Password reminder
To register place your 1st order


Unlike most writing services, MarvelousEssays.com provides original, custom-written papers only

order telephone


Cryptography and Network Security

← The Impact of Industrial TechnologyDesigning a Computer System to Replace a Customer’s Employees →

Buy custom Cryptography and Network Security essay

This is a way to address the protection of data networking devices, connections, and the contents and the ability to accomplish the communication functions. Having an effective network security will ensure that the company is safe from malicious intruders, who want to gain access to their vital information.

By using a WAN network Cleveland, the office should put in place security measures which will ensure that its information is not accessed by unauthorized people.  The office should therefore develop security policies that will ensure that the information and networks are prevented from any illegal access. These policies would include the use of passwords, acceptable use and identity of the people using their network. This will ensure that only trusted personnel can access the network, assured that they cannot compromise the network (Kahate, 2003). There are various ways through which the office can be able to ensure that the network is safe from being accessed by malicious people:

Use of firewalls

This is computer software which protects the system by blocking all unnecessary ports and only allows traffic to flow from known ports, and in the right direction. This is important software, which should be used in any organization committed to protect its network from being accessed by intruders, and gaining access to the company’s information.


The switch should be configured in such a way that it only allows specific format of packets to flow in and out of it.


Its main purpose is to provide packet routing can be configured in a special way. This way, it can be used as a defense for protecting the network from the unauthorized access. This configuration will make the router to block or filter the forwarding of packet types

Use of strong antivirus

The Antivirus software detects viruses and ensures that they do not invade the computer or the server. The antivirus should be kept up-to-date as expired antivirus is not able to detect newer versions of viruses. The office should be able to evaluate the best antivirus to use as there are many antivirus soft wares available, and some maybe not effectively protect the computer.

Use of wildcard mask

This shows which part in the IP address that a particular user should access. They indicate which IP addresses has been accessed. The office should ensure that the IP addresses they allow or permit are from trusted sites which might not compromise the network.

Access control list

This is a table that instructs the operating system as to which access right every user has in a particular system object like the file directory. This filtering of traffic will be helpful in protecting the network as it will ensure that the required personnel are the ones accessing the network. This should be configured for the entire routed network.

If Cleveland office will be able to put all the above measures to their network, they will be able to reduce the chances of their network from being compromised by any unauthorized persons. The office should also have a network administrator who is competent enough to monitor the network. This will make it possible to know when the network has been compromised and necessary measures taken as soon as possible to reduce the chances of the network being compromised any further.

The protection devices and software which are going to be put in place should be working properly. Any malfunction of any of the devices and software used for protection purposes will lead to the network being compromised. The office should ensure that the devices and software are in a working condition as they might be put into place and yet they are not functioning leading to the illusion that the network is protected and in the real sense it is not.

Buy custom Cryptography and Network Security essay

Related essays

  1. Designing a Computer System to Replace a Customer’s Employees
  2. Computer Build
  3. The Impact of Industrial Technology
  4. Technological Innovation in the World History Before 1500
order now

Get 15% off your first custom essay order.

Order now

from $12.99/PAGE