logo

Network Security: Risks & Countermeasures

   

Added on  2020-02-19

6 Pages702 Words196 Views
 | 
 | 
 | 
Running head: IT SECURITY: RISK MANAGEMENTIT Security: Risk ManagementName of the StudentName of the UniversityAuthor’s note
Network Security: Risks & Countermeasures_1

1IT SECURITY: RISK MANAGEMENTTable of ContentsAnswer 1..............................................................................................................................2Answer 2..............................................................................................................................3References............................................................................................................................5
Network Security: Risks & Countermeasures_2

2IT SECURITY: RISK MANAGEMENTAnswer 1:The goals of the organization need to be found out to determine the required networkdevices. The capability of the network needs to be determined. The design of the network willbe based on the availability of application and the budget of the organization. The networkdevices required by an organization can be found out by following certain steps. The present infrastructure of the network needs to be determined. The existing limitations of the organization need to be determined. Any kind of physicalconstraint needs to be taken into account. The number of networked devices needs to be found out.The type of network applications and the bandwidth need about the users need to beidentified (Kim & Feamster, 2013).The total amount of money that the organization can invest behind the network devicesneed to be planned and a proper budget needs to be calculated.In case of any change in the technological infrastructure there will be different needs forthe networking of the organization.Selection of vendors must be done on the basis of implementation of local area as well aswide area network.Decisions regarding the cables used for networking needs to taken. There are certainchoices like coaxial cable, optical fiber, twisted pair cable or it can also be a wirelessnetwork (Hecht, 2015).Addressing protocols need to be determined and understood clearly for properfunctioning of the network. The MAC address needs to be understood and selected.
Network Security: Risks & Countermeasures_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents