Network Security Administrator, Approach Problem Securing A Case Study

PAGES
2
WORDS
672
Cite

¶ … Network Security Administrator, Approach Problem Securing a Central I would utilize a number of security measures to adequately secure a central computer network that is accessed by other branches and staff from remote physical location. The vast majority tends to work in conjunction with one another, and should not deny access to authorized users.

For all of the computers that are present in the primary, physical location in which the network is based out of, I would employ encryption measures. This sort of encryption is similar to that used by cellular devices (whether in the form of tablets or phones), which enables users to reduce the threat of unauthorized users from accessing their devices or the data within them (Stafford, 2010). However, it is worth noting that encryption would not be used on the computing devices in the network that are outside of this primary physical location.

One of the primary layers of defense that I would provide for the network as well would come in the form...

...

The ultimate boon of these routers is that they are able to engage in packet inspection (Merkow and Breithaupt, 2006, p. 269). Packet inspection is a fundamental component of security, because it enables the analysis of packets of incoming data -- some of which may be potentially threatening -- and generally examines both its contents and its header. The sort of packet inspection conducted by routers would operate as a good entry level defense for the entire network.
However, as anyone familiar with the conventional packet inspection is aware of, it is fairly brief and does not provide substantial inspection against sleeper cells and other forms of data that can present noxious results to a computer network after a significant amount of time. In fact, most point solutions that are accessible via conventional security appliances only retain data for a matter of…

Sources Used in Documents:

References

Merkow, M.S., Breithaupt, J. (2006). Information Security: Principles and Practices. Upper Saddle River: Pearson Prentice Hall.

Stafford, M. (2010). "Hackers crack cell phone encryption." Tech News Daily. Retrieved from http://www.technewsdaily.com/70-hackers-crack-cell-phone-encryption.html

Williams, P. "The Apache Software Foundation and its influence on data management." www.dataversity.com. Retrieved from http://www.dataversity.net/the-apache-software-foundation-and-its-influence-on-data-management/


Cite this Document:

"Network Security Administrator Approach Problem Securing A" (2013, June 03) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/network-security-administrator-approach-91438

"Network Security Administrator Approach Problem Securing A" 03 June 2013. Web.26 April. 2024. <
https://www.paperdue.com/essay/network-security-administrator-approach-91438>

"Network Security Administrator Approach Problem Securing A", 03 June 2013, Accessed.26 April. 2024,
https://www.paperdue.com/essay/network-security-administrator-approach-91438

Related Documents
Network Security
PAGES 25 WORDS 9364

networking and TCP/IP and internetworking. Also discussed are risk management, network threats, firewalls, and also more special purpose network devices. The paper will provide a better insight on the general aspects of security and also get a better understanding of how to be able to reduce and manage risk personally at the workplace and at home. In today's world, the Computer has become a common feature in any organization anywhere

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

The most appropriate products that could be used by MMC to achieve this objective would be: IP San and a Snap Lock. An IP San is a fiber optic channel that can provide secure real time data to each location. Where, software and security applications can be adapted to the current system that is being used. The Snap Lock is: a security software that can be used to provide

ERP and Information Security
PAGES 26 WORDS 8373

ERP and Information Security Introduction to ERP Even though the plans of information security include the prevention of outsiders to gain access of internal network still the risk from the outsiders still exists. The outsiders can also represent themselves as authorized users in order to cause damage to the transactions of the business systems. Therefore, strict prevention measures should be taken to avoid such situations. The threats of both the hackers have been

After server authorization four domains for giving and registration of addresses of clients are created. "If a physical LAN has more than one logical subnet, how can different groups of clients be allocated addresses on different subnets? One way to do this is to preconfigure each client with information about what group it belongs to. A DHCP feature designed for this is the user class option. To do this, the

In this manner, it makes network management and filtering a lot easier. Even though SPF can protect the network infrastructure against certain attacks that are known to exploit the weaknesses that are inherent in the various network level protocols, it can never provide protection at application level. The application defense needs more awareness of the content of the payload. Circuit Proxy Firewall (CPF) This type of firewall operates by relying as