Application of Network Security Concepts

Requirement

Application of Network Security Concepts

Solution

Evaluation of existing infrastructure

The star topology with forty PCs network together is used in the branches and headquarters of the company except in the Palo Alto headquarter because it has already ten PCs for the employees of the company.  The company is using Pavilion dv7t Quad edition laptop with the Zone alarm security suite. The Cisco space router is used at the Mongolia office due to unreliable of infrastructure. The company is not using cloud computing due to which the data of the company is not able to access by headquartering, and the cost of networking is also high.

At Allassignmenthelp.com the students can get the best computer network assignment help. Our team of professional experts has expertise in providing the best programming assignment help. Whenever a student places an order on our website we make sure that he or she gets high-quality assignment writing.

Risk exist with network architecture

There are various types of risk which exist within the network architecture of the company which includes potential attack, security risk, cyber threat, cyber attack, worms, virus, spyware, scareware, backdoor and others. The security risk is the major risk due to which the confidential data of an organisation can be accessed by hackers. The network architecture is very complex due to which the network can be hacked by others which lead to the major loss for an organisation (Ciampa et. al., 2012). The virus can also destroy the computer which is present in the network architecture of the company. 

Recommendation

The risk can be reduced through prevention which can be done by implementing the critical security controls which help to provide security among the networks. The critical security control helps to minimise the attack surface by acting as layered defences in order to protect the networks from various attacks. It includes the building of layered defensive strategy which includes four stages, namely reconnaissance, delivery and installation, command and control, and mission accomplishes which helps to protect the networks from various risk and attacks (Loo et al., 2016). 

Impact of implementing cloud-based solution

The advantages of implementing the cloud-based solution include security, flexibility, cost saving, mobility, insight, increased collaboration, quality control, disaster recovery, loss prevention, sustainability and automatic software updates. It enables to access the information from any computer which helps to protect the valuable data from the risk of losing. The information can be shared and viewed easily which improves the collaboration. However, the disadvantage of implementing the cloud-based solution includes downtime, security and privacy issues, dependencies, and others (Hussain et al., 2014). The major disadvantage is security because the information can be misused by other which impacts on the profitability of the company. The cloud-based computing mainly depends on the internet which is another disadvantage.

Place Order For A Top Grade Assignment Now

We have some amazing discount offers running for the students

Place Your Order

References 

  • Ciampa, M. (2012). Security+ guide to network security fundamentals. Cengage Learning.

  • Loo, J., Mauri, J. L., & Ortiz, J. H. (Eds.). (2016). Mobile ad hoc networks: current status and future trends. CRC Press.

  • Hussain, M., & Abdulsalam, H. M. (2014). Software quality in the clouds: a cloud-based solution. Cluster Computing, 17(2), 389-402.

Get Quality Assignment Without Paying Upfront

Hire World's #1 Assignment Help Company

Place Your Order