Nobody downloaded yet

Networking Security and administration - Essay Example

Comments (0) Cite this document
Integrating the other company's existing network infrastructure into my organization's one requires number of network and security issues. Integrating the security infrastructure of two organizations involves a number of complex policy administration, engineering, implementation, and managerial tasks…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.9% of users find it useful
Networking Security and administration
Read TextPreview

Extract of sample
"Networking Security and administration"

Download file to see previous pages Network Equipment -- List of all current network equipment such as routers, switches, encryptors, their current operating system (if any) and version number, their current IP addresses, their physical location, and their logical (network) location.
Connection between my organization's network and other organization's is provided using the Internet as the medium. The danger in doing this is that there is no privacy on this channel, and it's difficult to provide the other office access to internal resources without providing those resources to everyone on the Internet.
To prevent this bottleneck in security I plan to use VPN. VPNs provide the ability for two offices to communicate with each other in such a way that it looks like they're directly connected over a private leased line. The session between them, although going over the Internet, is private because the link is encrypted. Also the link is convenient, because each can see each other's internal resources without showing them off to the entire world.
A number of firewall vendors are including the ability to build VPNs in their offerings, either directly with their base product, or as an add-on. If you have needed to connect several offices together, this might very well be the best way to do it.
Network performance is common problem of growth for corporations. ...
If you have needed to connect several offices together, this might very well be the best way to do it.
Problems of Growth
There are two problems of integration of the other company's existing network infrastructure into my organisations: performance and infrastructure.
Network performance is common problem of growth for corporations. A lot of companies haven't easily been able to gather the data needed to illustrate what was flowing over their networks. In most cases, companies took a reactive rather than a proactive approach. After users complained about slow response times, a technician would walk to various network-connection points, install a protocol analyser that would gather network throughput data and generate reports outlining how different segments were performing, and then manually sift through the reports to determine a problem's source. This process was both time-consuming and error-prone.
Now many network-equipment vendors working with the Internet Engineering Task Force began to outline standards that could automate the collection of performance data, that enables network managers to automatically pull management information from network devices, such as routers and switches. So when they see that network traffic exceeds existent equipment's performance abilities, they can order more productive equipment.
Integration of one company's existing network infrastructure into the others may need structural changes in the existing network. Good solution can be treating new company as a branch, so I need to provide a sub-domain to its network and to build trust relations accordingly.
Legacy Systems
Since the new company uses Windows for desktops and servers and current support ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Networking Security and administration Essay Example | Topics and Well Written Essays - 1500 words”, n.d.)
Networking Security and administration Essay Example | Topics and Well Written Essays - 1500 words. Retrieved from
(Networking Security and Administration Essay Example | Topics and Well Written Essays - 1500 Words)
Networking Security and Administration Essay Example | Topics and Well Written Essays - 1500 Words.
“Networking Security and Administration Essay Example | Topics and Well Written Essays - 1500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
Transportation and Security administration
...? Teacher’s TSA [Transportation and Security Administration] needs to focus on broader intelligence gathering, knowledge management, and enhanced coordination with international partners Annotated Bibliography Johnstone, R. W. (2007). Not safe enough: Fixing transportation security. Issues in Science and Technology, 23(2), 51-60. Retrieved from: The author Johnstone in this paper has investigated and compared the security level of the transportation security before and after the terrorist attacks of September 11, 2001. Before attacks, criminal activity and smugglers were the main aim to be...
11 Pages(2750 words)Research Paper
Enterprise Networking and Security
...demonstrates a firewall, Microsoft Internet Security and Acceleration (ISA) server and a domain controller with Microsoft Active Directory. The three categories for network vulnerabilities are categorized as below: 2.1 Logical Vulnerabilities The current logical controls for protecting information assets within the network are active Microsoft Active directory, ISA server and a Firewall. The Microsoft active directory is not primarily a security control, as it does not mitigate any risks associated with viruses, worms, Trojans, phishing, spam, denial of service attacks etc. however, it provides a secure administration of user profiles...
12 Pages(3000 words)Assignment
