Nobody downloaded yet

Computer Networking - Essay Example

Comments (0) Cite this document
Summary
A set IT policy will provide manifold benefits to Harder and Harder. Firstly, its generic application has the advantage of providing all company departments of any size with standards that can be used across all electronic communications. Secondly, the IT Policy is to be a comprehensive system will innervate the entire organization…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.7% of users find it useful
Computer Networking
Read TextPreview

Extract of sample "Computer Networking"

Download file to see previous pages Hence, the document improves market benefits for the company, as well as reducing costs.
It is anticipated that periodic evaluations of the IT policy will reveal that the majority of staff will find IT systems supporting improved management, control, and/or organizational planning, which provide staff with a consistent work environment, and encourage the company's culture of collaboration, inclusiveness and continual improvement. Other benefits to be expected form the Policy are enhanced team-spirit; consistency in work performance; staff confidence in the reliability and dependability of co-workers; increased employee satisfaction and decreased perceptions of stress; and improved employee moral and training programs; as well as improved customer satisfaction.
Logging and accounting will serve important purposes within the Policy, in that they will aid in the management, tracking, accountability of use and misuse detection. The logging will especially assist with user monitoring and debugging of the IT systems. Logs can also help to identify and track the intruder if one does get through and provide additional data for other research processes. The Policy will also state the regular frequency of log review and evaluation.
The company will use a single firewall program on all its workstations as well as the same version of anti-virus software. The firewall limit exposure to threats from the Internet and to mitigate the client's risk as it inhibits network traffic that does not meet the security policy (e.g. hackers). The anti-virus software and the frequency of mandatory definition updates will be outline in the Policy. Viruses are able to destroy critical client data and other company files. The system at Harder and Harder is currently compromised by a worm virus (warez) that has been giving the hackers access and privileges of an authorised network user. The anti-virus software can attack the future viruses and so minimize the risk. However, updated virus definitions are essential to ensure that the software is not rendered useless. And so the Policy clearly addresses these issues. The Policy will aim to discourage employees to use the network in ad-hoc communications, such as with wireless networks. A hacker is able to attack this system due to the lack of authentication. Ad-hoc networks can allow a hacker to execute man in the middle attacks, denial of service, and/or compromise systems.
Further, the Policy will emphasise education, awareness and continual improvement among staff. Perception surveys of employee satisfaction, as well as outcome evaluations will be reviewed to determine degree of IT security consciousness and knowledge and compliance with IT policy. The Policy will stipulate ways that security awareness will be increased and maintained, for example through workshops, posters, or in newsletters. Studies show that staffs are more likely to comply with Policy and to make more of an effort to secure or at least limit behaviours that will put the network at risk.
The Policy will introduce inclusive decision making staff meetings to come up with IT security solutions. In a collaborative forum staffs can suggest ways to limit ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Networking Essay Example | Topics and Well Written Essays - 2250 words”, n.d.)
Computer Networking Essay Example | Topics and Well Written Essays - 2250 words. Retrieved from https://studentshare.org/miscellaneous/1529850-computer-networking
(Computer Networking Essay Example | Topics and Well Written Essays - 2250 Words)
Computer Networking Essay Example | Topics and Well Written Essays - 2250 Words. https://studentshare.org/miscellaneous/1529850-computer-networking.
“Computer Networking Essay Example | Topics and Well Written Essays - 2250 Words”, n.d. https://studentshare.org/miscellaneous/1529850-computer-networking.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Computer Networking

Computer Networking and Management

...Computer Networking and Management Project Supervisor's Table of Contents Table of Figures 1 Intranet Infrastructure Description An Engineering college intranet is considered, with the following geographical and user population: College consist of four departments, each is housed in a separate building. There is a separate Engineering library building and a one-floor data center. Each departmental building accommodates all its own administrative staff, faculty, and labs. All departmental buildings are located on the same campus, within a one square Km area. A dedicated, one-floor, facility houses all college-wide servers and external...
18 Pages(4500 words)Case Study

Computer Networking Management

...COMPUTER NETWORKING AND MANAGEMENT In a computer network management system, there should be a method for getting computer programs ready for execution, in relation to particular network devices. Every device in the network is associated with a device type value, and must have an associated device mapper. These device mappers are arranged in a hierarchical structure to show a family or functional relationship between the devices. Functions that will be executed by given devices are expressed as multiple executable program components. In reality, each organization is different and different computer...
22 Pages(5500 words)Essay

