Apart from the Firewall and IDS for the network security, the company will also integrate encryption system to protect the company network devices.
Encryption
Encryption is very effective for enhancing security devices of our information systems. The encryption system will assist in enhancing confidentiality and integrity of our information systems. More importantly, encryption will be effective in enhancing our network security because it will protect our system from network-based attacks such as eavesdropping and replaying messages. Typically, the encryption solutions will be integrated at application layer because encryption will assist the integrity of data transmitted across our information system. The encryption will change the data transferred across the information system into unreadable texts so that an unauthorized individual will not have access to our data. With the public key system, we will be able to decrypt the text to have access to the data. (Data Center Fabric, 2013).
3. Identification of the Boundary of the Data Center and the client's boundary location
Representation
The company will set an IP address range that we will use as the boundary for the Data Center. The IP address range will be combination of IP addresses of our staff and our clients. Our system will also allow the IP addresses of all the trusted external parties into our data Center. To enhance maximum protection of our information system, we will assign unique IP addresses to:
Mail Server Farm
Web Server Farm
Application Server Farm, and Database Server Farm.
We will also assign unique IP address to each of the computer of our staff, which will assist us to set the boundary of our Data Center. All our boundaries will be configured in the System Center 2012 Configuration Manager, and the boundary will be configured in the Configuration Manager console. We will use site assignment to find appropriate site to join and this is based on the client's current network locations. (Microsoft...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now