Preview

Network Architecture And Analysis: Request For Proposal: Response

Good Essays
Open Document
Open Document
1032 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Network Architecture And Analysis: Request For Proposal: Response
Assignment 1: Request for Proposal – Response
Alvin D. Solone
CIS 532
Network Architecture and Analysis
Professor Edwin Otto
Strayer University
July 6, 2013

Prepare an opening statement that specifies your organization’s capabilities to manage a deployment of this size. We would like to take this time to introduce our company Interchange Network Design (IND). We are a multi-million dollar network design company that has the capabilities of handling small to large size network build outs and our specialty is Internetworking of networks on a medium to large scale. We have just finished the merging networks between (XOBNI, 2013) and (Yahoo, 2013). The interconnecting of the networks made it easier for the two companies to communicate via use of Intranet and Instant Real-time Messaging. Xobni also has a strong platform when it comes to using its email service and merging Yahoo networks with this was a very huge challenge for us to accomplish.
…show more content…
We pride ourselves in security, prevention and education. The education is for the users of the network in order for them to understand how to operate the network and to identify possible vulnerabilities. Prevention aids the security of the network in order to limit attacks that it has to prevent. In this day and age security of an organizations network is very important. James Lyne (Lyne, 2013) the Technology Strategist of Sophos states that network security technology has rapidly been changing in a very dramatic form. The growing use of personal devices, SaaS (Software as a Service) and Mobile VPN is just a few of the devices that have changed dramatically in the area of network

You May Also Find These Documents Helpful

  • Powerful Essays

    The proposed network is designed to serve DesignIT which consist 56’x36’ office space, 4 cubicles, 1 office, 1 server room, 1 receptionist desk and 1 conference room.…

    • 768 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Netw410 Week2

    • 716 Words
    • 3 Pages

    The actual business goals for this project is to offer new and better services and support, open the network to key constituents, build relationships and information accessibility to a new level, as a basis for the network organizational model, avoid business disruption caused by network security problems, avoid business disruption caused by natural and unnatural disaster, modernize outdated technologies and reduce telecommunications and network costs, including overhead associated with separate networks for voice, data and video.…

    • 716 Words
    • 3 Pages
    Good Essays
  • Good Essays

    You Decide- Sec572 Week 2

    • 577 Words
    • 3 Pages

    To develop network security strategies that will ensure that the organization's network is protected from both internal and external security risks. A summary of the steps I can take to mitigate the risk in the following areas: Denial-of-Service attacks (DoS), Distributed Denial-of-Service attacks (DDoS), Masquerading and IP Spoofing, Smurf attacks, Land.c attacks, Man-in-the-Middle attacks.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Upgrade letter

    • 297 Words
    • 2 Pages

    Valerie I hope this information helps you in making a good business decision and improves your network performance greatly. If you have any more questions or technicalities you may need advice on, please don’t hesitate in contacting me. I will be more than happy to help you or visit the office for a more in depth analysis.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment

    • 4104 Words
    • 17 Pages

    However, there is growing interest in protocols and other mechanisms for use with novel telecommunications services. Next-generation value-added services are bound to introduce new vulnerabilities. The interaction between all these communications and security protocols, and the mechanisms used for distributed systems security, is fertile ground for both interesting research. Ways to enhance these protection tools to make sure our technology is safe from IT attacks are evolving all the time. The systems or measures used to protect a company system at present might not be of any use in the future as technology is always enhancing to higher levels. Telecommunication businesses tend to be comparatively adept at managing information security risks. And many are taking action to achieve an enhanced level of ongoing insight and intelligence into ecosystem vulnerabilities and dynamic threats. Companies like Celcom must be ready to invest in this expensive research so as to be able to aggressively compete in the intense telecommunication market and to be able to sustain itself in this industry. Today, information security is a discipline that demands advanced technologies and processes, a skill set based on counterintelligence techniques, and the unwavering support of top executives. As telecom operators become more similar to technology companies, they will face a raft of new challenges. Core practices like employee awareness and training, policies and tools to reduce insider risks, and protection of data, including intellectual property, will need to be updated. The confluence of mobility, cloud, and social networking have multiplied risks, yet few operators have addressed these threats or deployed technologies that monitor user and network activity to provide insight into ecosystem vulnerabilities and threats. These…

