Network Architecture and Security Considerations in IISC - Term Paper Example

Comments (0) Cite this document
Summary
This term paper "Network Architecture and Security Considerations in IISC" is aimed to analyze the Security Administrator Handbook of the IISC. Providing a secure architecture guarantees that the cost of system failure, recovery process, interruption of business operations are at minimal…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.9% of users find it useful
Network Architecture and Security Considerations in IISC
Read TextPreview

Extract of sample "Network Architecture and Security Considerations in IISC"

Download file to see previous pages All users of a wireless network for IISC must take necessary protocols, including the use of strongest-possible encryption, passwords, and virus protection criteria, to combat risks to Identity Internet Solutions Company’s data and information systems linked with the application of wireless access technologies.
The purpose of this policy is to offer protection to confidential information as well as integrity and availability of the wireless network infrastructure. It protects the aforementioned aspects from a compromise that may be triggered by unauthorized access, and to prevent deployment of open and unsecured wireless access platforms.
Users are strictly disallowed from using or rather installing their personal Access Points within the network. If any of such devices are discovered, IISC IT department reserves the right to unplug and render them dysfunctional at the router level. However, persistent violation of this policy requirement will be regarded as a violation of Acceptable Use Policy and can attract disciplinary action that may include, but not limited to, a legal action.
All forms of data communication and operations within the wireless network shall be regarded as untrusted. Therefore, all users will be subject to the limitation provided to protect the security and integrity of data in the entire communication network.
Accessibility to the Internet shall be offered with the least possible limitations. However, users making use of the internet service shall be subject to terms and conditions stipulated in the Acceptable Use Policy.
Authentication shall be fixed to Share Key Authentication instead of default Open Systems Authentication so as to compel prospective clients to authenticate themselves before getting permission to connect to the wireless network. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Architecture and Security Considerations in IISC Term Paper”, n.d.)
Network Architecture and Security Considerations in IISC Term Paper. Retrieved from https://studentshare.org/information-technology/1813732-term-paper-security-administrator-handbook
(Network Architecture and Security Considerations in IISC Term Paper)
Network Architecture and Security Considerations in IISC Term Paper. https://studentshare.org/information-technology/1813732-term-paper-security-administrator-handbook.
“Network Architecture and Security Considerations in IISC Term Paper”, n.d. https://studentshare.org/information-technology/1813732-term-paper-security-administrator-handbook.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Network Architecture and Security Considerations in IISC

Network security

...network. 3.3. f. Design for generating the intended project outcome The processed data would be analyzed to identify the factors of change in the network security planning and the amount of change which is required with the addition of a wireless network in the existing institutions wired network security. The data would blend the key findings and learning about the network security implementation policy variation with the change in the existing network architecture. Chapter 4: Data Analysis and Results A survey questionnaire was generated for collection of data related...
50 Pages(12500 words)Dissertation

Network Security

...created new trends of doing business and communication. Furthermore, technology has provided a new approach of operating businesses during the past several years, and continues to provide numerous benefits as it spreads all over the world. However, with its extensive adoption, threats and vulnerabilities are also growing. Organisations spent vast funds to secure their confidential data and network environment. In addition, hardware security modules are taken into consideration for securing mission-critical data. However, these modules need frequent updates for virus definitions and new threats, which may disturb the network. Every now...
24 Pages(6000 words)Essay

Network Security

...; Kaminsky and Foster; Bhattacharya and Ghosh). This paper will present a detailed overview of network security, network security policy, importance of network security policy, its implementation and design considerations for network security. At the moment, network security is a hot topic for the organizations as well as individuals. This research is aimed to highlight technology involved in network security, future trends of network security, companies adopting this issue, regulatory...
13 Pages(3250 words)Research Paper

Network security

...?NETWORK SECURITY Network Security Affiliation Table of Contents Table of Contents 2 Type of Network Security 3 User and Password Based Access: 4 Firewalls 4 Antivirus Software 5 Data Backups 5 Network Security Devices 5 Security Cameras 5 DVDs/Tapes 6 Hardware Discussed 6 Printers and Scanners 6 Switch 6 Computer Server 6 Personal Computers 7 Recommendations 7 Staff Training 7 Update Passwords 7 Update Antivirus Regularly 7 Cloud-based Backup 8 References 9 Executive Summary In the past few years network security has turned out to be a serious challenge...
5 Pages(1250 words)Essay

Network Security

...transport architectures, and all devices have a specific transport mode that it associates with. Ultimately blackberry security is best when linked up with the blackberry enterprise server, which is designed specifically cooperate and commercial use. This server allows the smartphone to run on a remote platform with all the essential functionalities stored separate from the device. In essence, the blackberry can successfully be used for corporate business functions, and for personal use without any compromise on data integrity. Wi-Fi transport architecture provides internet connection to mobile devices, of a link to private networks. Through least cost routing, a...
7 Pages(1750 words)Essay

Network Security

...? Case Study on Network Security Bryant Wiersema American Public Case Study on Network Security Introduction The Internet has become a staple of the business world today. It is because of this that a company should remain continually up to date with the latest and most efficient security measures. With the dramatic growth in network reliance also comes the opportunity for illegal and malicious activity. One of the major computing challenges in today’s economy is the task of adequately securing a network - ensuring sensitive data is not compromised. Vulnerabilities due to designs flaws, poor...
3 Pages(750 words)Case Study

Network Architecture Selection

...-1NETWORK ARCHITECTURE SELECTION In considering the most appropriate system or network architecture, several factors need to be considered. In more ways than one, designing the architecture of a network is parallel to planning and building a house or physical structure. It is important for the designer to consider the functionality of the network. Moreover, the purpose of each component to be included in the design must likewise be taken into consideration. Basically, selecting the network's architecture entails answering several questions which each play a part in determining the most...
5 Pages(1250 words)Essay

Network security

...Network Security Part Today, the computer networking systems are highly vulnerable and prone to the hackers, viruses and other cyber dacoits. Therefore the network security systems have to be sound dependable and free from risks (Marcel Dekker, New York, 1997). This is only possible if the systems and service packs are continuously updated and different versions are enhanced. This dream of a foolproof secure network system can only be realized when the computer hardware is 100% compatible with the policy of security protocols. The following check list helps out the situation in an effective manner. As far as the computer hardware compatibility list (HCL) is concerned the peripherals must be compatible... with the...
6 Pages(1500 words)Essay

Network security

...Network security s of Learning Discuss the term confidentiality as it applies to data. How can data confidentiality be assured on a network? Data confidentiality entails allowing authorized users to access particular data, while preventing unauthorized access of data by intruders. When access eavesdrops into particular data, the principle of confidentiality will not hold. In networks, encryption is the principle techniques of maintain data confidentiality. This process is achieved using encryption algorithms that are used to generate keys for encrypting and decrypting data. 2. Explain the concept of technical security controls. What are some the major components that make up technical control? Technical security controls are used... to...
2 Pages(500 words)Essay

Network Security Architecture

...Running head: Secure Wireless LAN Architecture SECURE WIRELESS LAN ARCHITECTURE According to Hermans (2005) there are two major methods for implementing WLAN networks today, both of which involve Wireless 802.11 standard. These two approaches, however, entail some basic differences which majorly impact deployment costs, management and security. These architectures are namely the Centralized and Distributed AP WLAN architectures. The former requires one or multiple servers or switches to be deployed while the latter approach is more coherent to the IEEE 802.11 standard. The IEEE 802.11 specifies a...
1 Pages(250 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Term Paper on topic Network Architecture and Security Considerations in IISC for FREE!

Contact Us