The Best Methods of Securing the Network of an Organization

Added on -2020-02-19

| 6 pages| 702 words| 48 views

Trusted by 2+ million users,
1000+ happy students everyday

Showing pages 1 to 3 of 6 pages

Running head: IT SECURITY: RISK MANAGEMENTIT Security: Risk ManagementName of the StudentName of the UniversityAuthor’s note
1IT SECURITY: RISK MANAGEMENTTable of ContentsAnswer 1..............................................................................................................................2Answer 2..............................................................................................................................3References............................................................................................................................5
2IT SECURITY: RISK MANAGEMENTAnswer 1:The goals of the organization need to be found out to determine the required networkdevices. The capability of the network needs to be determined. The design of the network willbe based on the availability of application and the budget of the organization. The networkdevices required by an organization can be found out by following certain steps. The present infrastructure of the network needs to be determined. The existing limitations of the organization need to be determined. Any kind of physicalconstraint needs to be taken into account. The number of networked devices needs to be found out.The type of network applications and the bandwidth need about the users need to beidentified (Kim & Feamster, 2013).The total amount of money that the organization can invest behind the network devicesneed to be planned and a proper budget needs to be calculated.In case of any change in the technological infrastructure there will be different needs forthe networking of the organization.Selection of vendors must be done on the basis of implementation of local area as well aswide area network.Decisions regarding the cables used for networking needs to taken. There are certainchoices like coaxial cable, optical fiber, twisted pair cable or it can also be a wirelessnetwork (Hecht, 2015).Addressing protocols need to be determined and understood clearly for properfunctioning of the network. The MAC address needs to be understood and selected.

Found this document preview useful?

You are reading a preview
Upload your documents to download
or
Become a Desklib member to get accesss

Premium

$45

Q&A Library Access

Chat support

12

Document Unlocks

4

Answer Unlocks

Students who viewed this