Monday, May 6, 2019
Network Security Essay Example | Topics and Well Written Essays - 1000 words
Network Security - Essay Example(Petersen and Davie, 2012 C?etinkaya et al, 2010) 2. 0 Overview of Network Fundamentals, Security Threats, and Issues The simplest form of a computer network is a pair of computers connected with each other by the means of an Ethernet cable, Bluetooth, etc. However, we generally see complex networks involving several. The basic ironware requirements to develop a computer network involve network adapters, network hubs and switches, routers and accession points, modems, and network cables. new(a) corporate networks use wireless router and access points, which accommodate both wired Ethernet connectivity for desktop PCs and wireless connections for active devices and notebook computers. (Petersen and Davie, 2012) Regarding security threats and issues, we must understand that recently the hackers are aiming corporate tuition, media centers, and other kinds of different information security systems. CEOs and CIOs at organizations are facing unforeseen challenges like email bombardment, spamming, denial of aid, and distributed denial of service attacks. Moreover, protection of the systems and networks from spyware, malware, viruses, etc. is an imperative particularly when they are connected to a public inter-network. (Andress, 2011, C?etinkaya et al, 2010) 3. ... The firewall sets up a kind of filter when the internal network of the company is connected to a public network. (Zwicky et al, 2000) VPN is the abridgment of Virtual Private Network. It is a kind of private data network which makes use of the public telecom infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures (VPNC, 2008). It operates independently of the public network (e.g. Internet) and has customized access control and dedicated network operating system at the server side. 3.2 Recommendations for Firewalls and VPNs A firewall must fleck Internet security and support filtering the diverse websites, programs and appli cations run on the Web, and scrutinize threats during surfing. It should also accept/ forswear the Remote Desktop Protocol (RDP) client requests and control the Remote Assistance Services (RAS). Also, Mueller (2011, p. 7-130) has stated that Users introduce third party firewalls and virus protection products in many cases, so youll also need to exact these third party products as part of an overall application strategy. According to the experts at VPN Consortium, the major precept of a VPN is to provide the company with the similar facilities as privately held leased lines can provide. Additionally, technologists are endeavor to keep VPN technology cheaper and simpler without making considerable usage of public infrastructure through sharing or cloud computing. Telephone companies have commercially offered privately shared network resources through technology serve like VoIP, mail servers, database integration, etc. throughout the last decade. However, a VPN makes it feasible t o have
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment