StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Infrastructure and Security - Essay Example

Cite this document
Summary
"Network Infrastructure and Security" paper states that virtualization and cloud computing are used in an immense manner with the aim of ascertaining that resources are used appropriately. Effective utilization of resources aid in accelerating the development of computer resources at a reduced cost…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.7% of users find it useful
Network Infrastructure and Security
Read Text Preview

Extract of sample "Network Infrastructure and Security"

Network Infrastructure and Security Section Infrastructure Network Infrastructure Vulnerabilities In the present day context, the advent of technology in the area of information technology has raised numerous complications for changes in servers, connections, ports and services in rapid manner. Network infrastructure signifies the computer network with the assistance of which data is transferred within network node. Since the company is merging with a multinational company, virtualization and cloud technology is identified to be crucial for its smooth operation. However, the issue of network vulnerabilities can be recognized as a significant challenge for the company during the course of integrating virtualization and cloud technology. Additionally, various factors are accountable for network infrastructure vulnerabilities that include password infringement, incorrect systems configuration and attacks arising from malicious codes among others (Awodele et al., 2012). Presently, virtualization and cloud computing are used in an immense manner with the aim of ascertaining that resources are used appropriately. In this respect, effective utilization of resources aid in deploying as well as accelerating development of computer resources at a reduced cost. The network infrastructure developed for performing data transfer operations through virtualization and cloud-computing technology is associated with different threats that include web threats, phishing, worms, data-stealing, malware, bots, viruses and spyware among others. The development of virtualization and cloud technology has also raised different security risks in virtual machines (VMs). Security risks in visualization network infrastructure include inter-VM attacks, mixed trust level VMs and communication blind spots. On the other hand, security threats are also identified in cloud technology which includes resource cloning, data motility and unencrypted data among others (TrendMicro, 2011). In this regard, measures are required to be adopted with the aim of ascertaining that network infrastructure vulnerabilities arising in virtualization and cloud technology are mitigated. Measures for mitigating security risks in virtualization include guest OS security, image management security and hypervisor security. Guest OS security ensures that components and different nodes over a network are secured, so that guest OS is protected from security threats arising from network infiltration. Image management security ascertains that VM images are managed, stored and disseminated suitably. Hypervisor security ensures that the management layer of a virtualized system is safeguarded in an efficient manner with the aim of minimizing attacks and unauthorized access (Zheng, 2011). In a similar perspective, cloud technology network infrastructure vulnerabilities can be mitigated with the assistance of different counter measures that include enhancement of security policy, access management, implementation of security techniques, data protection. In this context, security policy is required to be imported with the aim of minimizing malicious activities such as spamming among others. Accessibility in cloud technology should be managed effectively, so that authorized users are able to access data through cloud computing. In cloud technology, data is required to be protected from data loss, anomalous behavior, authorization technologies and encryption tools. Additionally, security techniques such as using ‘File Allocation Table (FAT) system architecture’ should be implemented with the intention of preventing malware injection (Chou, 2013). 2. Logical and Physical Topographical Layout of Computer Network Logical and Physical Topographical Layout of Computer Network The logical and physical topological layout for the planned network infrastructure has been illustrated in the above diagram. The layout will assist the company in developing a better network for storage and transmission of data between workstations and virtualization as well as cloud technology. Additionally, the layout will aid in managing data within the network by eliminating network infrastructure vulnerabilities. 3. Determination of Access Path in a Computer Network Logical and physical topographical layout will facilitate the company to achieve secure transmission of data over the network from server to workstations i. The layout has been designed with the aim of ascertaining that data or information is transmitted or stored on the basis of confidentiality, integrity, and availability (CIA) of information. However, the network infrastructure might raise complications relating to bandwidth issue. The company might face with the problem of bandwidth allocation and flow control. 