Theories of Security Management Week 8 Case Study 4

1344 Words6 Pages
| Week 8 Case Study 4 | CIS502007VA016-1134-001: Theories Of Security Management | | 1 Network design and implementation is vital in today’s technologically driven work environment. Many different factors must be constantly considered, by a well-established networking company. First and foremost, security has to be extremely effective. Secondly, we must consider what kind of bandwidth this company will be using, based on these decisions we will recommend that the company purchases an IP address from an ISP. Today’s business network also has to be ready to meet the demands of company expansion. Overall the network we propose is both extremely secure and extremely flexible. The network must be ready to accept hundreds of new host computer if the need ever arises. As we can see from the in fracture of the diagram, there are a lot of improvements needed, not just with the network but with the whole system. (Adesh Rampat, 2013) From the diagram below, we can see that there are many security, bandwidth, equipment, firewall, and system issues. First, the type of equipment they’re using is outdated (computer systems, tape systems, etc.) They’re still connecting using an Ethernet cable and are not utilizing a wireless connection. A single Ethernet cable, like an electric power cord, can extend only limited distances due to their electrical transmission characteristics. This is why wireless is so much more effective when it comes to running a network. Wireless technologies like Wi-Fi and Bluetooth have replaced Ethernet on many home and business networks because they’re more effective. In today’s security conscious environment an in-depth approach to protecting a midsize business network and the data that resides therein is a very complex matter. It is no longer sufficient to rely on perimeter defenses and antivirus suites alone to protect network

More about Theories of Security Management Week 8 Case Study 4

Open Document