preview

Design And The Technologies Used

Decent Essays

In depth defense network design.
 Design a defense in depth network. Research the latest technology such as firewalls, IDS, IPS, VPN, Virus Protection, and Malware Protection. Describe your design and the technologies used. Defend your design and provide a logical diagram of the system.
When it comes to network defense, there is never a safe zone where a network is prone to attacks, which is why it is always a good idea to make use of the in-depth strategic defense. This is a coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. This type of defense makes it difficult for an enemy to get into, because of its complex and multilayered defense system (Rouse, 2007). Defense in depth minimizes the probability that the efforts of malicious hackers will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network. Some of the things that make up a defense in depth are antivirus software, firewalls, anti-spyware, strong passwords, intrusion detecttion, biometrics and much more (Rouse, 2007).
The first thing that comes to mind in designing an in depth defense network is access control and authentications. Which means that we will be dealing with firewalls, which will be used to protect the servers, segments and subnets. This first step will establish an industrial demilitarization zone,

Get Access