Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Security Architect Design, Research Paper Example
Hire a Writer for Custom Research Paper
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
This section mentions threats and mitigation measures proposed that are effective. The complex the system the more it will be considered to be complex.
Malware involves threats of worms, Trojan horses as well as viruses. The threat of spyware facilitates scanning of computers and sending the data to other locations and computers in the cyberspace. The transmitted information includes personal information, files, documents, passwords, account numbers and login details. These infections also result to data loss, operational impairment and corruption. The best suitable protection for this type of threat is an antivirus. There are various types of Antivirus which specifically deal with malwares. This will be the best to the computers in this network and the server. The recommended anti-viruses include Avast, Aroma and Kaspersky anti viruses.
Hacking is another potential threat posed to the network environment. Hacking usually involves unauthorized access of a remote computer. Hacking is also a common occurrence in a network system and it compromises the privacy of an individual user, leading to the release of confidential, sensitive as well as protected information. Another important risk involves instability and slowing down of the computer that if unchecked, can considerably affect the performance of the computers. The best remedy for this type of problem is expounded below:
- Do not use the same passwords. This will provide an easy pass to hackers to access the network and the sensitive information. It is also recommended that you use passwords that combine letters and numbers because they are considered to be stronger.
- Do not use the same security question at any one time. This will provide a gateway for them to access your information. The complex the security question, the more secure your information will be. Complex does not mean that you forget your security question.
- The personal information shared online in shopping areas and other online websites should be really avoided. The areas which people share personal information can be used by unauthorized people to access your account and read your information. Social media sites also fall into this category.
- There are also the pop-up ads that are often used by hackers. Once you click them they normally open a portal or gateway in which they access your information. Avoid such pop ups at all times
- Firewall is also one of the essential software that ought to be included in the system to ensure no area is compromised.
- Anti-spy software can also be installed into the system. It will be used as a defence mechanism to detect anyone who wants to hack or spy on your information.
The above are recommend because of:
- Effectiveness to handle the problem
- They are user friendly
- They can be easily implemented and reviewed at any one time.
Natural disasters are also inevitable in an organization’s network system environment. Lighting may strike the system causing breakdown. Soda may spill in the keyboard leading to loss. The system may also experience electricity failure that could potentially damage some devices. The possibility of earthquake, fire and floods cannot be underestimated and these are consequential as they can cause damages to the entire system. Mistakes could also occur in the system administration leading to massive loss of important data.
The remedy for this is cloud computing and storage. This means that data is stored in servers that are not in the actual campus. They are stored in a remote location in the cloud. The remote location cannot be comprised by any physical damage to the equipment in the organization. This usually provides a good back up of information. The added advantage is that the information is backed up in real time and the data is always up to date.
The 7 Layers of the OSI Model
This aims at explaining how the network framework operates. The issue of control is elaborated in the seven layers where information goes through to reach the end user. OSI stands for Open System Interconnection.
Application Layer
This is the layer which the end user sees the actual information that he or she wanted. It should be protected since sensitive material is viewed by the user. The use of passwords and security questions will be implemented in this layer. This is to ensure that the right person access the right information. The use of antivirus and spyware will also be emphasized in this layer.
Presentation layer
This layer will be protected by secure network protocols and firewalls. This is where the information is distributed to the application layer hence hacking can be possible to redirect the information to another final destination.
Session layer
This layer will be well protected by a firewall and secure network protocols. Communication is achieved through the connections hence they can be hacked. Anti hacking software should also be installed in this layer.
Transport Layer
This layer requires a network protocol that is secures and firewalled. The communication protocol to be used must be made secure using various types of protocols, which are intertwined to create a hybrid which will make it secure. The firewall will also be used to prevent any unwanted people from hacking into the system especially at this layer
Network Layer
This layer also requires a network protocol that is secure and firewalled. The cryptographic protocols such as Secure Socket layer (SSL) must be included in this layer. These security protocols usually provide communication security over the internet. The SSL works effectively by encrypting all data passing the application, network and transport layers.
Data Link layer
The data link layer is always prone to attacks due to the use of switches which are a common characteristic of layer two and three communication. The best security measure that can be implemented on a switch is by configuring the ports. Port security commands usually prevent spoofing attacks
Physical Layer
This layer requires protection by a strong and custom made firewall. The fire wall will be protecting the actual data in its raw form. It can be easily corrupted hence; the use of cloud storage where information storage in a remote server is implemented. Accessing such information will require strong passwords and security questions to ensure it is controlled by the right people.
References
Blobel, B. (2002). Analysis, design and implementation of secure and interoperable distributed health information systems. Amsterdam: IOS Press.
Gregg, M., & Watkins, S. (2006). Hack the stack: Using snort and ethereal to master the 8 layers of an insecure network. Rockland, MA: Syngress Pub.
Newman, R. C. (2010). Computer security: Protecting digital resources. Sudbury, Mass: Jones & Bartlett Publishers.
Whitman, M. E., & Mattord, H. J. (2012). Principles of information security. Boston, MA: Course Technology.
Stuck with your Research Paper?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee