project phase 3 gowtham

User Generated

tbjgunzz

Computer Science

Description

Phase 3 Document Name: YourName_ISOL532_Practical_Connection_Phase_3.docx

Mechanics (same as Phase 2 with differences highlighted):

  • Heading 1 Topic: Recommendations to improve or add to Telecommunications and Network Security Protocols. (As a Security Consultant and based on what you have learned in this course, how would you improve your company’s Telecommunications and Network Security Protocols.
  • 1 to 3 single spaced pages, which are added to your Phase 2 Deliverable
  • At least 2 additional referenced sources
  • Be sure to update your TOC and Bibliography
  • Upload the Deliverable to the Final Project dropbox
    • Improvement 1
    • Improvement 2
    • Improvement 3


Content: Each suggested topic below should be a Heading 2 paragraph (You should have at least 6 topics)

Directions:

Using an application such as Microsoft Word, based on your reading and supplemental research please complete the project as outlined above. Each Deliverable is to be uploaded to the Final Project dropbox by the due date (see syllabus). All three Deliverables are to be posted to the same dropbox. You may re-submit a Deliverable if your professor offers the opportunity in the feedback.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Please let me know if there is anything needs to be changed or added. I will be also appreciated that you can let me know if there is any problem or you have not received the work Good luck in your study and if you need any further help in your assignments, please let me know Can you please confirm if you have received the work? Once again, thanks for allowing me to help you

Running Head: TELECOMMUNICATION AND NETWORK SECURITY PROTOCOLS.

PRACTICAL CONNECTION
Gowtham reddy sudini

PROJECT PHASE 2
INFORMATION TECHNOLOGY.
ISOL532 spring 2019

1

TELECOMMUNICATION AND NETWORK SECURITY PROTOCOLS.

2

Telecommunication and network security protocols implemented by Gowtham
telecommunications network.
Firewall.
A firewall prevents an organization network from any form of unauthorized access and
disclosure of information (Kaur, Malhotra, & Singh, 2014). With the increased cases of hacking
and eavesdropping, companies must implement a secure firewall to protect their data and clients
from intruders. Many are the times when people visit compromised websites unknowingly which
hackers use as their target to access sensitive data from the visitors. It’s the work of the firewall
to ensure that it blocks all attempts to gain access to any information that might compromise the
privacy policy of the company. This process is achieved by setting and changing the default
passwords that are familiar to the hackers and easy to guess. The process should be conducted by
experts who clearly understand the specific location where to set the firewall systems. Firewalls
are implemented depending on the use, but the best location should be between the company's
network and the internet service provider. The reason for choosing a firewall over other
antiviruses is because of the ease of firewalls to update and offer a wide range of protection
which cannot be easily compromised. Hence, to ensure that no form of intrusion could succeed
past the firewall, a deep packet inspection should be put in place to analyze and decrypt all type
of data sent to and from the organization.
The firewall is also set to block all websites that it identifies as a threat to the
organization privacy. Many of the employees lack basic knowledge of how a suspicious website
would look like or even the risk they might cause to the company by visiting the suspicious sites.
Subsequently, to increase productivity within the company, the firewall can also be set to block
specific inappropriate content that distract employees when at work. Besides to protect the
company's website from unwanted traffic that might bring down the web server, the firewall is
configured to provide denial of service (DOS) to the attacker. It’s through flooding the
company’s website wi...


Anonymous
This is great! Exactly what I wanted.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags