logo

Role of Virtual Networks in Hardware Networking Functions PowerPoint Presentation 2022

   

Added on  2022-10-01

16 Pages770 Words20 Views
ROLE OF VIRTUAL NETWORKS IN
HARDWARE NETWORKING
FUNCTIONS
(SECURITY BREACHES AND COUNTER MEASURES)
Role of Virtual Networks in Hardware Networking Functions PowerPoint Presentation 2022_1
Abstract
Introduction
Due to constant change in technology it has contributed to the immense use of
virtual networking
Virtual networking helps two or more virtual machines to communicate together
and share computer resources
It works like the traditionally networked computers but through the use of VMs
Machines
VM machines enables the computers to be connected together on a virtual
environment. This means that you cannot be able to see the physical connection
between connected devices
Role of Virtual Networks in Hardware Networking Functions PowerPoint Presentation 2022_2
Literature Review
The research studies were done considering the peered reviewed journals written
by different authors
Documentaries were reviewed before the actual start of the project
Books of references were referred to analyze all the system requirements
Feasibility studies were carried out to get a hint about the new project research
Role of Virtual Networks in Hardware Networking Functions PowerPoint Presentation 2022_3
Aims and Objectives
The main aim why this project was carried out was to define how the virtual
machine works to connect and allow communication on network computers
To identify the possible risks in terms of security of connecting devices by use of
virtual machines
To come up with solution on how we can protect devices connected together over
virtual network connection
To identify the vulnerability capabilities between various networking devices
To identify the breaches which hackers may be using to sniff packets from the
virtual network
Role of Virtual Networks in Hardware Networking Functions PowerPoint Presentation 2022_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
System Security Investigation for Virtual Machine Image File
|27
|4008
|26

Designing a Secure Virtual Private Network for Campus Environment
|25
|6319
|163

Computer Systems Architecture
|15
|4443
|2

Computer Systems Architecture
|13
|3589
|80

Project: Design Virtual Private Network Within Campus Environment
|25
|6320
|602

Networking Project: Introduction to Kali Linux and Sophos UTM
|26
|797
|128