Networking Security and administration - Essay Example

Only on StudentShare

Extract of sample
Networking Security and administration

Network Equipment -- List of all current network equipment such as routers, switches, encryptors, their current operating system (if any) and version number, their current IP addresses, their physical location, and their logical (network) location.
Connection between my organization's network and other organization's is provided using the Internet as the medium. The danger in doing this is that there is no privacy on this channel, and it's difficult to provide the other office access to internal resources without providing those resources to everyone on the Internet.
To prevent this bottleneck in security I plan to use VPN. VPNs provide the ability for two offices to communicate with each other in such a way that it looks like they're directly connected over a private leased line. The session between them, although going over the Internet, is private because the link is encrypted. Also the link is convenient, because each can see each other's internal resources without showing them off to the entire world.
A number of firewall vendors are including the ability to build VPNs in their offerings, either directly with their base product, or as an add-on. If you have needed to connect several offices together, this might very well be the best way to do it.
Network performance is common problem of growth for corporations. ...Show more

Summary

Integrating the other company's existing network infrastructure into my organization's one requires number of network and security issues. Integrating the security infrastructure of two organizations involves a number of complex policy administration, engineering, implementation, and managerial tasks…
Author : linwood27
Networking Security and administration essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Networking Security and administration"
with a personal 20% discount.
Grab the best paper

Related Essays

NETWORK ADMINISTRATION AND SECURITY
UNIX invented in 1969, by the computer scientists Dennis Ritchie and Kenneth Thompson employed at AT&T bell labs. Operating systems are compared by their functionality and performance. UNIX has contributed immensely in recent years. UNIX communication capabilities has also contributed in High performance computing sector as a company named Computer Associated International implemented a powerful system “Advantage Gen (release 6.5)”on UNIX platform to speed up the development of J2EE applications and web services (Ohio Supercomputing Center to Deploy Hp Linux Supercomputer.
7 pages (1750 words) Essay
Security Administration and Management
In all, Porters generic strategy and the core competences help explain Securitas success as compared to its competitors. These methods of analysis are useful but do not provide the complete story. Furthermore, neither approach can predict short or long term success However;
14 pages (3500 words) Essay
The Transportation Security Administration
In the United States, this responsibility has been delegated to the Transport Security Administration (TSA). Presently, the TSA consists of about 50,000 security officers, directors, air marshals, inspectors, and managers. Their basic purpose is to protect the transportation systems of the nation and ensure that these systems are used safely.
15 pages (3750 words) Essay
Network Administration
Basically you should be able to look at the 2 at the end, and it should look different - and so should the wording!! A company called StudentMobiles.com requires a network solution. The following scenario has been provided to give details about the required solution.
37 pages (9250 words) Essay
Networking Security Engineering
The unwanted intruders can deface the site to damage the company's reputation, denial of service to authorised service users that result in loss of business and the theft of private information pushes the company into legal turmoil. If the Web server root directory was same as the ftp server root directory and if one was able to upload a PHP script to a world-writeable ftp directory then the PHP script can execute UNIX commands and creates a shell server bound to high port which will open.
11 pages (2750 words) Essay
Networking Infrastructure
There are eight campuses spanning in three countries. i) Every layer of the network needs a mechanism for identifying senders and receivers. Since there is an involvement of multiple destinations, some form of addressing is needed in order to specify a specific destination.
15 pages (3750 words) Essay
Computer Networking Management
These device mappers are arranged in a hierarchical structure to show a family or functional relationship between the devices. Functions that will be executed by given devices are expressed as multiple executable program components. In reality, each organization is different and different computer networks must be developed to fit any particular organization and its structure.
22 pages (5500 words) Essay
Networking and Security: Firewalls
Because traffic is limited software firewall can perform well with a computer of good specifications; however in a medium size organization or an enterprise these dimensions are quite
1 pages (250 words) Essay
Transport Security Administration (TSA)
The September attack of 2001 will always be a reminder to the American people, government and defense force of the need to be alert of any terrorism activities within its land. Whether it’s domestic or external
10 pages (2500 words) Essay
Effectiveness Of Transport Security Administration
In the latest attack on a Russian plane, security officials suspected a bomb to be the cause. The publics’ concern is how the bomb passed undetected through all the screening procedures. Another concern raised by the public over TSA screening process is that it neglects possible threats from outside the airport perimeters.
4 pages (1000 words) Essay
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT