Nobody downloaded yet

Network Management & Security - Essay Example

Comments (0) Cite this document
Summary
The following was drawn using SmartDraw to explain how the network should be set up. By using the an Ethernet switch it will be possible to handle the load that will accompany the relocation of their head office with the multitude of computers they have and will add to their network…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92% of users find it useful
Network Management & Security
Read TextPreview

Extract of sample "Network Management & Security"

Download file to see previous pages The use of an Ethernet switch will allow quicker access to services and should handle all bandwidth issues. More switches can be added to accommodate more devices as they are added.
There are three critical areas to consider when comparing Linux to Windows XP as a potential candidate for network operating system platforms: vulnerability to both attacks from outside the company's LAN/WAN and internally through security breeches, patch management with respect to the continual need to apply security patches, and availability and distribution of security information. Let's look at these security measures:
Most Linux system have not been infected with a virus. This may be due to the fact that virus writers are not, at the moment, occupied with writing code to affect Linux machines based on the fact that it is UNIX based.
SUSE Linux Enterprise Server 9 contains all the components required for compliance with the Common Criteria Evaluation CAPP/EAL 4+, improving on the top-rated CAPP/EAL 3+ certification achieved in version 8.
Windows patch management is well documented as a problem due to the amount of vulnerabilities that are present within the software itself. This is a large issue when calculating the TCO of an operating system.
According to TechNewsWorld, "one major financial institution had to go to its board of directors to approve an additional $10 million to finish this patch. After MS Blast and the cost of patching that, it's, 'Here we go again,' as new vulnerabilities are found deeply ingrained in Microsoft systems." The article also mentions the plight of another financial institution that was forced to take down its IT system for three weeks to patch its Windows desktop machines.
There is a continued weight the cost of continually patching Microsoft products when deciding which operating system to purchase.
Availability and ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Management & Security Essay Example | Topics and Well Written Essays - 2500 words”, n.d.)
Network Management & Security Essay Example | Topics and Well Written Essays - 2500 words. Retrieved from https://studentshare.org/miscellaneous/1529476-network-management-security
(Network Management & Security Essay Example | Topics and Well Written Essays - 2500 Words)
Network Management & Security Essay Example | Topics and Well Written Essays - 2500 Words. https://studentshare.org/miscellaneous/1529476-network-management-security.
“Network Management & Security Essay Example | Topics and Well Written Essays - 2500 Words”, n.d. https://studentshare.org/miscellaneous/1529476-network-management-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Network Management & Security

Network security

...? Network Security and Its Business Impact in Educational s By Mohammed Abdul Rahman Supervisor: Dr. Kim Heng Teo Master project undertaken in partial fulfillment of the requirements for the M.Sc. in Business Information Technology University of xxxxx June 2011 DISSERTATION DECLARATION FORM University of xxxxx The declaration form is to be completed and attached within the project dissertation. The student should read and sign the declaration. Student Particulars Name: Mohammed Abdul Rahman Student Id: xxxxxxxxxx Project Title: Network Security and Its Business Impact in Educational institutions Student Declaration I declare that 1. I understand what plagiarism is; 2. The consequences of plagiarism have been explained to me by my... in the...
50 Pages(12500 words)Dissertation

Network Security

...?Introduction Although there are batch of definition available on the Internet related to security. The definition available on ‘www.businessdictionary.com’ covers the basics and states it as: “Prevention of and protection against assault, damage, fire, fraud, invasion of privacy, theft, unlawful entry, and other such occurrences caused by deliberate action”. In the context of network security definition, it consists of concerns linked to network communication privacy, confidentiality of data over the network, accessing unauthorised classified data, access to prohibited network domains and utilising Internet for concealed communication (Network Security. 2007). It is the twentieth century where improved communication technologies... ...
24 Pages(6000 words)Essay

Network Security

...concern for every company that uses computers. On the other hand, if a company does not implement appropriate network security then an attacker or opponent can get access and utilize the important or secret data and information, probably causing data destruction or damage, or even the entire destruction of the computer network. In addition, the revolution of internet has modernized our lives. However these technologies as well have introduced some of the severe safety as well as confidentiality problems. These issues can be tremendously devastating for private information. In this scenario network management systems and procedures are used for the...
13 Pages(3250 words)Research Paper

