.... Different security protocols have different types and numbers of weak points that hackers need for infiltration or intrusion.... Another example is widely used security protocols that do not normally entail the provisions for dependable authentication as part of the central protocol....
2 Pages (500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us