A SUGGESTIVE STUDY FOR DESIGN AND IMPLEMENTATION OF A NETWORK SECURITY
Journal: International Journal of Advanced Research in Engineering and Technology (IJARET) (Vol.10, No. 1)Publication Date: 2019-01-31
Authors : D. Chitra C. Karthick;
Page : 286-293
Keywords : Network design; LAN; Security; VPN; Active Directory;
Abstract
For legal and strategic purposes, any of our information must be shielded against unwanted disclosure; all of the information we retain and respond to must be secured against unintended or intentional modification and must be accessible in a timely manner. We must therefore ensure that the accuracy (correct attribution) of documentation we make, deliver, and obtain is established and maintained. Finally, if improper security procedures result in device disruption, we could face criminal or civil court action; if our incompetence causes third persons to be injured as a result of our corrupted networks, we may face far more serious legal issues. Another problem that is surfacing in e-commerce is that strong protection is finally being recognised as an important component of business growth. Consumers have raised common fears about data protection and privacy; businesses who invest in good security will exploit their investment to expand the pool of potential customers and grow their market share. We no longer have to consider protection only in terms of damage prevention: in today's economy, strong security is a strategic benefit that can directly add to sales estimates and the bottom line. Today's networks support mission-critical enterprise systems and must be protected against external and internal attacks. We suggested a stable network and device architecture and implementation utilising the Windows framework in this article. Reviews of the most recent product for an appeal to a multinational corporation are given. The concept and implementation of a network protection model utilising routers and firewalls was presented. This paper also looked at network security flaws in router, VPN and firewall network hardware, as well as the types of threats and how to react to them, as well as how to deter attacks and hackers from gaining entry to the network. This paper also includes a guideline for determining whether or not a network follows best standards in network protection and data confidentiality. The primary goal of this study is to safeguard the network against Active Directory, bugs, risks, assaults, programming flaws, and security policy flaws.
Other Latest Articles
- ENUMERATING THE FAULT IN POWER SYSTEM: A STUDY
- EXAMINING THE EFFECTIVENESS OF CLOUDLETS IN MOBILE COMPUTING
- A STUDY OF LIPID PROFILE IN ANAEMIA
- ADAPTIVE DISTRIBUTED DETECTION USING SOFT DECISION REPORT IN MOBILE ACCESS WIRELESS SENSOR NETWORKS UNDER BYZANTINE ATTACKS
- WHAT ELEMENTS CONTRIBUTE TO IMPROVING BRAIN CANCER TREATMENTS?
Last modified: 2022-03-09 21:50:10