, Download 1
...Network Security Tools 13 4 Conclusion 17 1 Abstract By utilizing quantitative and qualitative research methods, we will analyze different aspects of organization wide information security. As network vulnerabilities are constantly at a rise, network security vulnerabilities are evaluated in three categories i.e. logical security, internal security and external security. The logical security domain will cover technical controls such as deployment of IDS, Virtual LAN, monitoring violation logs, auditing on domain environment, ISA server and VPN security as well. Secondly, internal and physical... ? Full Paper Table of Contents Table of Contents 2 3 2 Research Methodology and Literature Review 3 3 Network...