Corporate Network : Security Aspects
Every corporation using IT technologies needs a good and carefully secured network design. The IT security is a key factor of a normal functional of the whole corporation and all its sections. There different methods and concepts for providing different level of IT security. Some of them are very im...
Main Author: | |
---|---|
Format: | Others |
Language: | English |
Published: |
Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM
2010
|
Subjects: | |
Online Access: | http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-8924 |
id |
ndltd-UPSALLA1-oai-DiVA.org-lnu-8924 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-UPSALLA1-oai-DiVA.org-lnu-89242016-02-23T05:05:41ZCorporate Network : Security AspectsengNikolov, NikolayLinnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFMComputer Systems and Networks2010design examplese-mail servicesweb servicesdns servicesdhcp servicesldap servicesroutersfirewallsharderingsecurity technologiesRADIUSOTPPKIIDSACLscryptographyEvery corporation using IT technologies needs a good and carefully secured network design. The IT security is a key factor of a normal functional of the whole corporation and all its sections. There different methods and concepts for providing different level of IT security. Some of them are very important and should be implemented in every corporate network. There are a lot of services providing inside and outside the corporation network. Increasing the number of services like web services, mail services, file services and other, the number of eventual security issues is rising. The security methods of each of provided services are different and it is required a professional with deep knowledge about this service functionality if it is needed to be good applied. Operation system and application hardering are methods which are not so hard for applying, like configuring proxy server or firewalls, but they could increase the security drastic. In a combination with simple configured security devices, the results could be very impressive. Choosing the right methodology and framework of designing a secured network is important part of entire process. With the right methodology designing could be easier and more effective. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-8924application/pdfinfo:eu-repo/semantics/openAccess |
collection |
NDLTD |
language |
English |
format |
Others
|
sources |
NDLTD |
topic |
design examples e-mail services web services dns services dhcp services ldap services routers firewalls hardering security technologies RADIUS OTP PKI IDS ACLs cryptography |
spellingShingle |
design examples e-mail services web services dns services dhcp services ldap services routers firewalls hardering security technologies RADIUS OTP PKI IDS ACLs cryptography Nikolov, Nikolay Corporate Network : Security Aspects |
description |
Every corporation using IT technologies needs a good and carefully secured network design. The IT security is a key factor of a normal functional of the whole corporation and all its sections. There different methods and concepts for providing different level of IT security. Some of them are very important and should be implemented in every corporate network. There are a lot of services providing inside and outside the corporation network. Increasing the number of services like web services, mail services, file services and other, the number of eventual security issues is rising. The security methods of each of provided services are different and it is required a professional with deep knowledge about this service functionality if it is needed to be good applied. Operation system and application hardering are methods which are not so hard for applying, like configuring proxy server or firewalls, but they could increase the security drastic. In a combination with simple configured security devices, the results could be very impressive. Choosing the right methodology and framework of designing a secured network is important part of entire process. With the right methodology designing could be easier and more effective. |
author |
Nikolov, Nikolay |
author_facet |
Nikolov, Nikolay |
author_sort |
Nikolov, Nikolay |
title |
Corporate Network : Security Aspects |
title_short |
Corporate Network : Security Aspects |
title_full |
Corporate Network : Security Aspects |
title_fullStr |
Corporate Network : Security Aspects |
title_full_unstemmed |
Corporate Network : Security Aspects |
title_sort |
corporate network : security aspects |
publisher |
Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM |
publishDate |
2010 |
url |
http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-8924 |
work_keys_str_mv |
AT nikolovnikolay corporatenetworksecurityaspects |
_version_ |
1718196156182298624 |