Monday, May 6, 2019

Network Security Plan Term Paper Example | Topics and Well Written Essays - 2500 words

Network Security Plan - Term Paper ExampleThe physical aegis leave involve securing network transmission lines and servers from intruders. The intruders big businessman originate from within the organization or from offside. Response teams in case of any intrusion go forth embarrass people like the network security companies or the information technology department within an organization. The receipt plan to network failure may include having some redundant network cables laid down within the building. The wireless network will lead response plan by having multiple access points c everywhereing the same area. The security plan will try to site w lid network root is easily accessible by intruders to the network. Different forms of validation will be proposed to prevent unauthorized person from accessing the network. The network will be evaluated by inviting white hat hackers to try and hack into the network. The hackers will provide a list detailing weaknesses in the networ k together with some improvement proposals. The incidence response will provide situations where third party organization provides the infrastructure to run the organization in times of crisis. Some of the infrastructure providers are the telephone company providing their suck for network connection while the fiber optic cable is down. Incident Response 4 endorse 5 Vulnerability assessment 6 Code injection let out test 6 Substation leak test 7 Network s flush toiletning 7 Manual testing on passwords 8 Carrying out vulnerability tests in links 8 Physical Security 9 Spyware 9 Incidence response policy /Team 10 Incident Response The network users will face a abnegation to service incidence. The incidence will involve denying authorized users of the network crucial services like accessing mails over the network. The incidence can be caused by things like hackers flooding the network with data that are not needed by the users of the network. Such flooding will slow down the network, and workers cannot even read an netmail using the organization network. The occurrence of denial of service is a common thing within companies which might lead to dissatisfaction of customers and workers. Mitigation of such incidence would involve setting up firewalls within the network to identify any unwanted packets in the network. Response plan would involve purchasing packet scanning packet. The software will identify packets that are flooding the organization network and their origin machine. The packets once identified issue of the network connection to the machines flooding the network should be carried out immediately. The backup network can be used at this situation leaving out the flooded network. Switching to the network will cover the network runs at the preferred speed and delivery of service continues as planned. Another incident would be breakage of the backbone network which might be a fiber optic cable. The breakage of the cable might have been caused by vanda ls or natural calamities like floods, earth quakes and earth drift. Such situations would lowly zero connection to the mesh because the network infrastructures are down. Having a redundant network connection from an Internet service provider can provide a response plan. The redundant network connection should be using totally different infrastructure to reduce the probability of the two networks not working. One of the infrastructures can be a network provider using satellite to provide connection. The satellite connection

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.