I’m going to post my final discussion for week eleven early. But first, I want to take this moment and Congratulate everyone who have made it this far. Please take a few minutes of your time, and appreciate all the people (families, friends, best friends, pets, workmates, supervisors, boss, etc) who have been there with you when times are tough. I’m very, very proud to all of you guys, seriously!
Many of us here already have a basic understanding of how the data is sent. And travel to the other host without the security being compromised. We also better understand how switches, routers, modem, firewalls, wireless access points, even the conceptual model of OSI and TCP/IP layers are. There’s so much thing to mention what are the things that I’ve learned; reading most of my classmate’s weekly discussion post, the book that was provided, the assignments, projects, and labs gave me a better network security mindset whenever I collaborate with the Security team. After all, our job is to ensure that the multilayer protocols are correctly in place, considering converged protocols (MPLS and fiber channel over ethernet). And setting up realistic expectations to meet our client’s needs (we can’t just put a bunch of higher-end networks here, and there have to be some considerations — budget, approval, etc.). Also, the course taught me more on how to look the holistic view on how to scale the organization’s network architecture (for example; ISP, gateway, core, access, and devices must play a certain role in order for them to work together). In the end, I was able to put my managerial hat and looking the big picture;
How many wire devices and wireless devices we have?
What services do we need to connect, ports/protocols, type of security our client they’ll need (surveillance, authorization, control system, etc.).
Site survey the floor plan for initial network and security design (understand requirements from ISP).
How can we protect ourselves from possible wired, wireless, bluetooth, tethering, and other attacks that can cause an havoc, before and after the network security design?
How often we’re going to release the training regarding to the network security, budget, procurement of IT assets, and our network goals.
I’m already a huge fan of owning myself some network appliances, after I discover that relying to your ISP is not a good choice in the long run. For us IT professionals, don’t we love to configure our own stuff :)? owning your own router, switch, modem can give you so much freedom to customize. It’s cost-effective in the long run, no more ISP throttling (better bandwidth prioritization, awesome networking tools, and so much more. Also, did you know that having your own ISP router can pose some serious vulnerability risks? For example, bob a hacker can gain access to your home network favorite ISP using the same backdoor channels our beloved ISP provided us. Once the router’s back door is breached, all of the information that flows through our home network is at risk to bob. I’m not saying to just immediately replace your ISP devices and buy your own. This can be an hustle for someone as some of us don’t have time to configure our own. For starters, it’s always recommended to change the default user name and password whenever your receive your network devices from the ISP, change SSID (don’t use any personal related information).
For someone unfamiliar with the network security design, I’m assuming they already have networking fundamentals. A few years ago, before I started my journey in the World of I.T, I remember my mentor told me that “learn the components and security of the infrastructure first before you can design it.” It does make sense; you don’t want to let someone relatively new in the field make him or her design anything. Ensure that person knows how to secure the network first; CIA triad, segmentation, security policy enforcement, identity and trust, and resiliency. Also, it explained how using multiple options for network security can better layered security (defense-in-depth). Once that person understands how network and security work together, we can talk about the design and how it can affect the business. One of the most significant benefits of network security and design in the business; secured collaboration among departments, streamlined business processes, and improved customer relations.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more