4. Comprehensive Security Policy A network infrastructure is required to be based on an appropriate framework with the assistance of which data are transferred and managed effectively over a network developed on virtualization and cloud technology. Moreover, network infrastructure should be supported with valid security policy or model in order to prevent malicious attack and unauthorized accessibility. In this context, the company implementing the virtualization and cloud technology is required to ensure that the information system installed is properly scrutinized, and protected with firewall and intrusion detection system (IDS). Subsequently, the network infrastructure of the company will be protected with the assistance of confidentiality, integrity, and availability (CIA) of information. The company implementing network infrastructure based on CIA principles will assist in ascertaining that data and systems are managed successfully. The CIA model is designed for using as a preferable guideline for managing information system of the company (TechTarget, 2014; Sattarova & Tao-hoon, 2007). The three principles of CIA of information are discussed hereunder. Confidentiality. Confidentiality is used as a medium of preventing disclosure as well as dissemination of information to unauthorized systems along with users. In this respect, the network installed in the company would ensure confidentiality on the ground of privacy. Additionally, enabling privacy through confidentiality protection facilitates in developing an appropriate access level for better management of information over the network. The network infrastructure of the company will also be safeguarded through the use of ‘access control lists’, and ‘file and volume encryption’ among others (TechTarget, 2014; Sattarova & Tao-hoon, 2007). Integrity. Integrity implies that data or information over a network is required to be protected from different types of infringement, so that information security is maintained. In this regard, the company implementing the network infrastructure should ensure that data should be accessed with appropriate authorization. Subsequently, the network based on the principle of integrity will ensure that data and information is managed with better accuracy, consistency as well as trustworthiness. The principle of integrity protects data from alteration as well as modification during transit. Respectively, the company is required to adopt Unix file permissions with the aim of safeguarding data (TechTarget, 2014; Sattarova & Tao-hoon, 2007). Availability. Availability principle ascertain that data or information is required to be stored and accessed in an effective manner for better availability of information resources. In this context, information systems of the company within the newly developed network infrastructure will ascertain that data is disseminated on request basis. Thus, the computing systems and communication channels should be protected as well as functioning appropriately. Information availability over the network of the company can be enhanced through high-availability cluster, disaster recovery systems and failover redundancy systems (TechTarget, 2014; Sattarova & Tao-hoon, 2007). Subsequently, the network infrastructure of the company based on CIA principles aids in ensuring that data storage and dissemination operations are conducted in a secure manner. Additionally, the CIA principles also ascertain that the information systems of the company are able to provide information with better accountability. In this context, the three factors of CIA assist in managing the three goals of confidentiality, integrity along with availability in order maintain information and data suitably. The implementation of network infrastructure in the company is also required to possess certain ethical considerations with the assistance of which employee behavior, contractors, password usage, and access to networked resources and information should be maintained effectively. The company should adopt different policies as well as regulations for managing information technology resources. The policies as well as regulations is required to be in compliance with Federal along with State law for better administration of network infrastructure and information technology resources. The policies as well as regulations should signify user accessibility policy, user responsibility policy and user compliance certificate among others. The stakeholders of the company comprising employee and contractors among others should comply with the policies as well as regulations, so that business operations are performed ethically. Additionally, users should possess authorization certificate for accessing information over the network. Respectively, users are required to maintain password confidentiality in order to access networked resources and information without any vulnerability (East Tennessee State University, 2006; Tawazun, n.d.). References Awodele, O., Onuiri, E. E., & Okolie, S. O. (2012). Vulnerabilities in network infrastructures and prevention/containment measures. Retrieved from http://proceedings.informingscience.org/InSITE2012/InSITE12p053-067Awodele0012.pdf Chou, T. (2013). Security threats on cloud computing vulnerabilities. International Journal of Computer Science & Information Technology (IJCSIT), 5(3), 79-88. East Tennessee State University. (2006). Information technology code of ethics. Retrieved from http://www.etsu.edu/oit/policies/inftechcodeethics.aspx Sattarova, F. Y. & Tao-hoon, K., 2007. IT security review: privacy, protection, access control, assurance and system security. International Journal of Multimedia and Ubiquitous Engineering, 2(2), 17-32. Tawazun. (n.d.). Code of ethics. Retrieved from https://secure.ethicspoint.com/domain/media/en/gui/33742/code.pdf TechTarget. (2014). Confidentiality, integrity, and availability (CIA). Retrieved from http://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA TrendMicro, 2011. Security threats to evolving data centers. Retrieved from http://www.trendmicro.com/cloud-content/us/pdfs/about/rpt_security-threats-to-datacenters.pdf Zheng, M. (2011). Virtualization security in data centers and clouds. Retrieved from http://www.cse.wustl.edu/~jain/cse571-11/ftp/virtual/ Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Network Infrastructure and Security Essay Example | Topics and Well Written Essays - 1250 words, n.d.)
Network Infrastructure and Security Essay Example | Topics and Well Written Essays - 1250 words. https://studentshare.org/information-technology/1837085-network-infrastructure-and-security
(Network Infrastructure and Security Essay Example | Topics and Well Written Essays - 1250 Words)
Network Infrastructure and Security Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1837085-network-infrastructure-and-security.
“Network Infrastructure and Security Essay Example | Topics and Well Written Essays - 1250 Words”. https://studentshare.org/information-technology/1837085-network-infrastructure-and-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Infrastructure and Security

