Tuesday, March 17, 2020

buy custom Cryptography and Network Security essay

buy custom Cryptography and Network Security essay This is a way to address the protection of data networking devices, connections, and the contents and the ability to accomplish the communication functions. Having an effective network security will ensure that the company is safe from malicious intruders, who want to gain access to their vital information. By using a WAN network Cleveland, the office should put in place security measures which will ensure that its information is not accessed by unauthorized people. The office should therefore develop security policies that will ensure that the information and networks are prevented from any illegal access. These policies would include the use of passwords, acceptable use and identity of the people using their network. This will ensure that only trusted personnel can access the network, assured that they cannot compromise the network (Kahate, 2003). There are various ways through which the office can be able to ensure that the network is safe from being accessed by malicious people: Use of firewalls This is computer software which protects the system by blocking all unnecessary ports and only allows traffic to flow from known ports, and in the right direction. This is important software, which should be used in any organization committed to protect its network from being accessed by ntruders, and gaining access to the companys information. Switch The switch should be configured in such a way that it only allows specific format of packets to flow in and out of it. Routers Its main purpose is to provide packet routing can be configured in a special way. This way, it can be used as a defense for protecting the network from the unauthorized access. This configuration will make the router to block or filter the forwarding of packet types Use of strong antivirus The Antivirus software detects viruses and ensures that they do not invade the computer or the server. The antivirus should be kept up-to-date as expired antivirus is not able to detect newer versions of viruses. The office should be able to evaluate the best antivirus to use as there are many antivirus soft wares available, and some maybe not effectively protect the computer. Use of wildcard mask This shows which part in the IP address that a particular user should access. They indicate which IP addresses has been accessed. The office should ensure that the IP addresses they allow or permit are from trusted sites which might not compromise the network. Access control list This is a table that instructs the operating system as to which access right every user has in a particular system object like the file directory. This filtering of traffic will be helpful in protecting the network as it will ensure that the required personnel are the ones accessing the network. This should be configured for the entire routed network. If Cleveland office will be able to put all the above measures to their network, they will be able to reduce the chances of their network from being compromised by any unauthorized persons. The office should also have a network administrator who is competent enough to monitor the network. This will make it possible to know when the network has been compromised and necessary measures taken as soon as possible to reduce the chances of the network being compromised any further. The protection devices and software which are going to be put in place should be working properly. Any malfunction of any of the devices and software used for protection purposes will lead to the network being compromised. The office should ensure that the devices and software are in a working condition as they might be put into place and yet they are not functioning leading to the illusion that the network is protected and in the real sense it is not. Buy custom Cryptography and Network Security essay

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.