Assignment on Securing Enterprise Infrastructure

   

Added on  2022-08-26

6 Pages1354 Words16 Views
IT 0
Securing Enterprise
Infrastructure
Assignment on Securing Enterprise Infrastructure_1
IT 1
Securing enterprise infrastructure
In this modern era, the uses of computing devices are growing quickly
that helps to perform business operations and store larger datasets.
Microsoft Windows computers are very useful for the business communities
that are capable to perform multiple operations effectively and provide
communication-related services to the employees (Bhanot, & Hans, 2015).
Security is a major concern associated with the computing devices and
networks where the hackers attack on the computer servers and perform
data breach and threat-related activities. The intention of this essay is to
enhance the security of computer networks and devices and highlight
principles of the CIA used to protect data against criminals. This essay will
include major three sections such as techniques used to secure windows
networks, communication systems used for connecting two or more devices
and principles of the CIA.
The uses of Windows computers are increasing day by day and many
business communities include such systems for performing business
operations. It is significant to focus on security concerns as the involvement
of third parties and unauthorized systems in computers can lead to cyber-
crimes and threats by which users can lose sensitive information. In this
modern era, companies use numerous kinds of techniques and methods for
securing computer devices and networks which will be discussed in this
chapter. Kerschbaum, & Schröpfer, (2014) reported that securing windows
networks and devices help to manage the privacy of financial data and
address malware signals transmitted by the criminals. Most of the
companies use a firewall and antivirus related tools in the computer
networks that provide a way to detect unwanted or fraud signals and
viruses transmitted by the hackers and protect data from malicious
programs.
Assignment on Securing Enterprise Infrastructure_2
IT 2
Business corporations also provide training to the users and aware of
cyber-crimes by which they protect data and windows networks from
hackers. Moreover, IT members help to maintain the integrity of windows
networks and servers used by the companies and control traffic signals
transferred by the criminals using firewall-based routers and tools. Li, Liu,
Dai, & Luan, (2015) highlighted that companies include SIP and H.323
security tools in the windows networks that are capable to handle the fraud
and spam signals transmitted by the attackers and reduce the rate of cyber-
crimes easily. Therefore, all these are major techniques and approaches
utilized by the companies to protect data and secure windows networks
from the criminals.
It is determined that two or more computing devices can be
connected with each other using connection networks which are divided
into two parts including wired networks and wireless networks. The wired
networks help to connect numerous computers using wired cables and
provide a way to perform data communication effectively. On the opposite
side, wireless networks are advanced that connect computer devices using
wireless connections (Manku, & Vasanth, 2015).
There are various wired networks and cables that can be utilized for
connecting computers including UTP, STP, coaxial and fiber optic. In which
coaxial and fiber optic both are effective communication cables that can be
used for transferring data from one device to another device. Moreover,
wireless networks like WLAN, WMAN, WPAN, and others can be utilized
that helps to connect computer devices together without requiring wired
cables and connections. Therefore, it is highlighted that all these are major
connection networks that may be utilized for connecting computing devices
with each other.
CIA principles focus on the security of data that contains three factors
including confidentiality, integrity, and availability. Depending upon the
Assignment on Securing Enterprise Infrastructure_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Comparison of Twisted Pair Cable vs Coaxial Cable vs Fiber Optic Cable
|5
|1018
|195

Wired and Wireless Networking
|6
|675
|175

Distinct Differences Between Wired and Wireless Technology Essay 2022
|3
|667
|45

Optical Fiber Communications Case Study 2022
|13
|2520
|27

Network and Cabling: Understanding Coaxial Cable, Twisted Pair Cable, Fiber Optic, Wireless and Synchronous Connection
|11
|845
|453

Comparison of UTP, Coaxial, and Fiber Optic Cabling Types
|9
|1215
|240