This website uses cookies to ensure you have the best experience. Learn more

Network Security Essay

1817 words - 8 pages

1) Construct networks using different types of network devices
Hub is one of the basic icons of networking devices which works at physical layer and hence connect networking devices physically together. Hubs are fundamentally used in networks that use twisted pair cabling to connect devices. They are designed to transmit the packets to the other appended devices without altering any of the transmitted packets received. They act as pathways to direct electrical signals to travel along. They transmit the information regardless of the fact if data packet is destined for the device connected or not.
Switches are the linkage points of an Ethernet network. Just as in hub, ...view middle of the document...

It connects two local-area networks; two physical LANs into larger logical LAN or two segments of the same LAN that use the same protocol.

Apart from building up larger networks, bridges are also used to segment larger networks into smaller portions. The bridge does so by placing itself between the two portions of two physical networks and controlling the flow of the data between them. Bridges nominate to forward the data after inspecting into the MAC address of the devices connected to every segment. The forwarding of the data is dependent on the acknowledgement of the fact that the destination address resides on some other interface. It has the capacity to block the incoming flow of data as well. Today Learning bridges have been introduced that build a list of the MAC addresses on the interface by observing the traffic on the network. This is a leap in the development field of manually recording of MAC addresses.
Routers are network layer devices and are particularly identified as Layer- 3 devices of the OSI Model. They process logical addressing information in the Network header of a packet such as IP Addresses. Router is used to create larger complex networks by complex traffic routing. It has the ability to connect dissimilar LANs on the same protocol. It also has the ability to limit the flow of broadcasts. A router primarily comprises of a hardware device or a system of the computer which has more than one network interface and routing software.

Brouters are the combination of both the bridge and routers. They take up the functionality of the both networking devices serving as a bridge when forwarding data between networks, and serving as a router when routing data to individual systems. Brouter functions as a filter that allows some data into the local network and redirects unknown data to the other network.

2) Enhance security using NAC/NAP methodologies
Network access control (NAC) products entered the market a few years ago to fill this gap. A typical NAC solution provides an endpoint assessment of the computer and then enables access and enforces security policy based on the state of the computer and the identity of the user.
One key benefit of NAP is that any anti-virus vendor that reports status via Windows Security Centre will also be capable of reporting status via NAP. Most of the anti-virus products work with NAP.
Benefits of NAP-NAC
The interoperability of NAP and NAC allows customers to preserve their investments in a NAC network or NAP desktop and server infrastructure. With this joint architecture, customers do not have to choose between NAC and NAP; they can realize the benefits of both solutions.
The features and benefits of NAP-NAC include:
Interoperability and customer choice. Customers can choose components, infrastructure, and technology that best suits their needs, while implementing a single, coordinated solution.
Investment protection. The interoperability architecture enables...

Other Papers Like Network Security

Network Security Assessment Essay

3062 words - 13 pages  Network Security Assessment Prepared for: University of Maryland University College Prepared by: David Yurchak I. Vulnerability Assessments In the same way as other associations in the monetary administrations and different segments, agent merchants (firms) are the objective of digital assaults. The recurrence and complexity of these assaults are expanding, and individual intermediary merchants and the business, in

Network Security Administration Essay

823 words - 4 pages Unit 2. Assignment 1. Disk Redundancy Research 1. What does RAID stand for? RAID (originally redundant array of inexpensive disks, now commonly redundant array of independent disks) (unknown, 2015) 2. When would we use RAID? You would use RAID when you have a lot of important data that you are constantly changing and need to back up often. 3. Define the following types of RAID. a. RAID 0 RAID 0 consists of striping, without mirroring or Lab Cnaa

608 words - 3 pages Lab – Researching Network Security Threats Objectives Part 1: Explore the SANS Website Navigate to the SANS website and identify resources. Part 2: Identify Recent Network Security Threats Identify several recent network security threats using the SANS site. Identify sites beyond SANS that provide network security threat information. Part 3: Detail a Specific Network Security Threat Select and detail a specific recent network threat


269 words - 2 pages Ruben Quinones IT245 - Introduction to Network Management Colorado Technical University Online Professor: Dr. Shawn P. Murray Phase 1 Individual Project Due January 13, 2013 Table of Contents Section 1: Target Organization - Identifying the Network 3 Section 2: Diagramming the Network - Network Architecture 4 Section 3: Network Models 5 Section 4: Network Protocols and Agents 6 Section 5: Network Security 7 Section 6: Network


