Network Security Administrator, Approach Problem Securing a Case Study

Total Length: 672 words ( 2 double-spaced pages)

Total Sources: 3

Page 1 of 2

Network Security Administrator, Approach Problem Securing a Central

I would utilize a number of security measures to adequately secure a central computer network that is accessed by other branches and staff from remote physical location. The vast majority tends to work in conjunction with one another, and should not deny access to authorized users.

For all of the computers that are present in the primary, physical location in which the network is based out of, I would employ encryption measures. This sort of encryption is similar to that used by cellular devices (whether in the form of tablets or phones), which enables users to reduce the threat of unauthorized users from accessing their devices or the data within them (Stafford, 2010). However, it is worth noting that encryption would not be used on the computing devices in the network that are outside of this primary physical location.

One of the primary layers of defense that I would provide for the network as well would come in the form of routers -- perhaps even wireless ones in suitable locations such as in a company building where the majority of the employees were part of this computer network.

Stuck Writing Your "Network Security Administrator, Approach Problem Securing A" Case Study?

The ultimate boon of these routers is that they are able to engage in packet inspection (Merkow and Breithaupt, 2006, p. 269). Packet inspection is a fundamental component of security, because it enables the analysis of packets of incoming data -- some of which may be potentially threatening -- and generally examines both its contents and its header. The sort of packet inspection conducted by routers would operate as a good entry level defense for the entire network.

However, as anyone familiar with the conventional packet inspection is aware of, it is fairly brief and does not provide substantial inspection against sleeper cells and other forms of data that can present noxious results to a computer network after a significant amount of time. In fact, most point solutions that are accessible via conventional security appliances only retain data….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Network Security Administrator Approach Problem Securing A" (2013, June 03) Retrieved May 20, 2024, from
https://www.aceyourpaper.com/essays/network-security-administrator-approach-91438

Latest MLA Format (8th edition)

Copy Reference
"Network Security Administrator Approach Problem Securing A" 03 June 2013. Web.20 May. 2024. <
https://www.aceyourpaper.com/essays/network-security-administrator-approach-91438>

Latest Chicago Format (16th edition)

Copy Reference
"Network Security Administrator Approach Problem Securing A", 03 June 2013, Accessed.20 May. 2024,
https://www.aceyourpaper.com/essays/network-security-administrator-approach-91438