Network Security

Network security is complicated but is equally important because it secures the assets of a company and allows it to keep its secretive strategic plans so as to gain competitive advantage.... In the contemporary age network security has become vital for preserving their relationships.... hellip; This paper discusses some of the potential threats to network security and the ways to mitigate them.... The paper also renders useful information about network security policing....
9 Pages (2250 words) Research Paper

The Risks And Ramifications Of An Information Security

The value of the information within the organization's database is high thus the organization's Network Infrastructure and Security system are always at constant attack attempts.... The results of the penetration test will then be presented to the Chief Information Officer with recommendations that could help mitigate the risks and eliminate the vulnerabilities detected within the Network Infrastructure and Security system.... The organization has a large network infrastructure through which information is transmitted on a daily basis....
5 Pages (1250 words) Case Study

The Issue of Network Security

It is essential for companies to secure the network infrastructure from vulnerabilities and shortcomings that may arise.... It is essential for companies to secure the network infrastructure from vulnerabilities and shortcomings that may arise.... How to secure the network infrastructure There are several ways in which unauthorized users can gain access to the peer-to-peer networks in a company.... According to Brown (2000), the network infrastructure of a company should also be protected from computer viruses which may infect the operating systems and files....
2 Pages (500 words) Essay

IT Infrastructure of a Company

Consequently, an organization will need a lower number of support staff to administer centralized security accounts compared to other situations where access rights are to be configured on individual computers.... Such decisions manifested themselves in the mainframe, client/server and distributed infrastructure strategies that organizations follow.... Here to… Client-server infrastructure is an infrastructure type in which a server is used to host, deliver and manage a number of services and resources that the client needs....
4 Pages (1000 words) Coursework

Network security infrastructure

Without proper network security measures, many individual, government agencies and business enterprises risk losing their data. ... etwork security is basically a process by NETWORK security INFRASTRUCTURE By: Network security Infrastructure Recently, theuse of the Internet has continued to grow exponentially.... However, these internet-based services and applications sometimes pose security threats to the internet users....
2 Pages (500 words) Essay

Infrastructure and Security of Information Network

This coursework "Infrastructure and Security of Information Network" designs and provides Network Infrastructure and Security logical and physical topographical layout.... nbsp;… The paper the reason for the design of the layouts to the IT experts and to the management team of infrastructure and security systems.... The section provides a detailed discussion of vulnerabilities of infrastructure and security and provides solutions for the information network....
7 Pages (1750 words) Coursework

Broadway Training Partners New Training Centre

The project scope and deliverables include an IT architecture plan; hardware, software, database management system, infrastructure purchase, and security solution purchase and their installation; transfer of existing business applications and data; staff and user training; test and evaluation, and going live with the full system.... The new system and network will allow BTP to double the courses run yearly and support 10 more major corporate clients.... Maintenance of the system and network, refurbishment of the training center, and availing of training and breakout rooms are out of scope for this sub-project....
6 Pages (1500 words) Report

New Training Premises of Broadway Training Partners

These include all the training software, hardware, Network Infrastructure and Security solutions etc.... … Purpose of the Project Plan This project plan will provide detailed information on a new training premises project in Broadway Training Partners.... The plan provides the project framework that serves as an agreement with the stakeholders who include: Purpose of the Project Plan This project plan will provide detailed information on a new training premises project in Broadway Training Partners....
12 Pages (3000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us