logo

Implementing Network Security: Steps and Considerations

   

Added on  2023-06-10

4 Pages677 Words338 Views
 | 
 | 
 | 
Running Head: APPLICATION SECURITY 1
APPLICATION SECURITY
Student Name
Institution Affiliation
Facilitator
Course
Date
Implementing Network Security: Steps and Considerations_1

APPLICATION SECURITY 2
In this era of Internet of Things, ensuring that the organizations network traffic is always
secure, whether on premises or cloud based has become a critical part of data protection
strategies. This ensures that an organization data is safe from landing into unauthorized hands
where it can be used to deter the organization. Implementing both secure wired and wireless
environment within an organization set up, there are some steps necessary
Microsoft has come up with a number of security technologies to make it easy when it
comes to protecting an institutions network. These technologies include, firewall, intrusion
detection systems, partitioned LANs, traffic isolation, access control, Azure security center and
Multi-tier topology (Karygiannis & Owens, 2012).
Critical considerations
The current networked world has been shifting constantly and the devices it connects also
change from time to time. The combination of cloud based services, on-premises computation
and the mobile workforce armed with the expanding diversity of connectivity devices calls for
advanced security systems in network and which are flexible as well as agile to be in a position
to detect malware activities and intrusions (Karygiannis & Owens, 2012).
Steps to Implementing Network Security
Organizations must deploy rigid cyber defense systems, systems which must be able to
focus on the Meta environment surrounding the organization technology as well as the specific
vulnerabilities. The following areas must be considered before implementing windows network
security (Karygiannis & Owens, 2012).
Visibility of Traffic
Implementing Network Security: Steps and Considerations_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents