Wednesday, November 20, 2019

Network Security Essay Example | Topics and Well Written Essays - 1000 words

Network Security - Essay Example (Petersen and Davie, 2012; C?etinkaya et al, 2010) 2. 0 Overview of Network Fundamentals, Security Threats, and Issues The simplest form of a computer network is a pair of computers connected with each other by the means of an Ethernet cable, Bluetooth, etc. However, we generally see complex networks involving several. The basic hardware requirements to develop a computer network involve network adapters, network hubs and switches, routers and access points, modems, and network cables. Modern corporate networks use wireless router and access points, which accommodate both wired Ethernet connectivity for desktop PCs and wireless connections for mobile devices and notebook computers. (Petersen and Davie, 2012) Regarding security threats and issues, we must understand that recently the hackers are aiming corporate information, media centers, and other kinds of different information security systems. CEOs and CIOs at organizations are facing unforeseen challenges like email bombardment, spamming, denial of service, and distributed denial of service attacks. Moreover, protection of the systems and networks from spyware, malware, viruses, etc. is an imperative particularly when they are connected to a public inter-network. (Andress, 2011, C?etinkaya et al, 2010) 3. ... The firewall sets up a kind of filter when the internal network of the company is connected to a public network. (Zwicky et al, 2000) VPN is the abbreviation of Virtual Private Network. It is a kind of private data network which â€Å"makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures† (VPNC, 2008). It operates independently of the public network (e.g. Internet) and has customized access control and dedicated network operating system at the server side. 3.2 Recommendations for Firewalls and VPNs A firewall must spotlight Internet security and support filtering the diverse websites, programs and applications run on the Web, and scrutinize threats during surfing. It should also accept/reject the Remote Desktop Protocol (RDP) client requests and control the Remote Assistance Services (RAS). Also, Mueller (2011, p. 7-130) has stated that â€Å"Users install third party firewalls and virus p rotection products in many cases, so you’ll also need to consider these third party products as part of an overall application strategy.† According to the experts at VPN Consortium, the major rationale of a VPN is to provide the company with the similar facilities as privately held leased lines can provide. Additionally, technologists are striving to keep VPN technology cheaper and simpler without making considerable usage of public infrastructure through sharing or cloud computing. Telephone companies have commercially offered privately shared network resources through technology services like VoIP, mail servers, database integration, etc. throughout the last decade. However, a VPN makes it feasible to have

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.