This website uses cookies to ensure you have the best experience. Learn more

Investigation Of Network Security Requirements And Their Impact On Performance With The Aim Of Establishing Configurations Fit For The Purpose

1015 words - 5 pages

Networks have become a vital part of almost every organization changing the way that business is conducted from day to day. In the early days of the computer era business men and women have had to use standalone machines that were partially interconnected or not interconnected at all. Since then computing has gone through various changes through a number of decades which has led to the complete integration of various computing devices and now professionals are able to share hardware and software resources without difficult which has led to the reduction of business costs and a higher level of productivity. For example instead of having to buy a printer for every department or ...view middle of the document...

In this project, I aim to investigate some of the security challenges that exist in modern networks and how these security challenges are mitigated. After identifying mitigation techniques I intend to design a network and configure it with these mitigation techniques. The network will be designed in OPNET IT guru academic edition. Simulations will then be carried out and then a comparison will be made to assess the impact some of these security measures have on the network.
This project will help in understanding the threats that exist in modern networks and how best they can be mitigated and how performance is affected when certain measures are put in place e.g. firewalls. The project will also help me understand how to use a network simulation tool like OPNET for assessing performance.

The aim of the project is to investigate network security requirements and discover their impact on network performance.
1. Investigation and Literature review
1.1 investigating the origins of internetworking and network security
1.2 Analysis of network security threats and challenges
1.3 Investigation of the impact of network security breach on an organization.
1.4 investigations of network security mitigation techniques
2. Design Network Using Various Configurations
2.1 Investigate network devices, protocols and configurations commonly used in the industry
2.2 The results of the investigation in 2.1 will be used to build two identical Wide Area Networks (WANs) based on the IEEE standards for Ethernet, the networks will be built using OPNET IT guru academic edition
2.3 Configure security measures on the network such as firewalls VLANs.
3. Simulation and Results Analysis
3.1 based on the network designed in 2, simulations will be carried out using OPNET IT Guru academic edition.
3.2 Results of the simulations will be corrected and analyzed
3.3 A discussion of results from each simulation carried out.
4. Project Closure
4.1 Conclusion/Lessons learned
To provide a critical evaluation on the selected Network Security Requirements/Configurations
5. Planning
To implement this project I intend to use a...

Find Another Essay On Investigation of Network Security Requirements and their Impact on Performance with the aim of establishing configurations fit for the purpose

Security Requirements of the Organization Essay

1155 words - 5 pages monitored and logged. They will also be made aware that they will be restricted from access to files that are not related to their primary jobs. Any organization security requirements needed. Hardening the network by conducting updating software and hardware to ensure the security of the system is an important part of network. Hardening involves an ongoing process of ensuring that all networking software together with the routers are

Account for the Rise of New Social Movements and Evaluate their Impact on Modern British Politics

1091 words - 4 pages public simply left these issues up to the government? Well the answer is, many sections of the public feel disillusioned with the choice offered by political parties. They don't see their worries and concerns being represented fairly or frequently enough for their liking. Therefore, due to their changed attitude, they decide to take up these issues themselves. More specifically NSMs can now be seen as a counter culture. This is because society

Assess the impact of the invention of transistors on society with particular reference to their use in microchips and microprocessors

406 words - 2 pages placed on area of 1cm3. This had enormous consequences for the design and development of computers, CD players, internet, mobile phones, cable TV, robots, military technology and medical diagnosis & treatment.The use of transistors in microprocessors and microchips (thousands of transistors may be on this chip) made possible a continuous decline in real price of computers and a continuous increase in processing power.Computers are now used in many

Impact of Audience on the Effectiveness of a Text's Purpose

2069 words - 8 pages Impact of Audience on the Effectiveness of a Text's Purpose Introduction In this essay I am going to show each of these three texts has been constructed by a writer to cater for his audience to achieve a purpose. Summary of text one Text ones is an advertisement title "eat to be fit". The text is aimed at the elderly. The purpose of this text is to persuade the elderly people to eat healthily and to shop

The Fit for LIFE Act of 2011

1146 words - 5 pages contact their Representative for further discussion. If the Representative is intrigued by the idea, they research the idea. If the findings of their research show a potential future, Representatives write the ideas into bills. The Fit for LIFE Act of 2011, is a comprehensive bill addressing many of the root causes of childhood obesity. It is the most current piece of federal legislation whose primary target is obesity and its determinants

