Sunday, June 16, 2019

Network Security Plan Term Paper Example | Topics and Well Written Essays - 2500 words

Network Security Plan - Term Paper ExampleThe physical security will choose securing net income cables and servers from intruders. The intruders might originate from within the plaque or from outside. Response teams in case of any intrusion will include people resembling the network security companies or the information technology department within an government activity. The response plan to network failure may include having some unornamented network cables laid down within the building. The wireless network will provide response plan by having multiple access points covering the alike area. The security plan will try to describe what network infrastructure is easily accessible by intruders to the network. Different forms of validation will be proposed to hold on unauthorized person from accessing the network. The network will be evaluated by inviting white hat hackers to try and hack into the network. The hackers will provide a list lucubrate weaknesses in the network to gether with some improvement proposals. The relative incidence response will provide situations where third party organization provides the infrastructure to run the organization in times of crisis. Some of the infrastructure providers are the telephone company providing their line for network association while the grapheme optic cable is down. misadventure Response 4 Support 5 Vulnerability assessment 6 Code injection leak test 6 Substation leak test 7 Network scanning 7 Manual testing on passwords 8 Carrying out vulnerability tests in links 8 Physical Security 9 Spyware 9 Incidence response policy /Team 10 Incident Response The network users will face a denial to service incidence. The incidence will involve denying authorized users of the network crucial services like accessing mails over the network. The incidence can be caused by things like hackers flooding the network with data that are not needed by the users of the network. Such flooding will slow down the network, and workers cannot even read an email using the organization network. The occurrence of denial of service is a common thing within companies which might lead to dissatisfaction of customers and workers. Mitigation of such incidence would involve setting up firewalls within the network to identify any unwanted packets in the network. Response plan would involve purchasing packet scanning software. The software will identify packets that are flooding the organization network and their origin machine. The packets once identified termination of the network connection to the machines flooding the network should be carried out immediately. The escort network can be used at this situation leaving out the flooded network. Switching to the network will ensure the network runs at the preferred speed and delivery of service continues as planned. Another incident would be breakage of the backbone network which might be a fiber optic cable. The breakage of the cable might have been caused by vandal s or natural calamities like floods, earth quakes and earth drift. Such situations would mean zero connection to the Internet because the network infrastructures are down. Having a spare network connection from an Internet service provider can provide a response plan. The redundant network connection should be using totally different infrastructure to reduce the probability of the two networks not working. One of the infrastructures can be a network provider using satellite to provide connection. The satellite connection

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.