logo

Network Security: Architecture, Attacks, and Prevention

13 Pages3784 Words59 Views
   

Added on  2023-01-13

About This Document

This document provides an overview of network security, focusing on the architecture and communication in Linux servers. It discusses different types of attacks against VoIP systems and the impact on infrastructure. It also explores the security policy and controls for VoIP systems, as well as the implementation of a network-based intrusion detection and prevention system.

Network Security: Architecture, Attacks, and Prevention

   Added on 2023-01-13

ShareRelated Documents
Network Security
1
Network Security: Architecture, Attacks, and Prevention_1
EXECUTIVE SUMMARY
It has summarised about the Architecture and communication that can be installed in the Linux
server and configured with logical addressing scheme. There are different types of attacks
against VoIP system which directly impact on the overall infrastructure. Furthermore, it should
be considered the security policy for VoIP system and controls against the attacks for
maintaining security aspects. It has summarised that comprehensive network-based intrusion
detection and prevention system that easily test overall efficiency at the time of VoIP
deployment.
2
Network Security: Architecture, Attacks, and Prevention_2
Contents
INTRODUCTION...........................................................................................................................3
MAIN BODY..................................................................................................................................3
Block A: Architecture and Communication....................................................................................3
Block B: Secure Operations and Service Delivery..........................................................................5
Block C: Research and Development..............................................................................................7
CONCLUSION..............................................................................................................................10
REFERENCES..............................................................................................................................12
3
Network Security: Architecture, Attacks, and Prevention_3
INTRODUCTION
Network security is a type of process of taking software and physical prevention measure to
protect underlying the entire infrastructure from different type of unauthorised access. It is based
on the practice of protecting and preventing against the unauthorised intrusion into business
networks. It is becoming complements end-point security and also concern about the multiple
devices. The network security instead focused on how different devices that interact with one
another while creating the secure platform for users, programs to perform their permitted critical
function within secure environment.
The report will discuss about the Architecture and communication that installed in the Linux
server and configured with logical addressing scheme. It will determine the different type of
attack against VoIP system and impact on the overall infrastructure. Furthermore, the report will
analyse about the security policy for VoIP system and controls against the attacks. The report
will describe about the comprehensive network-based intrusion detection and prevention system
that easily test overall efficiency at the time of VoIP deployment.
MAIN BODY
Block A: Architecture and Communication
Discuss about the configure Linux server with Asterisk IP, which fully installed with the logical
address scheme.
Asterisk is based on the software that implementing the branches exchange and
conjunction with the most appropriate telephony hardware. it is mainly used for establish the
communication within telephone calls while control end point interactions. It is based on the
open source framework that useful for building a strong communication application. Sometimes,
it directly turns into the different communication servers. It is the most powerful technique that
handle overall business operations and functions (Atapattu and et.al., 2019).
Installation and configuration
First of all, it must require to patch with latest update while installing some packages
which may include development tools and other type of packages. It is an essential for
successfully implementing different operations.
After performing successful operation, it will need to see list of packages and update as
per requirement dependencies.
4
Network Security: Architecture, Attacks, and Prevention_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security: Architecture & Communication, Secured Operations, Research and Development
|14
|3926
|63

Network and Infrastructure (Client Management Systems)
|18
|4277
|238

Managing Services and Security
|16
|1893
|489

Assignment | Cyber Security
|23
|2174
|14

Security Awareness Program Issues 2022
|4
|772
|13

Demonstration of Network Security Tools
|10
|2109
|85