Network Security
Slide 1 | ||
Slide 2 | Network security is designed to protect data and network integrity and use software and hardware technology. This activity protects data from many threats that are trying to enter the network. The company chose the distributed approach mainly for reliability. Failure in one node does not affect the whole system. This system is also faster, and data is safer since the control levels are different. For communication between the devices, the system uses network topologies. There are various network topologies such as; the star, bus, mesh, hybrid, and ring topologies. The company uses bus topology for device connections. This topology avoids overloading the nodes and also is easy to detect faults. There are set standards to regulate device communications and operations within the system. These rules help ensure the devices connected work efficiently without any risk of compatibility issues (Kizza, 2005). The organization uses De jure standards. These standards are approved and match the organization’s level. There are different types of networks; LAN, WAN, and others. In LAN, there is a group of computers connected through Ethernet cables to the system, and thus, they have to be in the same geographical area. WAN, unlike LAN, is not limited in terms of geographical location. Therefore one can access the network remotely. In the company, WAN is used since there is a branch out of town and makes working from home more accessible. Providing these services to the company has its advantages. It improves communication and the sharing of data within the organization. This helps in saving on time and space. Another advantage is to increase collaboration through sharing data and communicating with ease when working together. Also, due to connectivity, customer care services are enhanced.
| |
Slide 3 | Switching occurs in the second layer of the OSI model, while Routing takes place in the third OSI layer. The route uses destination addresses to identify the path the packet should follow, while in the switch, the mac addresses are used to determine the path to be followed. Switching and Routing, there are set strategies used to increase network access. The company employs virtualization, planned outages and disaster recovery, and high availability (Dimitrakopoulos et al., 2014). These strategies are cost-effective and offer solutions to any problem that could affect the network. Virtualization enhances a reduction in power consumption. Rationalizing power use helps in saving on the cost of production significantly. The other ensuring high availability of the network to all authorized persons for easier connection, communication, and application. It also saves time and power since it is faster. The company also has a planned outage and disaster recovery. Since systems are humanmade, they are prone to be affected by damages, whether manmade or natural. As a result, the organization has a backup power supply and saves data is backed up to avoid massive losses.
| |
Slide 4 | With increased technology, security threats have become a significant issue. Hackers and malicious people target the organization’s data and use it to harm or steal from them. Thus, the company has implemented several security measures to ensure data safety. These measures protect information from end to end even when dealing with other parties and are implementable. They are; data Security Policies, SaaS and cloud security guidelines, and personnel and mobile device management (Bacik, 2008). For personnel and mobile devices, management and restrictions need to be stated to avoid introducing the system’s vulnerabilities. Data security policies need to be set such that technical operations are outlined in compliance with data security standards and are also acceptable within the organization. The other measure is SaaS and cloud security policy. The company uses this policy to ensure its cloud security is optimum and has no weaknesses that outsiders can use to access its data.
| |
Slide 5 | Today, it is impossible to run a big business without using a network to share data, communicate with clients, and other IT related functions. However, the risks that arise from network use are massive. To protect themselves, the company has set security strategies to defend the network in case of an attack. The company has set up a firewall, hardware, and software to protect clients and organizations from network attacks. The firewall also informs the IT team in case of an abnormality in the system. Also, to ensure that data sent through the networks are safe, highly valuable data is encrypted, and an encryption key is sent through other means. Also, all devices are password-protected, and the users have to verify themselves before accessing the system. Another strategy is frequent data back up. When the worst happens, the company has to be ready to start from scratch. In case of an attack, the company may end up losing essential data in the process. Having a backup plan ensures the company will have somewhere to start from (Seagren, 2007). Another strategy has antivirus and antimalware programs. These two protect the system from malware and viruses introduced in the system by malicious people. In case of an issue, they alert the user and also the IT team as well.
| |
Slide 6 | Hackers and malicious persons create malware to access and exploit the user’s software on any programmable device. They aim to obtain personal data they can use to harm the company or steal from it. Once they infiltrate the system, these criminals gain access to client data, passwords, financial information, emails, and other highly classified details they can use. What they can do with the knowledge or data is endless. To protect the company from such attacks, there are two main things the company does to stay safe from such attacks; antimalware and antivirus protection for defense and educating employees. Ensuring employees are well educated is essential since they are equipped with skills for handling company data and using the network to note something weird in their devices and company devices from attacks (Mohanta & Saldanha, 2020). The company has also installed antivirus and antimalware protection, which informs the user and IT department of a virus or malware and rectifies the situation.
| |
Slide 7 | The company takes network security seriously and has ensured the set protocols fit the organization’s requirements. From the network topologies used, established protocols, and its responsibilities in telecommunication are covered. Network security is essential to companies with massive data and even smaller organizations that use the network or cloud services in their transactions. Switching and routing techniques take place in the second and third layers of the OSI model. They play a significant role in ensuring data packets reach their target destination through the use of addresses. The company has set up security policies that guide its operations and protect the organization and clients. These policies hold the company and employees liable for their actions when handling data. As a result, the company has set up security strategies to ensure the employees abide by the set policies. The company has also developed methods to deal with malicious software introduced in the system by installing antivirus and antimalware and training personnel.
| |
Slide 8 |