School of Computing and Technology

Networks are the arteries of modern business and are vital for sharing information and communication both inside and outside the organization. In today’s fast-changing and often risky business environment, it is critical for IT to effectively secure systems – a process that is both costly and time-consuming. At the same time, IT managers are expected to enhance worker productivity and implement new technologies that drive competitive advantage for the business.This project describes how, by adopting an organized approach to security,  IT managers will spend less time cleaning up messes and more  time helping their organization meet its goals.This project will also look at some history of networking, as well as an introduction to TCP/IP and internetworking.

We go on to consider risk management, network threats, firewalls, and more special-purpose secure networking devices. This will help me to identify and evaluate the network security needs of the company in question.Objectives1.

Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
4,80
Writers Experience
4,80
Delivery
4,90
Support
4,70
Price
Recommended Service
From $13.90 per page
4,6 / 5
4,70
Writers Experience
4,70
Delivery
4,60
Support
4,60
Price
From $20.00 per page
4,5 / 5
4,80
Writers Experience
4,50
Delivery
4,40
Support
4,10
Price
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

      Research and evaluate network security considering methods that could be used to protect corporate systems2.      Research and evaluate network systems strategy and evaluate the company’s systems against current best practices3.      Review current company policy and procedures4.      Analyze, design and develop methodology to improve network security within the company.5.

      Produce set of recommendations based on the methodology to improve the company’s network security.6.      Evaluation of the project and the application of the research7.      Produce a dissertation.ConstraintsAvailability of the sponsors or any other constraints you might envisage.ResourcesAccess to network security materials, books and journalsPCReportingTo the sponsorKeep in contact  via e-mail with University supervisor