Explore BrainMass

Networking Questions

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

1. Based on the Ainsworth (2007) article, are network security best practices only based on implementing hardware and software solutions? If not, how can one of these network security best practices be customized to the needs or risks present in an organization? How are the risks to a particular organization discovered or established?

2.Based on the Friedlander et al. (2007) article, what are DNS and DNSSEC? Can DNSSEC be implemented effectively by the U.S.?

3. What are some things we need to evaluate when protecting our network?

4.What purpose does a firewall play in an organization?

© BrainMass Inc. brainmass.com October 25, 2018, 2:04 am ad1c9bdddf


Solution Preview

Answer: According to article, network security best practices goes beyond hardware and software. Aside from using hardware and software security tools such as antiviruses and firewall, it is also important to implement security policies within the enterprise, do background checking when hiring employees, provide security awareness training to employees regularly, and have a good plan for administering security levels to different kinds of employees. These practices can be tighten by a company who is a large scale enterprise working on very sensitive information, like a research facility, or large scale financial company. With the use of security tools for detection, risks can easily be discovered and can be addressed immediately. Intruder alarms, security locks and surveillance equipment can provide physical ...

Solution Summary

This posting contains answers to the given questions.

See Also This Related BrainMass Solution

Wireless Networks Question

Please help with the following problem.

Mobile IP was intended to work with legacy correspondent hosts and legacy applications. However, some advantages may be gained if correspondent hosts are aware of mobility in certain ways.

a) If a correspondent host is able to do IP-in-IP decapsulation, it may be able to communicate more efficiently with the mobile host despite the presence of ingress filtering. Why?

b) If a correspondent host is able to do IP-in-IP encapsulation, it may be able to communicate more efficiently with the mobile host than is possible with standard Mobile IP. Why?

View Full Posting Details