Networking Security and administration

College
Essay
Technology
Pages 6 (1506 words)
Download 0
Integrating the other company's existing network infrastructure into my organization's one requires number of network and security issues. Integrating the security infrastructure of two organizations involves a number of complex policy administration, engineering, implementation, and managerial tasks…

Introduction


Network Equipment -- List of all current network equipment such as routers, switches, encryptors, their current operating system (if any) and version number, their current IP addresses, their physical location, and their logical (network) location.
Connection between my organization's network and other organization's is provided using the Internet as the medium. The danger in doing this is that there is no privacy on this channel, and it's difficult to provide the other office access to internal resources without providing those resources to everyone on the Internet.
To prevent this bottleneck in security I plan to use VPN. VPNs provide the ability for two offices to communicate with each other in such a way that it looks like they're directly connected over a private leased line. The session between them, although going over the Internet, is private because the link is encrypted. Also the link is convenient, because each can see each other's internal resources without showing them off to the entire world.
A number of firewall vendors are including the ability to build VPNs in their offerings, either directly with their base product, or as an add-on. If you have needed to connect several offices together, this might very well be the best way to do it.
Network performance is common problem of growth for corporations. ...
Download paper
Not exactly what you need?

Related papers

Networking Security and administration
Network Equipment - List of all current network equipment such as routers, switches, encryptors, their current operating system (if any) and version number, their current IP addresses, their physical location, and their logical (network) location.…
Computing networking
This will save extra cost and will save ports that will not be used. The 2 switches will then be connected to the central hub/switch, interconnecting the different offices of the company.…
Networking Security Engineering
To avoid this micro content management system can be designed to extract the maximum potential from the content and at the same time the data stored as XML within a native XML must searchable using Xpath. This gives to execute Xpath via a URL from within user's browser.…
Social Networking Sites
The social networking websites are online based or web based services which link various individuals from across the global and it allows them to create their own profile, blog, articulate and helps to communicate with different people across the world. Hence the study identifies seven important factors which influences to the motives behind the use of social networking sites. And also it takes…
Networking Assignment
What this means for attackers is that once they penetrate a single machine on a network they can then observe all traffic passing through the network. This allows intruders to quickly collect passwords and account names for many users. And all too often a password good one place is good another. In order to save from this vulnerability, you have to save a copy of Kernel offline because the advance…
Wireless networking
Networking can be of different types like; Local Area Networking (LAN), Wireless Local Area Networking (WLAN), Wide Area Networking (WAN), Metropolitan Area Networking (MAN) etc. LAN and WAN are the popular networking methods. Wireless Local Area Networking (WLAN) is mostly used networking of computers assembled around a small area. It is widely used in home computer networking connections. This…
Data and Network Security
As far as the location of the company's office is concerned, 'enterprise Training solutions' offices are located in 4 adjacent rooms situated on the ground floor of a 4 storied building. In addition, the company also maintains a single office room in the first floor of the building. Under the existing situation, anyone is allowed access up to the reception area through a shared entrance. This…