StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Network Security System - Case Study Example

Comments (0) Cite this document
Summary
This case study "Network Security System" evaluates the network topology in the institution in terms of efficiency and safety and provides the best alternative or option for maintaining the security apparatus. It specifically outlines the installation of a Perimeter Network Security system…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.4% of users find it useful
Network Security System
Read Text Preview

Extract of sample "Network Security System"

Download file to see previous pages The risk of being compromised by malicious users should be checked by the use of a firewall in the computer system, either a hardware firewall or a software firewall (Mansfield-Devine, 2009). This paper evaluates the network topology in the institution in terms of efficiency and safety and provides the best alternative or option for maintaining the security apparatus of the network system in the institution. It specifically outlines the installation of a Perimeter Network Security system based on Cisco devices.
Firewalls act as gatekeepers to any network. They allow or deny any traffic flow of data in any system. Filtering routers serve as alerts in case any malware interferes with the network (Mansfield-Devine, 2009). It is difficult to control all the security issues with a computer networking system using a single security solution. As a result, security measures are installed in the form of multiple layers of several security details. In case one of the security layer or detail fails, then the others can take cover and ensure the system is always secured. The security system will entail various components installed to monitor and control the traffic flow. This system will consist of the following components:
In my research about the case of the problem facing the current network present in the university, I have come to understand that the star topology used in the system is not that bad but only needs a few adjustments and the addition of some very important components.
The security of information is an important component of the network system. In the present system, centralized monitoring of the system is made possible which is a very important aspect of any network. This only needs to be improved to restrict users to only a limited amount of information on the system. It is also easy to extend the network by adding new computers and hardware to the system. In a few words, the system is not completely bad but it has liabilities. ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Network Security System Case Study Example | Topics and Well Written Essays - 2000 words, n.d.)
Network Security System Case Study Example | Topics and Well Written Essays - 2000 words. https://studentshare.org/information-technology/1846413-network-security
(Network Security System Case Study Example | Topics and Well Written Essays - 2000 Words)
Network Security System Case Study Example | Topics and Well Written Essays - 2000 Words. https://studentshare.org/information-technology/1846413-network-security.
“Network Security System Case Study Example | Topics and Well Written Essays - 2000 Words”. https://studentshare.org/information-technology/1846413-network-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Network Security System

System Software and Network Security

...Network Security System... Network Security System... System Software and Network Security XXXXX XXXXX XXXXX XXXXX XXXXX Table of contents Definition 3 Security Factors to Consider When Choosing a Good Cloud Provider 5 Types of Cloud Computing 7 Public Cloud 7 Benefits of Public Cloud Computing 7 Drawbacks of Public Cloud Computing 8 Applications suitable for Public Cloud Computing 8 Private cloud 9 Benefits of Private Cloud 9 Challenges of Private Cloud computing 10 Hybrid Cloud 11 Benefits of Hybrid Cloud 11 Final Thoughts 12 System Software and Network Security Definition Cloud computing which is becoming one of the next industry buzz worlds, is defined as the use of a collection of various distributed services, different applications,...
10 Pages (2500 words) Essay

Network Security

...Network Security System... Network Security System... Although there are batch of definition available on the Internet related to security. The definition available on ‘www.businessdictionary.com’ covers the basics and states it as: “Prevention of and protection against assault, damage, fire, fraud, invasion of privacy, theft, unlawful entry, and other such occurrences caused by deliberate action”. In the context of network security definition, it consists of concerns linked to network communication privacy, confidentiality of data over the network, accessing unauthorised classified data, access to prohibited network domains and utilising Internet for concealed communication (Network Security. 2007). It is the twentieth century where improved...
24 Pages (6000 words) Essay

Network Security

...Network Security System... Network Security System... ID # Network Security Introduction During the last few decades several technologies have been emerged throughout the whole globe and networking technology is certainly the most amazing achievement in this era. Additionally, the innovations in computer and networking fields have open new ways for the businesses to boost their performance. New systems are being developed to effectively handle and administer corporate working and activities. However, security has become a complex assignment for current network administration. Normally, attackers enter into a network by making use of different tools and technologies. In this regard, network security comprises the measures a company can take to...
13 Pages (3250 words) Research Paper