874 words - 4 pages Essay Designing a Security Strategy Geo-Probe Inc. (GPI) 20 years in business, a company with constant growth and success. GPI provides construction management, engineering design, programming and environmental planning, and other A-E projects in support of a, industry, different government and commercial clients. GPI has 300 employees and ten branch office locations. GPI has many computers and network device attach to their network like any

Computer Security In Education

330 words - 2 pages Maintaining internet security is of the utmost importance to higher education systems. The majority of universities’ administrative, financial, and clinical systems are available through a campus-wide network (Rasmussen, 2011). This means that highly confidential documents, such as student’s personal information, medical records, and much more are housed on campus servers. This information is vulnerable to security threats and puts the

Week 7 Project Paper

3453 words - 14 pages American Military University All about Network Security: Network Security Means Never Giving an Adversary a Chance. Anthony Portz 4199864 ISSC340 I001 SPR 14 Professor Alidad Jalinous June 16th, 2014 11:55 PM Introduction In this paper I will discuss network security and I will give a detailed description of the area while discussing different technologies that are involved. There are many ways to provide network security and a

Conduct a Network Traffic Analysis & Baseline Definition

606 words - 3 pages tools and protocol analyzers as an information systems security professional? Protocol capture tools and protocol analyzers are important tools for an information systems security professional. These utilities can be used to troubleshoot issues on the network. They can verify adherence to corporate policies, such as whether or not clear text privacy data is being sent on the network. They can be used to test security countermeasures and firewall

Ethical Hacking

1144 words - 5 pages reports findings, does not solve problems  Security test  More than an attempt to break in; also includes analyzing company’s security policy and procedures  Tester offers solutions to secure or protect the network Hands-On Ethical Hacking and Network Defense 3  Hackers  Access computer system or network without authorization  Breaks the law; can go to prison  Crackers  Break into systems to steal or destroy data

Face Detetction

1038 words - 5 pages scalable. The Peer-to-peer network are useful only for a network with fewer computers and are suitable for applications that do not require a high level of security as * There is a lack of security * The links in the network are not reliable * The system is not centralized, making the network administration difficult. * Network security has to be applied to individual computers on the network * Lack of centralized server to

Network Design

863 words - 4 pages location information for the devices. Provide a comprehensive list of devices including the quantity of each device needed. Justification Justify your determination that the selected network devices will meet the business needs. D. Network Security Devices Business Needs Assess the business needs. Proposed Network Security Devices Select network security devices to use to secure the network. Include setup and location information for

Related Essays

Network Security Essay

1846 words - 8 pages A 5 page paper on network security with 5 references NETWORK SECURITY Let us go back, twelve years. Where's Internet? Concentrated in the cables that connect the offices and cubicles of the American ministry of defense. Things were simple, and despite the sensitive nature of the data transferred no body talked about net work security, no body knew what was to follow. Some how a revolution was triggered, the information net burst out of its

Network Security Essay

966 words - 4 pages Network Security When it comes to networking and the security of networks, there are several different methods of protecting networks. Of these differing methods, some of them sound similar, but provide differing levels of security. In the following paragraphs, I will try to explain the differences between some of the methods used. • Explain the difference between historical and statistical logging. Logging is a simple way of keeping a

Network Security Essay

586 words - 3 pages Nasario Birrueta IT 200: Milestone Three Network Security Network security is one of the most important aspects of implementing a fully functional working network, downtime caused by poor network security can cause major economic loses. The two matters that need to be addressed is the User and Physical equipment. Network security begins with the user. As such would implement a Network Use policy that the employee must sign and

Network Security And Management Essay

3952 words - 16 pages Network Security and Management Brandi Schoch CTU Online Introduction to Network Management IT245-1403A-09 Jennifer Gaddy August 11, 2014 Table of Contents Table of Contents 2 Identifying the Network 3 The Organization 3 Network Servers 3 Network Personnel 3 Diagramming the Network 5 Network Architecture 5 Speed and Distance 6 Access Method 6 Network Models 8 OSI Model 8 FCAPS Model 11 The Diagrams 13