Running Head: COMMUNICATION NETWORK
In modern society, many organizations have experienced data breaches and cyberattacks
that occurred through email phishing, denial-of-service-attack, SQL injection, eavesdropping
attacks or man-in-the-middle attack, and zero-day exploit. These kinds of attacks are used by
hackers or cyber intruders to temper or access critical information of organizations. Cyberattacks often cause business interruption that often led to a loss of profits, tainted business
reputation, and a decline in customer's trust. Having proper security measures help to ensure that
data or information of a company and customers are protected. This paper addresses security
aspects such as enterprise mobility, remote data access, and internal communications.
To properly protect the valuable information of the company, centralized access control
system architecture is used. In a centralized architecture, users access all websites, applications,
and other computing and communication systems from a single profile. Centralized architecture
implies that associated power supplies, control panels, output, input, and reader control modules
for each access device are situated in a central location (Muhamed, Doradla, & Wolter, 2015).
Information assets of a company in a centralized architecture are subject to common or unified
management. Resource allocation in a decentralized architecture for all cells is regulated by a
centralized controller. The work of a centralized controller is to collect CSI for all network links,
process information jointly, and make scheduling decisions for all the cells before forwarding to
Centralized access architecture is good for the company because it has the ability to
control and monitor personnel who enter a secure room. This limits the accessibility to the
company's critical data communication circuits between control modules and access control
panels (Muhamed, Doradla & Wolter, 2015). As a result, it allows the company to properly
monitor how critical information is used. The centralized architecture also enables a centralized
controller to troubleshoot the electronic components of a communication network at a single
control location. It is also easy to track and collect data across a communication network in a
centralized network. Hence, network controllers can easily understand the source of attacks and
look for ways to thwart cyber-attacks.
In a centralized architecture, data redundancy is minimized and data integrity is
maximized because data of a company are managed from one central unit. It also enables system
administrators to make updates, re-organize, change, and analyze data at ease because data are
kept at the same place (Basak, Bhunia & Ray, 2015). Doing maintenance in a decentralized
architecture tend to be cheaper and easier since all websites, applications, and other computing
and communication systems are situated in a central location. It is also easier to identify
vulnerabilities in a centralized architecture. This is because information is subjected to common
or unified management.
Outline of Security Policy
Remote Data Access
The security policy and plans used in remote data access include: users are required to
access information according to their job requirements, performance of illegal activities through
the company's network is prohibited, users are not required to share their login credentials even
with family memb...