logo

A Report on Network Security and Access Control TopICS

   

Added on  2022-10-19

17 Pages3732 Words467 Views
 | 
 | 
 | 
Running head: ICT301 ADVANCED NETWORK TOPICS
ICT301 ADVANCED NETWORK TOPICS
Name of the Student
Name of the University
Author Note:
A Report on Network Security and Access Control TopICS_1

ICT301 ADVANCED NETWORK TOPICS1
Table of Contents
Project Background.............................................................................................................2
Network security..................................................................................................................3
Access control and authentication.......................................................................................4
Business Continuity.............................................................................................................6
Risk management.................................................................................................................7
Conclusion.........................................................................................................................10
Recommendation...............................................................................................................11
References..........................................................................................................................13
A Report on Network Security and Access Control TopICS_2

ICT301 ADVANCED NETWORK TOPICS2
Project Background
The following report is all about Fencing limited, which is a small organization based in
Wollongong, NSW. The employee strength of this organization is found to be 250 people. The
main business of this organization is all about selling various fencing materials for the
construction sites, mining and lastly manufacturing industry (Sivaraman et al. 2015). The
organization is found to be nimble which can easily move new market if there are certain number
of opportunities. Fencing limited can easily manage their inventory and allow certain customers
to buy product from the website.
Scope
To improve the network capabilities and certain initiatives for optimizing the IT
capability.
To align with the business needs which will help this organization to understand digital
transformation and providing business value.
Project Goal
The mere focus of this project is all about securing the network in the upcoming days. It
is all about keeping the whole organization information much secure (Pawar and Anuradha
2015). Most of the employees of this organization analyze that their present system is adequate
for their use. But the help of faster and agile secure network will help in facilitating business.
A Report on Network Security and Access Control TopICS_3

ICT301 ADVANCED NETWORK TOPICS3
Strategic alignment of Project
It will help the employee to go beyond their sales target which is the main target of
fencing limited management. The project is all about building a secure system which will
comply with the new regulation. The project comes up with high level of organizational interest
of Fencing limited in this project.
In the coming pages of the report, an idea has been provided with respect to the network
security of this organization. The next section deals with access control and authentication of this
new system. An overview has been given with respect to business continuity and risk
management for this project. The last part of the report deals with list of recommendation.
Network security
A firewall can be used for protecting the network so that all the client and organization
information is safe. Firewall is just like a filter in between two that is system and network. There
are large number of ways by which firewall can be used for filtering out information (Acemoglu,
Malekian and Ozdaglar 2016). The methods work aim to work at various layer of the network.
Some of the basic function of a firewall is discussed below like
Packet filtering: All the basic firewall software makes use of earlier-defined security
rules which is needed for creating filters. If the incoming packet data containing information is
anyhow flagged by this filter, then it is not completely allowed through it (Duffield 2017).
Packets which passes through the filter are send to the system and all other packets are
completely discarded.
A Report on Network Security and Access Control TopICS_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Securing System Using IP Table Firewall
|9
|931
|74

ANALYSIS OF NETWORK PROJECT 14 14 ANALYSIS OF NETWORK PROJECT Name of Student Name of University
|17
|3455
|278

Fundamentals of Network Security
|15
|3414
|41

Desklib - Online Library for Study Material with Solved Assignments, Essays, Dissertations
|20
|3651
|133

Network Security Project - Security Technology Controls and Strategies
|9
|797
|371

Next Generation Firewall and IT Security
|9
|1504
|68