Network Security
This report is the answer to a scenario that was provided as the basis for this assignment. The idea is that a security firm has been awarded a contract for a local government agency. As part of that contract, the author is being asked to provide a number of deliverables. These would include an information flow diagram, an equipment list that would be required so as to make up the network security infrastructure, a maintenance plan to keep the network running and operating in optimal fashion, a list of at least four security measures that could be developed, two physical security vendors that could be used and how human resources could and should figure into all of the above. While there are multiple ways to undergo a network security system plan, there are some options and paths that are more required than others.
Analysis
The network information flow diagram that was asked for as part of this assignment is shown in the appendix. Something that should be clear from that diagram is that there is not just a single barrier, software for physical, when it comes to the network. In terms of the network, there are actually three zones. There is the exterior zone and there is the most secure zone. In between, there is a middle zone. The need for the middle zone comes from the fact that just because some devices are allowed past the external firewall does not mean that they should get full access to anything and everything that is beyond that first firewall. For users that are outside of the network that have permission to access the intranet, they will have the credentials to get through the external and internal firewalls. The virtual private network (VPN) that is nestled in between the two firewalls is just one way for external users to get through. For example, if a worker is at a hotel and is connected to the internet, they can access the intranet and the rest of the internal network by accessing the VPN. Conversely, users that are behind both firewalls are able to use the internet, cloud services and so forth so long as they stay within the network security policies. For example, an authorized computer would be given access to the services and information to which they are entitled per the network and user setup. Unauthorized computers, on the other hand, are restricted or blocked from accessing anything important. In short, the information flows back and forth across the length of the network based on what information is allowed to be accessed, what services are allowed to be accessed and so forth. The proper configuration and arrangement of these services,...
References
Brown, M. (2012). Who makes the best 802.11ac router? We review the only 5 models available today. PCWorld. Retrieved 25 November 2017, from https://www.pcworld.com/article/262148/who_makes_the_best_802_11ac_router_we_review_the_only_5_models_available_today.html
Concept Draw. (2017). Network Security Devices. http://www.conceptdraw.com. Retrieved 25 November 2017, from http://www.conceptdraw.com/How-To-Guide/network-security-devices
Gov.UK. (2017). [Withdrawn] Browser Security Guidance: Google Chrome - GOV.UK. Gov.uk. Retrieved 25 November 2017, from https://www.gov.uk/government/publications/browser-security-guidance-google-chrome/browser-security-guidance-google-chrome
ITCS. (2017). Cisco ASA vs WatchGuard XTM | IT Central Station. Itcentralstation.com. Retrieved 25 November 2017, from https://www.itcentralstation.com/products/ comparisons/cisco-asa_vs_watchguard-xtm
Mays, J. (2017). Update and Patch OpenSSL for Heartbleed Vulnerability | Liquid Web Knowledge Base. Liquid Web Knowledge Base. Retrieved 25 November 2017, from https://www.liquidweb.com/kb/update-and-patch-openssl-for-heartbleed-vulnerability/
Shinder, D. (2017). 10 physical security measures every organization should take. TechRepublic. Retrieved 25 November 2017, from https://www.techrepublic.com/blog/10-things/10-physical-security-measures-every-organization-should-take/
Zielinski, D. (2014). Integrating HR Systems Can Deliver Rich Rewards. SHRM. Retrieved 25 November 2017, from https://www.shrm.org/hr-today/news/hr-magazine/pages/0514-hr-systems-integration.aspx
networking and TCP/IP and internetworking. Also discussed are risk management, network threats, firewalls, and also more special purpose network devices. The paper will provide a better insight on the general aspects of security and also get a better understanding of how to be able to reduce and manage risk personally at the workplace and at home. In today's world, the Computer has become a common feature in any organization anywhere
Network Design Network ABC NETWORK DESIGN A Comprehensive Proposal and Design for ABC Inc. Network Requirements Network Proposal Overview Telecommunication Overview Telecommunication Proposal Network Configuration Management Plan In order to meet the needs of the customers, ABC Inc. must insure that productivity is not hindered by the growth of the company. The employees at ABC Inc. must have a robust network so that customer service is not jeopardized. The accounting firm has grown from five to fifty employees
The behavior of both botnets and worms in peer-to-peer networks have been empirically examined and models or simulations of their behavior have been attempted, and the manner in which different nodes in peer-to-peer networks develop in and of themselves and in terms of their relationships with other nodes -- the very architecture of the network itself, in other words, which is necessarily dynamic in a peer-to-peer network -- makes
Network Security Systems for Accounting Firm Vulnerabilities Assessment In the contemporary IT environment, the implementation of the IT tools has become an effective strategy that organizations employ to achieve competitive market advantages. In other words, the IT tools have become an effective strategy that organizations can employ to be ahead of competitors, and be first in the market. One of the crucial features of the information systems is the network connectivity that
Network Implementation for Davis Networks Inc. In the proposal, effort is made to develop an affordable local LAN for Davis Networks Inc. The effort involves provision of wireless Internet connection to all individuals for their desktops and laptops from the current high speed connection they have at an affordable price (800 USD -- 1000 USD). Provision of the internet to the same location costs approximately 700 USD including all other expenses
Web conferencing systems have been faced with resistance to change by those responsible for knowledge transfer and knowledge management, as these systems are seen as a threat to the more costly and time-consuming approaches to sharing knowledge. It has been seen that employees will resist using Web Ex-systems as they are afraid it makes the transfer of their knowledge too easy, and therefore is a risk to their status
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now