Answer 1 2 Answer 2 3 References 5 Answer 1: The need for the network devices to be determined
6 Pages702 Words196 Views
Added on 2020-02-19
About This Document
IT SECURITY: RISK MANAGEMENT 1 IT Security: Risk ManagemenIT Security: Risk Managementt IT SECURITY: RISK MANAGEMENT IT Security: Risk Management Name of the Student Name of the University Author’s note Answer 1 2 Answer 2(3) 3 References 5 Answer 1: The goals of the organization need to be found out to determine the required network devices. The network devices required by an organization can be found out by following certain steps. The type of network applications and the bandwidth need about
Answer 1 2 Answer 2 3 References 5 Answer 1: The need for the network devices to be determined
Added on 2020-02-19
BookmarkShareRelated Documents
Running head: IT SECURITY: RISK MANAGEMENTIT Security: Risk ManagementName of the StudentName of the UniversityAuthor’s note
1IT SECURITY: RISK MANAGEMENTTable of ContentsAnswer 1..............................................................................................................................2Answer 2..............................................................................................................................3References............................................................................................................................5
2IT SECURITY: RISK MANAGEMENTAnswer 1:The goals of the organization need to be found out to determine the required networkdevices. The capability of the network needs to be determined. The design of the network willbe based on the availability of application and the budget of the organization. The networkdevices required by an organization can be found out by following certain steps. The present infrastructure of the network needs to be determined. The existing limitations of the organization need to be determined. Any kind of physicalconstraint needs to be taken into account. The number of networked devices needs to be found out.The type of network applications and the bandwidth need about the users need to beidentified (Kim & Feamster, 2013).The total amount of money that the organization can invest behind the network devicesneed to be planned and a proper budget needs to be calculated.In case of any change in the technological infrastructure there will be different needs forthe networking of the organization.Selection of vendors must be done on the basis of implementation of local area as well aswide area network.Decisions regarding the cables used for networking needs to taken. There are certainchoices like coaxial cable, optical fiber, twisted pair cable or it can also be a wirelessnetwork (Hecht, 2015).Addressing protocols need to be determined and understood clearly for properfunctioning of the network. The MAC address needs to be understood and selected.
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Preventive Mechanisms Against DoS Attackslg...
|13
|3895
|485
Network Security: Architecture, Attacks, and Preventionlg...
|13
|3784
|59
Active Directory and Related Aspects of Securitylg...