logo

Network Security Implementation

   

Added on  2022-10-09

20 Pages3861 Words478 Views
 | 
 | 
 | 
Running head: NETWORK SECURITY IMPLEMENTATION
Network Security Implementation
Name of the Student
Name of the University
Author Note
Network Security Implementation_1

1
NETWORK SECURITY IMPLEMENTATION
Table of Contents
Introduction................................................................................................................................2
Discussion..................................................................................................................................2
Network Infrastructure:..........................................................................................................2
Network Security Needs:.......................................................................................................4
Network Security Threats:.....................................................................................................5
Hardware Implementation:.........................................................................................................6
Security Topology Design:....................................................................................................7
Configuration of firewall and Router.........................................................................................8
Test Conducted and Outcomes.................................................................................................10
Testing Tools............................................................................................................................11
Software to analyze logs..........................................................................................................14
Weakness of installed perimeter design...................................................................................14
Conclusion................................................................................................................................15
Bibliography:............................................................................................................................17
Network Security Implementation_2

2
NETWORK SECURITY IMPLEMENTATION
Introduction
Network security is a vast topic that comprises of technologies, processes and devices.
It consists of policies and practices that are used to protect the privacy, resources and
network-accessible resources. Network Infrastructure comprises of foundational hardware
used for networking, software resources, services and facilities. Networking software consists
of software abstractions and enables network administrators to manage dynamic networks
more easily. Network Service is an application at the network layer and above for data
storage, communication, manipulation used by implementing client server (Hyde et al. 2014).
Remote Network Access allows individual servers to connect to a private/enterprise network
from a remote location connected to the internet. The network security perimeter consists of
an enterprise and is interconnected. This infrastructure is used for internal/external
communications.
Network Security Implementation_3

3
NETWORK SECURITY IMPLEMENTATION
Discussion
Network Infrastructure:
Network Infrastructure includes the resources hardware and software used to enable
network operations provided by network services that is a category in Information
Technology. This allows devices like routers, hubs, switches to connect, communicate and
form a network (Loch, Carr and Warkentin 2013). The network security perimeter consists of
an enterprise and is interconnected. This Network infrastructure includes the following:
Networking
Hardware:
Networking
Software:
Network Services: Remote Network
Access:
1. Router
Cisco 2811
Network
Operations and
Management
DNS (Domain Name
System) Network Access
Control
2. ASA 5505
(Internet
Network Security Implementation_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
VPN Security and Implementation
|10
|1797
|334

Computer Systems Technician– Final Project COMP1301
|11
|1577
|34

Network Addressing and Security - Desklib
|5
|1385
|497

ICTNWK509 Design and Implement a Security Perimeter for ICT Networks | Assessment Task
|12
|877
|15

OZ Dispatch Network: A Presentation
|10
|523
|207

Network Design for Indian University
|8
|1051
|13