Network Security

...Network Security System... Network Security System... Case Study on Network Security Bryant Wiersema American Public Case Study on Network Security Introduction The Internet has become a staple of the business world today. It is because of this that a company should remain continually up to date with the latest and most efficient security measures. With the dramatic growth in network reliance also comes the opportunity for illegal and malicious activity. One of the major computing challenges in today’s economy is the task of adequately securing a network - ensuring sensitive data is not compromised. Vulnerabilities due to designs flaws, poor security management, incorrect implementation, and malicious intent can all contribute to the loss of...
3 Pages (750 words) Case Study

Computer system Network Security

...into telephone systems. As technology advanced in computing, computer systems became targets as well. The need for computer network security system raised when a couple of incidents occurred in the USA. The Federal Bureau of Investigation (FBI) made one of its first arrests related to computer hacking in the early 1980s3. A group of hackers known as the 414s, named after their area code in Milwaukee, Wisconsin, were indicted for attacking 60 different computer systems including the Los Alamos National Laboratory and the Memorial Sloan-Kettering Cancer Center. Computer security breaches like these became increasingly...
5 Pages (1250 words) Essay

Security Network Intrusion detection system (IDS)

...Network Security System... Network Security System... Intrusion Detection System Introduction Intrusion detection and prevention is vital when it comes to a network’s security. A network intrusion detection system (NIDS) keeps a check on the network traffic, signals when it encounters a security breach, a malicious activity or an attack, and obstructs the source IP address from accessing the network. Below is discussed a case study and important actions which become necessary in case of network intrusion. Case Study If I get an alert from the IDS telling me that somebody is trying to connect repeatedly to port 3389 of my computer at 192.168.2.124 and the mouse pointer starts moving by itself, I would carry out the following steps. 1) The first a...
2 Pages (500 words) Essay

Network security

...Network Security System... Network Security System... security s of Learning Discuss the term confidentiality as it applies to data. How can data confidentiality be assured on a network? Data confidentiality entails allowing authorized users to access particular data, while preventing unauthorized access of data by intruders. When access eavesdrops into particular data, the principle of confidentiality will not hold. In networks, encryption is the principle techniques of maintain data confidentiality. This process is achieved using encryption algorithms that are used to generate keys for encrypting and decrypting data. 2. Explain the concept of technical security controls. What are some the major components that make up technical control? Technic...
2 Pages (500 words) Essay

Attack metholodgies ( network security )

...Network Security Attack Methodologies Grade (December 11, Network Security Attack Methodologies Abstract The current computer network security systems are faced by numerous attacks, thus creating the need for robust means of protecting the systems against the threats and potential attacks. Traditionally, the attack on network security systems was purely a matter of fun, where the computer systems attackers and hackers were doing it for the fun of enjoying their prowess in managing to tamper and penetrate through established network security systems. However, the modern objective for computer systems and network security attacks has changed from that of fun into a business objective. Thus, the security system attackers and hackers are now...
7 Pages (1750 words) Essay

Network Security-Intrusion Detection System

...Network Security System... Network Security System... Security-Intrusion Detection System Faculty Table of Contents Keywords I. Introduction II. Intrusion Detection (ID) III. Intrusion Detection Systems (IDS) Host Based Intrusion Detection Systems Network Based Intrusion Detection Systems IV. Need of Intrusion Detection System in Organizations V. Guidelines for IDS Deployment, Operation and Maintenance VI. Conclusion Reference Appendix Comparative Analysis of HIDS vs. NIDS Abstract Today safeguarding of any computer system or network becomes very difficult. Less technical ability is required for the novice attacker, because of proven past methods are easily accessed through the Web by the attacker. There have been number of cases reported when m...
16 Pages (4000 words) Essay

Designing a Wireless Communications and Computing Network System with Wireless Security and Smart Mobile Antenna Technology

...Network Security System... Network Security System... A WIRELESS COMMUNICATIONS AND COMPUTING NETWORK SYSTEM WITH WIRELESS SECURITY AND SMART MOBILE ANTENNA TECHNOLOGY FOR A HOTEL WITH GARDEN AND CAR PARK Course Name: Code: Name: Submitted to: Abstract This work envisaged designing a wireless communications and computing network system with wireless security and smart mobile antenna technology for a hotel with garden and car park. A thorough study of the area is made and relevant data is gathered. Subsequently, a discussion on the planning and engineering process that can be used to design a microcellular radio system was made. A discussion on the problem areas those are associated with microcellular systems was made. Subsequently a comparison w...
17 Pages (4250 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Network Security System for FREE!

Contact Us