StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Security Fundamental - Research Paper Example

Cite this document
Summary
Full Paper Title Name University Security Fundamental For securing the network of the electronic manufacturing company, the information will be transmitted on a separate network along with restricted access to servers. Likewise, the solution for aligning with these requirements is a Cisco router or a Cisco switch, Cisco Adaptive Security Appliance, Microsoft Windows 2008, Virtual Machine and Virtual LAN based on IP version 6 local addressing…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.7% of users find it useful
Security Fundamental Research Paper
Read Text Preview

Extract of sample "Security Fundamental"

Download file to see previous pages

Moreover, by utilizing IPv6 addressing scheme, brute force and other associated probe attacks can be prevented and for private IP addressing scheme, it will not be accessible from the external networks. In order to enforce a strong password policy, easy and guessable passwords must not be set. Moreover, there are certain rules that must be followed such as (Graves, n.d): The password must be kept confidential Password must be updated on periodic basis Password must be difficult to guess Passwords must be alphanumeric Maintaining password history for eliminating old password reusability Enabling Role based Access Control 256 bit encryption for passwords Enable self-password management for resetting and creating own passwords (Kim & Solomon,) one of the most tried and successful attacks for gaining password are brute force attacks, as the attacker tries different passwords until he retrieves the successful password.

Likewise, the trend of this attack has forced network security experts to enforce password policies containing all the factors mentioned above. However, a continual improvement cycle is required for a sustainable password policy management system within the organization. After discussing the password policy, authentication is also an essential component for granting access to genuine users on data and servers. As per the scenario, a triple factor authentication model will be recommended. Likewise, a combination of password and access code is required to gain access to data and networks.

Some of the examples include fingerprints or voice recognition along with password or retina scan with password. Moreover, for addressing repudiation issues, digital signatures can be used that will be provided by the third party i.e. Certificate Authority. A digital signature is simply a message that is digitally signed by the sender’s private key and can only be verified by anyone who possess or has access to the sender’s public key, therefore, proving authenticity that the sender has access to the private key (Argentina, 2009).

Similarly, the “CA certi?cates are digital certi?cates issued by one certi?cation authority (CA) for another CA. CA certi?cate identi?es the certi?cation authority (CA) that issues server and client authentication certi?cates to the servers and clients that request these certi?cates. Because it contains a public key used in digital signatures, it is also referred to as a signature certi?cate. If the CA is a root authority, the CA certi?cate may be referred to as a root certi?cate” (CA certificate.2007). Likewise, certificate Authority framework incorporates entitle management process, self-service management, Delegation of centralized rights to administrative staff, auditing, integration, reporting, scalability options and support for server and hosts.

Cost for the Plan The cost that is estimated for this security plan will be around $30000 to $40000. The detail for this estimated amount is demonstrated below: Cisco Router or Manageable Switch $20,000 to $25,000 Cisco ASA Firewall with Network and Host based Intrusion detection system $10,000 Dell Power Edge Server along with Windows Server 2008 operating system $2000 To sustain and secure data and computer networks of the electronic company, there are other factors that need to be addressed apart

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Fundamental Research Paper Example | Topics and Well Written Essays - 750 words”, n.d.)
Security Fundamental Research Paper Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1452605-security-fundamental
(Security Fundamental Research Paper Example | Topics and Well Written Essays - 750 Words)
Security Fundamental Research Paper Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1452605-security-fundamental.
“Security Fundamental Research Paper Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1452605-security-fundamental.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Fundamental Research Paper

Effects of Globalization on US National Security Strategy

US National security Strategy 15 2.... Selection Of Documents The electronic databases Academic Source Complete, Jstor, GoogleScholar, Primary Research, ERIC and History Abstracts  were searched using a combination of the following key terms: globalization, US, Middle East, security, national security, and strategy .... Moreover, articles that provided a conceptual analysis of globalization, US Middle East Relationship, US, Middle East, security, and national security....
41 Pages (10250 words) Research Paper

Wireless Technologies Research Paper

This signifies that the fundamental purpose of wireless technologies is to provide safe and reliable platform for data transference.... Wireless technologies have become a part of our routine lives.... From T.... .... remote controllers to the cellular devices, computers and laptops everything is now operated through the integrated wireless technology (Comer, 2008)....
8 Pages (2000 words) Research Paper

Microsoft Word Research Paper:

Network security was identified as the mechanism for the protection of computer networks from different sorts of threats.... Some core issues… Those issues included the risks and negative aspects associated with the mechanisms of authentication, access types, and authorization. Network security is the mechanism for the protection of computer networks from different RESEARCH goes here] [Your goes here] [Your college In this paper, the issue of network security was discussed toknow its importance, as well as some main threats associated to networks....
1 Pages (250 words) Research Paper

A Survey of Advances in Biometric Security

The primary purpose this particular research paper is to determine a thorough survey about the advancement of biometric solutions as security measures in numerous sectors over the years.... An insight is also drawn about the current trend and the historical context of security approaches.... … This research paper intends to provide a comprehensive understanding about the aspect of biometric security solutions along with an evaluation of its performance efficacy in the present day context....
10 Pages (2500 words) Research Paper

Cryptography as One Fundamental Way of Saving Communications: Information and Data Security Technology

In this research, I will present a comprehensive overview of the main security and privacy aspects those we need to assess during the implementation of any security policy.... Fundamentally asymmetric encryption is as high-quality as its useful utilization; this is described through the technique in which the data is converted and for security reasons....
18 Pages (4500 words) Research Paper

Firewalls: Great Network Security Devices

Some of the fundamental reasons are outlined below (Ingham & Forrest, 2005; Rhodes-Ousley, Bragg, & Strassberg, 2003; Turban, Leidner, McLean, & Wetherbe, 2005):Operating systems keep huge records of the less protected configuration of system working and operations.... This research paper "Firewalls: Great Network security Devices" presents an overview of the firewall security solution.... Without a doubt, the application of a network firewall ensures enhanced security however there are also a number of issues that make firewalls a complex security management arrangement....
9 Pages (2250 words) Research Paper

Effectiveness of Security Technology in Reducing Security Threats

The paper "Effectiveness of Security Technology in Reducing Security Threats" was undertaken with a view to addressing the fundamental issue of security threats.... Security issues have become very fundamental to deal with in the modern day organization particularly propelled.... Chapter two reviews the available literature on security issues.... security threats vary in both characteristics and magnitudes.... One of the types of security threats faced by individuals is unlawful acts perpetrated by other individuals....
10 Pages (2500 words) Research Paper

Security Issues for Cloud Computing Systems

This research paper "security Issues for Cloud Computing Systems" is aimed at presenting a detailed analysis of security issues in the cloud computing environment.... On the other hand, every business has severe concerns related to its data security and privacy....
15 Pages (3750 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us