Monday, December 9, 2019

Developing Network Security Strategies †MyAssignmenthelp.com

Question: Discuss about the Developing Network Security Strategies. Answer: Introduction: The Skillage I.T organization business requirements are based on business goals and constraints. The Business requirements are optimizing the network costs and availability. The Business requirements are containing the three basic elements such as network variable, performance constraints and environment givens. These are establishing the network availability requirements. The business requirements are used to increase the performance. It provides the flexibility and scalability of the organization (Kurose Ross, n.d.). The technical requirements for skillage I.T organization is based on technical goals and trade-offs. The Technical requirements provide the effective infrastructure for an organization. It provides the, Serviceability Availability Manageability Stability Scalability Affordability System Specification The Skillage IT organization network infrastructure has the following network hardware components. They are, Cisco Directory Server Cisco Router Cisco Switches Cisco File Server Cisco Main Server Dell Computers Canon Printers Gateways CSUs/DSUs Network Cards (NICs) System Area Network Cards The integrated services routers are used to combine the network, security and application services on an organization. It provides the flexible and scalability of the network. It provide the highly secure VPN access for remote employees. Cisco Switches - Cisco Catalyst 4948 Switch The cisco catalyst switches are used to provide the exceptional serviceability and reliability for an organization. It has the following features, IPv6 ACLs Stacking Layer 3 capabilities Quality of Service Power over Ethernet Spanning Tree The cisco servers are provides the superior performance and expandability. It designed to deliver the efficiency for I/O intensive and storage infrastructure workloads. The server includes the bare metal applications, graphics rich, virtualization and big data analytics. The Proposed network infrastructure uses the directory and file server. The server specification includes the following function such as application CPU requirements, operating system, expected application transaction volume, Application functional characteristics and application memory requirements. The specification of server also requires the access requirements for a network. It defines the numbers of user requiring the simultaneous access to the network applications (NETworking, 2013). The server specifications include the backup policy, utilization, load, memory, storage and devices connected to the server. Test the network connectivity Test the network external and internal access Test the ability of network developers to access the various development, production and environments. Test the web servers are online The maintenance of server is the process of keeping the server updated or running information to ensure the organization network. This process provides the effective network infrastructure. It is a crucial to the business performance. The server maintenance is used to monitor the entire network ("Ten steps for network documentation: Channel checklist", 2017). The network equipment has various capable types like WAN, MAN and LAN. It has the total number of ports that network equipment provides. It has maximum data transfer speed. It uses integrated firewall for security. It has smarter routing to assign the IP addressing. It operating the simultaneous frequency up to 5 GHz. The network security policies and plan are used to providing the secure network infrastructure for an organization. It implements and developing the network security and it helps to address the varied concerns. It meets the customer primary goals for network security. The network security policies and plan are used to identify the network assets, analyse the security risks and requirements, implement the technical strategy and security procedures, defines the security trade-offs and maintain the security. The above network design provides the proposed network infrastructure. The proposed network infrastructure provides the flexibility and security of the network. The network design also provides the end to end network solution for Skillage IT organization. It using the cisco network devices to reduce the maintenance and operational costs. It provides the productivity and security for an organization. The proposed network design has Cisco routers, switches, directory server, file server, firewall and Computers. The Cisco firewall is used to provide the network security. A program specification is a formal document used to describe the network programmer's details and products intended appearance, capabilities and interactions with users. It provides the continuing and guideline reference point as the programmers. It is used to describe the network products and requirements. It describes the network protocols, standards and architectures to achieve the business and technical goals of a Skillage IT organization. Develop Detailed Technical Design Detailed technical design of proposed network infrastructure was developed by the Network Engineer. The Technical design was providing the overall network infrastructure technical specifications. The detailed technical design includes the Technical specification and system specifications. The technical specifications are used to provide the required technical requirements for a network infrastructure. The System and technical specifications are including the directory server, file server, database server and main server information. It also defines the access requirements for a network infrastructure. The access requirements include the number of users requiring the simultaneous access to the network applications. It also includes the user communities such as network engineer, developer, vendors and other. Technical documentation is used to provide the overall technical requirements for proposed network infrastructure. It provides the technical information of the network design and detailed information about the proposed network infrastructure needs. The Technical documentation includes the details of following requirements. These are, User requirements Business requirements Security requirements Technical requirements Network design requirements Configuration of internet gateway includes the network configuration that meets the skillage IT organization needs. It uses the Cisco end to end solution to provide the secure internet gateway for an organization. It builds the data with secure network infrastructure for Skillage IT organization. It established the private connection and deploys the internet gateway to create the secure groups and work with access control lists. The internet gateway was successfully configuring the proposed network infrastructure. It provides the end to end network solution for a Skillage IT organization. The Top down approach to design is refers to starting the designing from the top most layer and moving down. The Top down network design is used to designing the enterprise networks that provide the manageable, secure and reliable network for an organization. It provides the overview of the system is specifying and formulated the network. It understands the overall network infrastructure and provides the secure and flexibility of the network. It easily achieves the balance in an investment portfolio. It analyses the risk by aggregating the impact of internal operational failures ("Top-Down Network Design", 2017). It easily measures the network variances in the economic variables that are not explained by the external factors. The top down methodology mainly used to rely on historical data. The top down methodology is used to describe the creation of a structure for business process tests and it determining the test configurations for testing different use cases are needed. It facilit ated to designing the tests with reusable components and it create and maintaining the overall network infrastructure. Network Documentation The Network documentation is used to provide the important and valuable information to service providers. When network failure occurs network documentation providing the backup for an organization. It ensures the smooth network documentation policy and network topology diagram. The documentation policy should provide the network details need to be documented especially each server. It easily communicates to each network administrator. It documented the server roles, IP addresses and names. The Skillage IT organization user documentation includes the network access control. The Network access control devices to help prevent a computer from victim of virus, Trojans, spyware and spam. It replaces the resent applications with electric equivalent that associates a organization community member with a computer. The ongoing maintenance support includes the following activities. They are, Organization work Fiscal Management Personnel Management Board Maintenance General Logistics Relationship with the larger community Organization spirit Directory Structure The skillage I.T organization directory structure includes the following aspects. They are, Groups Organizational Units The Organization using the directory server to store the groups and sites sensitive informations. It maintains the files into a hierarchy of folders. It should be stable and scalable for an organization. It display the files in hierarchical tree structure. Designing the small-scale networks to meet the business and IT needs. The Network IT needs is requiring the technologies and requirements to adopt new IT technologies to achievement of business and technical goals. It identified the new technologies requirements to achieve the skillage IT organization goal of a proposed network designs. The IT needs are easily discovering the network design basics. It based on user, business and security requirements. It also meets the daily requirements of business and networks. It supports the network applications and services to provide the access to the network resources (Oppenheimer, 2017). References Kurose, J., Ross, K. Computer networking NETworking. (2013). [Hong Kong]. Oppenheimer, P. (2017). Developing Network Security Strategies Network Security Design. Ciscopress.com. Retrieved 12 October 2017, from https://www.ciscopress.com/articles/article.asp?p=1626588 Ten steps for network documentation: Channel checklist. (2017). SearchITChannel. Retrieved 12 October 2017, from https://searchitchannel.techtarget.com/feature/Channel-Checklist-10-steps-for-network-document HYPERLINK "https://searchitchannel.techtarget.com/feature/Channel-Checklist-10-steps-for-network-documentation"ation Top-Down Network Design. (2017). SearchNetworking. Retrieved 12 October 2017, from https://searchnetworking.techtarget.com/tip/Top-Down-Network-Design

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.