..., Sun Solaris etc. 2 UNIX Administration UNIX system administrator is responsible for installing software, patches, administer file system, analyze and constantly monitor the performance. If any issue occurs, system administrator troubleshoots the issue with the help of available tools and commands. Hardware and software configuration management, liaison with data center, software and hardware migration also add to the responsibilities of a UNIX system administrator. The UNIX administration is divided in to two separate groups. System Administration Network Administration 2.1 System...
7 Pages(1750 words)Essay
The Transportation Security Administration
...that I have noted elsewhere, including improper hiring procedures, nepotism, and tyrannical rules and regulations from its top management. References "Aviation Security: Transportation Security Administration may face resource and other challenges in developing a system to screen all cargo transported on passenger aircraft." (2008). Public performance measurement and reporting network. Retrieved October 16 2008, from Byrd, R.C. (2007). Transportation Security Administration processes for designating and releasing sensitive security information. GAO....
15 Pages(3750 words)Essay
Networking Security Engineering
...on the same system. The security features must verify the system integrity with secure execution file and verification features. The risk was reduced by granting only the privileges needed with user and process right management. Simplify administration by using the open standards based cryptographic framework for file encryption. Secure the IT systems by leveraging IP Sec and IP filter firewall for network traffic protection. It must reset failed OS s by data recovery systems. The critical information systems must be kept up and running or quickly restarted after a failure. A host of tools must be presenting services that help utilities comply with...
11 Pages(2750 words)Essay
Networking and Security: Firewalls
...Networking and Security: Firewalls Security is the core issue of all present and future networks. Firewalls play a vital role in achieving a high scale security. Fundamentally, they are classified as software and hardware firewalls. Firewalls filter inbound or outbound traffic by either allowing or denying it. More often than not a software firewall can manage the major security issues of a home user. Because traffic is limited software firewall can perform well with a computer of good specifications; however in a medium size organization or an enterprise these dimensions are quite different and require specialized hardware firewall. High volumes of data per second can choke the network if the firewall hardware requirements... are not...
1 Pages(250 words)Essay
Transportation Security Administration
Failure to meet these standards results, in insecurity throughout the country via allowing the entry of disguised terrorists and weapons (TSA Passengers only need to provide their ID and boarding pass to Transportation security administration (TSA) employees on entry to the immigration departure department. Any person who fails to give the valid travel identifications is subject to further inspections. A boarding pass system of scanning (BPSS) is effective in detecting altered or fraudulent documents. However, the system may not work properly as a result of fraudulent activities in the acquisition of travel ids such as the use of a fake ID or a stolen credit card, whereby this machine may not detect such crimes. Their dutie...
2 Pages(500 words)Assignment
Networking and data security to guard against identity theft by protecting personal information, and governments often use it to secure their classified information. It can also be used to ensure or facilitate secret communication particularly for the governments, individuals, and businesses. Encryption is used when a very confidential data is in transit, those being transferred through networks. It is also used when a very confidential data is at rest (stored) such as files on storage devices and computers. 10. Which layer of the OSI model implements security in a Web application? The OSL model layer that implements security in a web application is definitely the application layer (layer seven)...
4 Pages(1000 words)Assignment
The security of networking
...The security of networking Computer networks of any company or individual are potentially vulnerable to numerous dangers. The dangers have a potential of propagating a great harm to the system. Individuals may gain access computer servers such as Windows and Linux in order to exploit the vulnerabilities of a company or an individual. Security events are on the rise at an alarming rate each year. As the complexity of safety threats increase, so do the security mechanisms necessary to safeguard networks. Information center operators, network administrators, and other information center experts need to...
11 Pages(2750 words)Research Paper
Computer Networking Security
...a certain range. Some Internet traffic to the VPN should be limited instead of allowing all inbound traffic to be accepted. The executive can be given access to the application servers he uses from his home network by implementing a rule that allows subnet E traffic to be sent through VPN port 1723. Assistant network administrator can be given access rights to the application server through providing specific access rules for him by specifying his mac address as an exception and opening some general purpose ports for him. Additional IP table rules can include rules that restrict the number of parallel connections from one IP client. The network...
2 Pages(500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic Networking Security and administration for FREE!
logo footer
Contact us:
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us