Computer Networking and Management

...below. (‘Harvard style’, n.d.c) Figure 1: Modulo numbers (Source: ‘Harvard style’, n.d.) For example, 8 + 8 mod 15 = 1, since 16 is larger than the modulus, 15, therefore, 16 – 15 = 1. Exponentiation is similarly defined; 33 mod 15 = 12 since 33 = 27 and 27 - 15 = 12. (‘Harvard style’, n.d.c) RSA involves two keys; a public key which can be known to everyone and is used for encrypting messages, and a private key which can be used to decrypt those encrypted messages. To generate the keys, RSA picks two distinct prime numbers p and q, multiplies them (p and q) together to form modulus (m), and computes φ(m) = (p - 1)(q - 1). Since xφ(m) mod m = 1, it stands to reason that xφ(m)+1 mod m = x; this special power is capable to...
8 Pages(2000 words)Essay

Computer networking and management

...B I R M I N G H A M I N T E R N A T I O N A L C O L L E G E P G D S B I T Computer Networking and Management Feb Contents 1.Task 1 3 1.1 Network Diagrams for TLS and IPSec 3 TLS Record Protocol 4 TLS Handshake Protocol 4 Netgear (2005) explained some of the properties of TLS Handshake: 5 IPSec 6 1.2 Advantages of TLS and IPSec 7 2.Task 2 8 2.1Multicast using IGMP 8 2.2 PIM Dense Mode and Sparse Mode 11 3.Task 3 13 3.1Internet Hosts 13 3.2Internet Protocols 15 SMTP Protocol: This protocol is used to deliver messages to the recipient’s mail server. 15 3.3 Format of Sending Message 15 3.4 Format of Received Message 16 4.Task 4 17 4.1IPv4 versus IPv6 17 5.Task 5 23 5.1Types of...
26 Pages(6500 words)Essay

Computer networking

...Computer Networking Submitted to, Submitted By, of the Submitted on, [April 27th, The study is anattempt to address the concept of Networking. More specifically addressing computer Networking, the report revolves around the core concept of the said issue. The report also addresses the technical concepts of implementing computer networking and also emphasizes upon its concept and use. The most prevalent norms of computer networking applications and type are addressed in the end. INTRODUCTION The onset of the digital age was like embarking upon a journey full of inventions and...
4 Pages(1000 words)Research Paper

Assignment 6 - Create an Research Paper, Resume, Cover Letter

2 Pages(500 words)Research Paper

Computer Networking

...Technologies in Wireless Networking Ahmad Alnafea Department of Computer Science and Technology of Bedfordshire Wireless network is a type of computer network that has become vital for modern existence. Some of benefits of wireless network can be convenience, flexibility, productivity, easy setup, maintainable, expandable, robust security protection and cost. The wireless networks are continuously growing but there still have some of the key challenges in wireless networks that are security, radio signal interference, system interoperability and many other bases. Now many improved standards are introduced...
1 Pages(250 words)Essay

Computer Networking - Protocol

...Computer Networking Computer Networking There are certain advantages of using circuit switching in computer networks. A significant advantage is that there is the possibility of putting data paths in a way that allows for connection that can be regarded as smooth. There is also a possibility of removing buffers that may be witnessed in the paths. In addition, this mode of network switching enhances the use of a higher capacity for switching. Despite the advantages of circuit switching, there are also some disadvantages that relate to this method of networking. One such disadvantage includes inefficiency,...
2 Pages(500 words)Essay

Computer Networking

...Computer networking Network security is fundamental in the development and sustenance of an effective computer networks.The process of developing such a network must therefore incorporate various security features that will help secure and maintain the integrity of both the data and the various communication channels. The essay below therefor investigates various security features that help secure a computer network. Such include the use of effective antiviruses, the development of effective firewalls, the use of passwords and dedicated manipulation of the user interface. The discussion further analyses the importance of...
5 Pages(1250 words)Research Paper

Computer Networking Security

...Computer Networking Security Part I. Firewall Rules Network Firewall rules #!/bin/sh # flushing all the existing filter table rules /sbin/iptables -t filter -F INPUT /sbin/ipchains -F # no traffic to server subnet 140.192.39.0/24 on TCP and UDP /sbin/iptables -A INPUT -p tcp -m multiport --dports 9000,4001:6999 -d 140.192.39.0/24 -j DROP iptables -A INPUT -p tcp -m multiport –dports 1025:4000,7000:9000 -s 140.192.39.0/24 -j ACCEPT #no traffic for port 9000, 40001:6999 but allow below 4000 and between 7000:9000 from 140.192.39.0/24 /sbiniptables -A INPUT -p udp -m multiport --destinatio-ports 9000,4001:6999 -d 140.192.39.0/24 -j DROP /sbiniptables -A INPUT -p udp -m multiport --dports...
2 Pages(500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Computer Networking for FREE!

Contact Us