Network Security Policy: Best Practices White Paper. Retrieved January 19, 2014 from http://www.cisco.com/en/US/tech/tk869/tk769/technologies_white_paper 09186a008014f945.shtml Easttom, C. (2012). Computer security fundamentals. Indianapolis. Pearson.
Cloud computing service models, part 1: Infrastructure as a service. developerWorks. Retrieved March 7, 2014, from: http://www.ibm.com/ developerworks/cloud/library/cl-cloudservices/iaas/. Walker, G. (2010, December 17). Cloud computing fundamentals: A different way to deliver computer resources.
New Jersey: Prentice Hall. Wagner, D. (2011, November 1). The Brick & Mortar Retail Store of the Future. Retrieved March 7, 2014, from http://www.enterpriseefficiency.com/author.asp?section_id=1151&doc_id=235188&piddl_msgpage=2#msgs Wagner, M. (2007, September 21). The Future Of Virtual Worlds.
Informatica Economica, 17(4), 109-122. The Virtualization Practice. (2014). Presentation Virtualization. Retrieved from The Virtualization Practice, Virtualization & Cloud Computing News, Resources, and Analysis: http://www.virtualizationpractice.com/topics/presentation-virtualization/ Tittel, E., & Lindros, K. (2013, December 16).
Six Benefits of IPv6. Network Computing. Retrieved March 28, 2014, from http://www.networkcomputing.com/ipv6/six-benefits-of-ipv6/230500009 Odom, W. (2012). CCENT/CCNA ICND1 640-822 official cert guide (3rd ed.). Indianapolis, IN: Cisco Press.
DNS - Domain name system. Retrieved from http://compnetworking.about.com/cs/domainnamesystem/g/bldef_dns.htm Rosato, R. (2014). Best practices for applying service packs, hotfixes and security patches. Retrieved from http://technet.microsoft.com/en-us/library/cc750077.aspx Rouse, M. (2007). DMZ (Demilitarized zone).
The world is in another cold war, except this time countries are battling for cyber supremacy. Cyberspace is a massive land of ever changing technology and personal interaction (McGuffin and Mitchell 1). Cyberspace is not only a place that people post pictures and update their profile, but it also plays an enormous role in running a country. Advanced countries use computers to guide their military, keep track of citizens, run their
Decoded Node. [Online] Available at: http://sapphirepaw.blogspot.co.uk/2012/02/tls-nee-ssl-and-ssh-compact-comparison.html [Accessed 24 March 2014]. Tang, A., 2013. Pros and Cons of SSH Disclosed. [Online] Available at: http://besthostingsearch.net/tutorial/ssh-pros-cons/ [Accessed 26 March 2014].
In this modern day and age of computing, networks are a huge part of IT. It is important now more than ever that data sent over any network, whether it be a LAN (Local Area Network) or WAN (Wide Area Network; The Internet) is kept safe, private (when required) and uninterrupted in terms of transmission. If data transmission is interrupted or data and information within the data is stolen when it is being transmitted this can have devastating effects depending on what the data or information relates to e.g. companies classified customer information. An actual instance of this is when a group of hackers deemed ‘Annonymous’ hacked Sony’s PlayStation Network servers and managed to gain access to millions of their customer’s details.