    • 4104 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    In today’s world, most businesses rely heavily on the use of information technology ad information systems. Corporate communication is usually dependent upon wired as well as wired networks within the company. With these networks being set up in businesses, there has been a major shift in data storage to using computers to store and transfer data instead of the traditional ways of using paperwork and hard copies. Companies can securely share information with other companies through the use of virtual private networks, called VPNs. My current occupation is very technologically driven.…

    • 791 Words
    • 4 Pages
    Good Essays
  • Good Essays

    WFV1 Notes

    • 4474 Words
    • 16 Pages

    IXP Network Technology Associate v2.0, Lesson 1: Introduction to Networking, section "Internet Exchange Point (IXP).”…

    • 4474 Words
    • 16 Pages
    Good Essays
  • Good Essays

    My doctoral study topic focuses on internet security for businesses. Internet security is a broad topic that involves a multitude of theories, beliefs, recommendations, and guidelines. My article selections detailed a synopsis of the government’s responsibility and the end users obligation to internet security. In addition, the annotated bibliographies give the reader a summarization of the article through it 's main focal points. The two articles below are for my doctoral study.…

    • 380 Words
    • 2 Pages
    Good Essays
  • Good Essays

    I previously identified several types of attacks, threats and vulnerabilities that exist with your multilayered network. I have now been charged with the responsibility of developing a strategy to deal with these risks as well as a plan to mitigate each risk to reduce the impact that each will have on your organization.…

    • 1443 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Worldwide Network Security

    • 7779 Words
    • 32 Pages

    The worldwide network security market grew by 6.1% in 2011. The total market, which includes firewall, unified threat management (UTM), intrusion detection and prevention (IDP), and virtual private network (VPN) solutions, reached $7.4 billion in 2011. UTM revenue saw the strongest growth at 17.4% and reached $2.2 billion. The IDP market saw more moderate growth at 4.5%, reaching $1.9 billion. The firewall segment remained the largest component of the market at $2.4 billion but grew only a modest 2.9% over 2010. Revenue from standalone VPN solutions fell 5.3% to $0.9 billion. IDC expects the firewall and VPN segments to remain fairly flat over the forecast period. UTM and IDP solutions will drive the overall market to $10.1 billion in 2016, representing a compound annual growth rate (CAGR) of 6.4%. Other highlights include:  Application awareness and control will continue to be a key feature demanded by organizations to address the ever-blurring line between personal and corporate use of the Web and better enable business processes and productivity.  Further, the "bring your own device" (BYOD) trend will necessarily continue to drive more granularity and context into policy management.  Integrating more advanced malware detection will be one of the key drivers in the UTM/next-generation firewall and IDP spaces.…

    • 7779 Words
    • 32 Pages
    Powerful Essays
  • Powerful Essays

    over 40 years ago, is facing unprecedented challenges in many aspects, especially in the commercial context. The emerging demands for…

    • 8259 Words
    • 34 Pages
    Powerful Essays
  • Good Essays

    A network that is effective today networking enterprise is very critical. Down time as well as performance that is degraded can have a serious impact that can bring operations to a halt. With the importance of networks rising in today’s technology, threats also rise with them as well. Having the ability to keep a network up and running to its maximum ability is not only a job, it’s a business that has responsibility. Having infrastructure security is vital in order to ensure the integrity and stability of the network for Layer 1.…

    • 974 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    TO DESIGN A LAYER 3 MPLS VPN (Multiprotocol Label Switching Protocol Virtual Private Network ) FOR A CUSTOMER WITH DIFFERENT LOCATIONS…

    • 6714 Words
    • 27 Pages
    Powerful Essays