Sunday, November 3, 2019
Network security infrastructure Essay Example | Topics and Well Written Essays - 500 words
Network security infrastructure - Essay Example On the other hand, Internet Security Infrastructure is the arrangement of components and tools, in a bid to offer the most effective internet protection. Before one settles on a particular plan to use, it is of the essence to clearly state the objectives of the plan. I, as a result, had to carefully select a plan that would enable me achieve the above goals at the lowest cost possible. My plan includes firewall, web contents, protection against web pharming, and phishing. A firewall is a choke-point garget that consists of a set of rules and instructions specifying the type of data to allow in or out of the system. It basically controls the flow of data into and out of the system. There several types of firewalls in the market. In this case, I chose on Zone-Alarm based on its outstanding features and performance. Zone-Alarm is a multi-purpose firewall. It is capable performing several functions simultaneously. Such functions include protecting the system against internet exposure, protecting the system against web pharming and phishing. The firewall is programmed so as to prevent any malicious emails from getting into the mail server. The use of this type is very economical, in that it forms several functions at ago, hence saves on cost. This is a server program that is responsible for handling the end-user requests to access the system. AAA server gives authorization, authorization, and accounting services. It is at this station where the users request to access the system is either accepted or rejected. Routers are referred to as traffic cops of a network system. Their function is to direct traffic into and out of the system. They also direct traffic within the network system. The process decision of a router is normally contained in a routing table. The routers are programmed so as to prevent the possible routing threats such as complete network chaos, dropped traffic, and traffic sent along invalid paths. The
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.