The Aim of Social Work

2050 words - 9 pages no means inevitable. Many older people remain in good health and carry on maintaining their daily routines. Some however do need support therefore there are frameworks for social workers such as theories to help them intervene with service users. Wilkins (2010) says that person centred approach lacks direction for most service users. Tudor and Worral (2006) also state that the theory lacks application of knowledge and can be quite rigid

The Impact of Performance Enhancing Drugs on the Olympics

3241 words - 13 pages rely on the GCMS.              Aside from the vast amount of substances that can be used as performance enhancing drugs, the ease with which they are obtained, and the simple measures that can be taken to mask the use of drugs, the essential problem is a lot more simple.  For today's athletes, coaches, and national Olympic committees, the "urge for fame, glory, victory, and money" is overwhelming (Cosell 313).  Therefore, they are willing to do

The Role, Purpose, Use and Impact of Value Added Tax

1641 words - 7 pages third balancing payment covering their remaining liabilities. HM Revenue & Customs calculate the interim to be the previous annual amounts paid multiplied by 1/24th. The scheme was introduced in 1992. VAT on imports from other EU members had become payable at later dates and therefore, the main purpose of this scheme was to try and reimburse for the effect created upon the single market on the public sector borrowing requirement.The cash

The Impact of Entrepreneurial Characteristics on SME Performance

2446 words - 10 pages ), Ferreira & Azevedo (2007), Smith J.R, Okhomina and Mosley (2006), support that Owner characteristics are the important ingredient for the success of a firm. Research Aims & Objectives The aim of the research is to investigate empirically the influence of entrepreneur characteristics on the SME performance. Owner Characteristics that will be studied are related with personal pursuits that are considered the most important characteristics

Impact of the Internet on Information Technology Security

1185 words - 5 pages network. Therefore, firewalls help protect an organization's network.Firewalls act as a barrier between two networks. They can either be in the form of hardware or software types. Firewalls are built-in security features for routers, or they are software that acts as firewalls. When working with a router program, network packets are examined by a firewall to determine if they should be transmitted to their destinations. Firewalls can work with

Exploring the Impact of Security Concerns on Airlines' Financial Viability

2161 words - 9 pages , operate, and stay in business can be dependent on the state of the economy and their gross net profits. Airlines are faced with the costs of imposing security modifications to prevent future attacks. Funding for security modifications can be provided by the government and other key stakeholders when airlines are facing financial difficulties. A decrease in revenue and a weakened economy suggests airlines are in no state to absorb additional

Similar Essays

Advantages And Disadvantages Of Currently Available Technologies And Their Impact On System Performance And Effectiveness

1878 words - 8 pages by one-third in 10 years. Super fast processors and huge memories have to be ‘fed’ and a system is only as fast as it’s slowest component, currently the disk. In our analysis we shall consider the advantages and disadvantages of currently available technologies and their impact on system performance and effectiveness. To narrow down this still very broad subject even more, we shall focus our attention on standard Personal Computers. The reason

An Investigation Into The Use Of Cooperative Learning Strategies To Foster Positive Social Behaviour And Satisfactory Academic Performance In Physical Education Among A Group Of Grade Nine Students. ...

756 words - 3 pages performance in Physical Education. Significance of the Study Through the use of the cooperative Learning Strategies, not only a few students are involved and being encouraged, everyone is included and encouraged. When students are given a chance to work with their peers an opportunity is provided for positive independence, good social skills, development of good interpersonal relationships, free talk, good teamwork and the practice of

Agricultural Subsidies: Their Original Purpose And Impact Today

1910 words - 8 pages advantage to exports in the light of the high domestic prices. 4) Conservation Subsidies: 3 billion annually The Conservation Reserve Program and Conservation Security Program are controlled by the USDA and aim to steady production. The reserve program pays farmers to replace crops with ground cover on an acre basis. The security program works to limit the production on the excess land freed up because of the controls on cash crop production

The Impact Of Different Party System Configurations On Health Care Reform In The United Kingdom And Germany

3488 words - 14 pages THE IMPACT OF DIFFERENT PARTY SYSTEM CONFIGURATIONS ON HEALTH CARE REFORM IN THE UNITED KINGDOM AND GERMANY INTRODUCTION The Labour Party in the United Kingdom (UK) continues to come under fire. The National Health Service (NHS) reform that has been carried since 1997 scroll reap endless wave of protests. The updated protests recorded on 10 November 2013, which criticized the amount of salary received by 428 very senior managers in the NHS