preview

Nt1310 Unit 3 Application Paper

explanatory Essay
771 words
771 words
bookmark

Identify hardware and software needed to secure your choice of networks against all electronic threats. To manage Riordan branches nationally and internationally they have put the best networks in place to interconnect these offices. Recent Cyber Threats has taught us a lesson on securing our information. Therefore they put up both hardware and software infrastructure to protect their networks from all forms of electronic threats. Hardware was put in place in their network to enhance network security include: Routers, physical locks and firewalls. Riordan has also established a secure server where sensitive information about the organization is kept. Routers are network processors with powerful security capabilities. Riordan has put in place CISC routers which are responsible for forwarding packets to and from the organization to networks connected to the internet. They have configured …show more content…

In this essay, the author

  • Explains how riordan has put up both hardware and software infrastructure to protect their networks against all forms of electronic threats.
  • Explains that riordan's network security hardware includes routers, physical locks, and firewalls. they also established a secure server where sensitive information is kept.
  • Explains that riordan has put in place cisc routers which are responsible for forwarding packets to and from the organization to networks connected to the internet.
  • Explains firewalls have been established in devices such as routers and switches to prevent access to the network via unused ports. all network processors are configured to detect all incoming connections and check to make sure they are authentic.
  • Explains the use of physical locks to protect server rooms and switch panels from unauthorized access and cctv cameras to monitor all attempts to break into these areas.
  • Explains sophos is one of the most powerful network antivirus software on the market. it prevents malicious applications and devices from being inserted into the organization’s workstations.
  • Compares local area networks (lans), wide area networks (wans) and wireless technologies.
  • Explains wireless networks use radio waves to establish connection to network devices to connect to the internet or to workplace. they are less costly than wired networks because it doesn't require many devices such as cables.
  • Explains that riordan manufacturing employs all three technologies in networking. offices and branches are networked using lan technologies and interconnected using wireless networks by microwave radio waves.
  • Explains the concepts and building blocks of today's data communication networks, such as switches, routers, and cabling.
  • Explains that switches have evolved over time to accommodate more workstations while providing excellent security services at relatively fast speeds, thus increasing network reliability in terms of response to requests.
  • Explains that fiber optic cable has provided excellent features though it comes with huge installation and maintenance cost.

Data communication refers to the process of transmitting digital information from one point (usually a sender) to another point (usually the receiver) over computer networks. These networks are built with devices such as routers and switches to enhance network performance. Routers have been designed with capabilities to route packets at faster speeds while ensuring the security of the information. In addition, latest routers have firewall features to authenticate users in the network. Switches also have evolved over time. They have been designed to accommodate more workstations while providing excellent security services at relatively fast speeds, thus increasing network reliability in terms of response to requests. Also, switches have been designed to accommodate the POE property that is power over Ethernet to enhance use of devices that cannot be connected directly to power like VOIP phones which facilitate information flow and communication within

Get Access