ISOL 532 Phase 2 project telecommunications network

User Generated

tbjgunzz

Computer Science

Description

Phase 2 Document Name: YourName_ISOL532_Practical_Connection_Phase_2.docx

Mechanics (same as Phase 1 with differences highlighted):

  • Heading 1 Topic: Telecommunications and Network Security Protocols implemented by your company
  • 1 to 3 single spaced pages, which are added to your Phase 1 Deliverable
  • At least 2 additional referenced sources
  • Be sure to update your TOC and Bibliography
  • Upload the Deliverable to the Final Project dropbox
    • Host and Nodes
    • IPv4 verses IPv6
    • Firewall
    • Virtual Private Network (VPN)
    • Proxy Servers
    • Network Address Translation (NAT)
    • Routers, Switches, and Bridges
    • The Domain Name System (DNS)
    • Intrusion Detection Systems and Intrusion Prevention Systems (IDS/IPS)
    • Network Access Control

Content: Each topic below should be a Heading 2 paragraph (You should describe 3 of the listed components)

  • Phase 2 Deliverable:
    • Content
      • Heading 1 title present and correct
        • Heading 2 titles present, correct and prose added
    • Mechanics: (See Above)
      • 1 to 3 additional single-spaced pages
      • The Table of Contents formatted correctly follows the Cover page and is updated to reflect Phase 2 additions
      • The Bibliography is the last page formatted correctly and updated to reflect Phase 2 additions
      • At least 2 additional APA referenced sources with in-text citations

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running Head: TELECOMMUNICATION AND NETWORK SECURITY PROTOCOLS.

Telecommunication and network security protocols implemented by Gowtham
telecommunications network.
Name of the course:
Name of the institution:
Name of the student:

1

TELECOMMUNICATION AND NETWORK SECURITY PROTOCOLS.

2

Telecommunication and network security protocols implemented by Gowtham
telecommunications network.
Firewall.
Firewall prevents an organization network from any form of unauthorized access and
disclosure of information (Kaur, Malhotra, & Singh, 2014). With the increased cases of hacking
and eavesdropping, companies must implement a strong firewall to protect its data and clients
from intruders. Many are the times when people visit compromised websites unknowingly which
hackers use as their target to access sensitive data from the visitors. It’s the work of the firewall
to ensure that it blocks all attempts to gain access to any information that might compromise the
privacy policy of the company. This process is achieved by setting and changing the default
passwords that are familiar to the hackers and easy to guess. The process should be conducted by
experts who clearly understand the specific location where to set the firewall systems. Firewalls
are implemented depending on the use but best location should be between the company’s
network and the internet service provider. The reason for choosing firewall over other antiviruses
is because of the ease of firewalls to update and offer wide range of protection which cannot be
easily compromised. To ensure that no form of intrusion could succeed past the firewall, a deep
packet inspection should be put in place to analyze and decrypt all form of data send to and from
the organization.
The firewall is also set to block all websites that it identifies as a threat to the
organization privacy. Many of the empl...


Anonymous
Great! Studypool always delivers quality work.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags