StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Security - Network Design - Essay Example

Cite this document
Summary
This Data is often sensitive, personal, private and valuable in financial terms. Any misuse or fraud will render the owner of the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.9% of users find it useful
Security - Network Design
Read Text Preview

Extract of sample "Security - Network Design"

Download file to see previous pages

Literature Review reveals that there is more to security than just putting up defences. It also relates to the psychology of security that adds to the threat instead of obviating it. Technologically security measures and intrusion capabilities are advancing alongside each other and the race is yet to be decided. Hence it is imperative to tackle this issue more seriously an in a practical way. A case study has been examined to highlight the most common threat of stealing of data for misuse. The findings show that human carelessness and not giving priority to security measures coupled with psychological factors of not being open and forthright mix to result in huge losses.

Business across the world is embracing Information Technology for collecting and dissemination information. This requires Networks to connect various information centres for transfer of this information. The increase in connectivity provides access to larger and varied resources of data more quickly than ever before, and it also provides an access path to the data from virtually anywhere on the network-based environment (Seleznyov, 2001). The Network is usually on Local Area Network (LAN) which is an arrangement of communication between hardware, software and communication devices in a closed area.

Generally LAN’s connecting devices are located within a 2,000-foot radius for maximum effect. LAN’s generally have higher transmission rate than PBXs and use bus or ring topology. The Network itself may be spread worldwide like the World Wide Web. This arrangement makes it possible for the data (text, voices and graphics images, and more recently video clips) to flow between different types of hardware such as mainframes, PCs, terminals and input/output devices through use of various software.

Since a LAN is spread over a defined work space, however large it may be, it is secured by various means against any external intrusions like viruses and malware. Of course no LAN can be

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security - Network Design Essay Example | Topics and Well Written Essays - 13500 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1547680-security-network-design
(Security - Network Design Essay Example | Topics and Well Written Essays - 13500 Words)
https://studentshare.org/miscellaneous/1547680-security-network-design.
“Security - Network Design Essay Example | Topics and Well Written Essays - 13500 Words”, n.d. https://studentshare.org/miscellaneous/1547680-security-network-design.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security - Network Design

Privacy-Enhancing Security Mechanisms

Effective programming is the key towards design of efficient privacy enhancing mechanisms.... In this paper, we will discuss the technique to design a reliable and efficient privacy-preserving scheme in order to ensure increased security of data over the network.... Problem Statement The problem statement for the research paper is: "design and analysis of privacy-preserving network and cryptographic protocols" Conceptual Framework Aim of the Research In realistic networked environments, data security is the main focus of the management....
3 Pages (750 words) Research Proposal

Local Area Network Design/ Network fundamental

For effective network design, the needs to be switch located on each floor.... Report on Local Area network/network Fundamentals Name: XXXXX Professor: XXXXX Institution: XXXXX Course: XXXXX Date: XXXXX Current LAN network problems Ageing Cabinets/ traffic issues Despite the current network being wired with the CAT 5 cabling, the current cabinets that hold the patch panels need replacement.... hellip; This is because with their ageing nature they can't be in a position to support the expected network upgrade....
5 Pages (1250 words) Assignment

Importance of a Network Design

This essay "network design" provides assistance on the phone for various companies.... Star topology is recommended for the current network design.... Data transmission is conducted on a Category 5 cables for the current network design.... The company has decided to deploy a data communication network to support their business functions.... du' which says “Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers (i....
6 Pages (1500 words) Essay

Network Design Consultation

The paper "network design Consultation" discusses hardware and software requirements and cost analysis, network architecture, network architecture illustration router configuration, client configurations, internet configuration, and managing the network security.... hellip; In order to create a wireless network harboring 2 workstations, 2 laptops a server, and a shared network printer, one has to consider a cost analysis feasibility study.... With this in mind, it is important to consider the minimum requirements for every network component that would be required within the network....
5 Pages (1250 words) Case Study

Security and Redesign of a Network

Interesting ports on XYZ Invite design at domain 192.... Interesting ports on XYZ Invite design at domain 192.... Internet come with disadvantages and security lapses so has to be made secured for businesses to enjoy its full… In the case of A2Z information security is essential that is why users' password has to be properly protected. Service Information: Operating System: Microsoft Windows 2003 Server or XP Service Park 2....
4 Pages (1000 words) Essay

Security Analysis and Redesign of a Network

hellip; XYZ Invitation Printing and ABC Invitation design have merged into A2Z Invitations Company.... This coursework reviews the current XYZ's company network infrastructure, the network that will be the base of A2Z network since ABC's network infrastructure will be merged into it.... The coursework "Security Analysis and Redesign of a network" presents the review of the current network infrastructure of the XYZ company....
14 Pages (3500 words) Coursework

Security Analysis of A2Z and Redesign of its Network

The author of this paper "Security Analysis of A2Z and Redesign of its network" discusses the statistical network analysis on the examples of two companies, including the quantitive network analysis ranking of assets, NMAP, password cracking, policy creation, information about security policies.... Computer systems that are allowed in the organization are those that have been tested and certified ('Practical Packet Analysis: Using Wireshark to Solve real-world network problems', 2011)....
7 Pages (1750 words) Assignment

What Are the Different Networks Used in Hotels Contingent to the Location and Hotels Design

… The paper "Networks in Hotels" is a wonderful example of an essay on design and technology.... The paper "Networks in Hotels" is a wonderful example of an essay on design and technology.... Moreover, Mansfield and Antonakos assert that in the selection of the kind of network to be applied, the hotel's or office's design has to be considered as it enables the professionals to select the kind of network required in the hotels depending on its objectives and goals....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us