Categories
Writers Solution

Security mechanisms would you use to secure information on the network

Can-D is a fairly large company headquartered in Orlando, Florida. There are 3,000 employees located at their headquarters. The company produces canned video content for popular entertainment ventures. Recently, they partnered with another local company (Video-Cam Corporation) who will be setting up an office at Can-D headquarters. There are some concerns regarding access to information between the various departments involved. As the network administrator, it is your responsibility to develop and propose a solution to address these security concerns. What specific security mechanisms would you use to secure information on the network, and why?
Prepare a 2-3 page Word document that summarizes your proposal to address security concerns. Explain the technologies appropriate for this situation, describe your reasons for using them, and explain configuration issues.
Be sure to cite all references using APA style.
For more information on APA, please visit the Library and click on Citation Resources link.

SEE SOLUTION BELOW

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

Network security solution

Network security is concerned with the policies and practices that prevent and monitor unauthorized access, misuse, modification and or denial of an information network and network devices. Network security also involves the authorization of access to data and programs in a network through an authentication methodLafuente, (Smith, 2013).

For Can-D and Video-Cam Corporation, it is important to haveat least two network access servers, with one being back up. These will perform authentication, authorization and accounting functions by verifying the logon details of potential users. The servers will also define layers of access for authorized users, determining what each users can do while connected to the network depending on their defined profile and posture (Smith, 2013). Programs that control network threats such as antiviruses, firewalls and spyware and malware detection can also be installed on the servers. That it is a large company means that the installed anti-threat programs should be advanced to be able to deal with the potential of many and sophisticated passive and active malicious attacks (Lafuente, 2015). The programs can be custom-made for the company or bought off the shelf (e.g. Cisco network security programs) and customized.

Access control policies, mechanisms and models are important considerations in implementing the network security system. Access control policies will specify how to manage access and who to grant access to what and when. The policies can be based on resource use, authority, obligation or confidentiality. An Access Control List can be the mechanism used to translate the access request. Security model will present the security properties of the access control system (Smith, 2013).

A Network Access Control (NAC) would need to be implemented for interpretation and checking of pre-admission and post-admission security policies. The policies can be regarding levels of anti-virus protection, system update and configuration. NAC solution will enable network security by describing device access to network nodes. It can be used to fix non-compliant nodes in the system enabling network infrastructure such as routers and switches to seamlessly and securely connect back office servers and end user devices. The NAC should also allow scalability to cater for the deployment scenario of a large, growing company that has fluctuating number of users, BYOD policy and remote access (Morrow, (2012).A NAC with 802.1X wired and wireless can be used for rigid control of the network system for Can-D and Video-Cam.“NIST IR 7874-Guidelines for Access…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….. secure information on the network ……………………

NOTE THAT WHAT YOU HAVE JUST READ IS A SAMPLE PAPER ABOUT THE TOPIC. CLICK THE ORDER BUTTON TO ORDER YOUR OWN PAPER

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays  

By admin

Academic tutoring services from the best essay writing company

Leave a Reply

Your email address will not be published. Required fields are marked *