Network Security

...transport architectures, and all devices have a specific transport mode that it associates with. Ultimately blackberry security is best when linked up with the blackberry enterprise server, which is designed specifically cooperate and commercial use. This server allows the smartphone to run on a remote platform with all the essential functionalities stored separate from the device. In essence, the blackberry can successfully be used for corporate business functions, and for personal use without any compromise on data integrity. Wi-Fi transport architecture provides internet connection to mobile devices, of a link to private networks. Through least cost routing, a wireless connection can be configured to...
7 Pages(1750 words)Essay

Network Security

...? Case Study on Network Security Bryant Wiersema American Public Case Study on Network Security Introduction The Internet has become a staple of the business world today. It is because of this that a company should remain continually up to date with the latest and most efficient security measures. With the dramatic growth in network reliance also comes the opportunity for illegal and malicious activity. One of the major computing challenges in today’s economy is the task of adequately securing a network - ensuring sensitive data is not compromised. Vulnerabilities due to designs flaws, poor...
3 Pages(750 words)Case Study

Network Security And Management

...OF LONDON COLLEGE Network Management and Security 2008-2009 work In'network management,'fault management'is the set of functions that detect, isolate, and correct malfunctions in a telecommunications network, compensate for environmental changes, and include maintaining and examining'error'logs, accepting and acting on error'detection'notifications, tracing and identifying faults, carrying out sequences of diagnostics tests, correcting faults, reporting error conditions, and localizing and tracing faults by examining and manipulating'database'information. A fault management console allows a'network administrator'or'system operator'to...
3 Pages(750 words)Article

Network security

...Network Security Part Today, the computer networking systems are highly vulnerable and prone to the hackers, viruses and other cyber dacoits. Therefore the network security systems have to be sound dependable and free from risks (Marcel Dekker, New York, 1997). This is only possible if the systems and service packs are continuously updated and different versions are enhanced. This dream of a foolproof secure network system can only be realized when the computer hardware is 100% compatible with the policy of security protocols. The following check list helps out the situation in an effective manner. As far as the computer hardware compatibility list (HCL) is concerned the peripherals must be compatible... with the...
6 Pages(1500 words)Essay

Network security

...Network security s of Learning Discuss the term confidentiality as it applies to data. How can data confidentiality be assured on a network? Data confidentiality entails allowing authorized users to access particular data, while preventing unauthorized access of data by intruders. When access eavesdrops into particular data, the principle of confidentiality will not hold. In networks, encryption is the principle techniques of maintain data confidentiality. This process is achieved using encryption algorithms that are used to generate keys for encrypting and decrypting data. 2. Explain the concept of technical security controls. What are some the major components that make up technical control? Technical security controls are used... to...
2 Pages(500 words)Essay

Choose one from the following: Network security Outsourcing tech support Electronic medical records VOIP phone systems Corporate social responsibility Anti-spam software Anti-virus software Email security Networking Mobile device management

...corrupted by viruses, or are misused by authorized users in the organization. Emails that are not well protected can trigger threats to national security, especially in the event that sensitive information gets in the hands of terrorists. Email security has gained remarkable significance, in the wake of the twenty first century. The problem with email security is that there are a number of issues that emerge as a result of poor management of emails. The first issue is the risk of leaking information (Porter 37). There is a possibility that organizations can lose massive amount of data through their employees. Employees send confidential information regarding...
2 Pages(500 words)Essay

Network security

...high-performance cloud or a dedicated hardware. Database servers enable the management of computer systems, specific software, and hardware. Other involving tasks such as machine troubleshooting, system maintenance and installation of user applications are taken care of by the servers. Therefore, network users can update, access, and manage a collection of information or data that is organized. Application servers The application servers are normally found on server centric architecture and are normally applied for security maintenance services. Several application servers are utilized in larger sites. The application server can either reside in one computer machine or...
3 Pages(750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Network Management & Security for FREE!

Contact Us