Corporate Network : Security Aspects

Every corporation using IT technologies needs a good and carefully secured network design. The IT security is a key factor of a normal functional of the whole corporation and all its sections. There different methods and concepts for providing different level of IT security. Some of them are very im...

Full description

Bibliographic Details
Main Author: Nikolov, Nikolay
Format: Others
Language:English
Published: Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM 2010
Subjects:
OTP
PKI
IDS
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-8924
id ndltd-UPSALLA1-oai-DiVA.org-lnu-8924
record_format oai_dc
spelling ndltd-UPSALLA1-oai-DiVA.org-lnu-89242016-02-23T05:05:41ZCorporate Network : Security AspectsengNikolov, NikolayLinnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFMComputer Systems and Networks2010design examplese-mail servicesweb servicesdns servicesdhcp servicesldap servicesroutersfirewallsharderingsecurity technologiesRADIUSOTPPKIIDSACLscryptographyEvery corporation using IT technologies needs a good and carefully secured network design. The IT security is a key factor of a normal functional of the whole corporation and all its sections. There different methods and concepts for providing different level of IT security. Some of them are very important and should be implemented in every corporate network. There are a lot of services providing inside and outside the corporation network. Increasing the number of services like web services, mail services, file services and other, the number of eventual security issues is rising. The security methods of each of provided services are different and it is required a professional with deep knowledge about this service functionality if it is needed to be good applied. Operation system and application hardering are methods which are not so hard for applying, like configuring proxy server or firewalls, but they could increase the security drastic. In a combination with simple configured security devices, the results could be very impressive. Choosing the right methodology and framework of designing a secured network is important part of entire process. With the right methodology designing could be easier and more effective. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-8924application/pdfinfo:eu-repo/semantics/openAccess
collection NDLTD
language English
format Others
sources NDLTD
topic design examples
e-mail services
web services
dns services
dhcp services
ldap services
routers
firewalls
hardering
security technologies
RADIUS
OTP
PKI
IDS
ACLs
cryptography
spellingShingle design examples
e-mail services
web services
dns services
dhcp services
ldap services
routers
firewalls
hardering
security technologies
RADIUS
OTP
PKI
IDS
ACLs
cryptography
Nikolov, Nikolay
Corporate Network : Security Aspects
description Every corporation using IT technologies needs a good and carefully secured network design. The IT security is a key factor of a normal functional of the whole corporation and all its sections. There different methods and concepts for providing different level of IT security. Some of them are very important and should be implemented in every corporate network. There are a lot of services providing inside and outside the corporation network. Increasing the number of services like web services, mail services, file services and other, the number of eventual security issues is rising. The security methods of each of provided services are different and it is required a professional with deep knowledge about this service functionality if it is needed to be good applied. Operation system and application hardering are methods which are not so hard for applying, like configuring proxy server or firewalls, but they could increase the security drastic. In a combination with simple configured security devices, the results could be very impressive. Choosing the right methodology and framework of designing a secured network is important part of entire process. With the right methodology designing could be easier and more effective.
author Nikolov, Nikolay
author_facet Nikolov, Nikolay
author_sort Nikolov, Nikolay
title Corporate Network : Security Aspects
title_short Corporate Network : Security Aspects
title_full Corporate Network : Security Aspects
title_fullStr Corporate Network : Security Aspects
title_full_unstemmed Corporate Network : Security Aspects
title_sort corporate network : security aspects
publisher Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM
publishDate 2010
url http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-8924
work_keys_str_mv AT nikolovnikolay corporatenetworksecurityaspects
_version_ 1718196156182298624