Total Length: 1551 words ( 5 double-spaced pages)
Total Sources: 8
Page 1 of 5
Conclusion
The purpose of this discussion was to examine the network security measures that are available. The research found that the proper configuration provides the first line of defense as it relates to securing a network.
In addition, firewalls serve an essential role in securing networks against outside intrusions. The research also indicates that anti-virus software, encryption software and biometrics allow organizations to secure networks in a more comprehensive manner. There are also specific strategies and technologies that should be considered if an organization chooses to use a wireless network.
References
Davis J.P.(2006) Telecommute Safely: Use Internet Technology to Keep Cost Down. Contributors: - author. Journal Title: Journal of Accountancy. Volume: 202. Issue: 2. Publication Year: 2006. Page Number: 39+.
Hoover M. (2005) Network Security: The New Perimeter; Security Threats Can No Longer Be Contained in the DMZ. How Do You Protect Every Resource, and Every User's Traffic, No Matter Where it's Coming From?.Business Communications Review. Volume: 35(7). Page Number: 40+.
Intel Glossary. Retrieved November 7, 2007 at http://www.intel.com/products/glossary/body.htm
Karygiannis T. & Owens L., 2002. Wireless Network security. National Institute of Standards in technology. Retrieved November 7, 2007 at http://csrc.nist.gov/publications/nistpubs/800-48/NIST_SP_800-48.pdf
Olzak Tom. May 2006. Strengthen Data Protection with Network Access Controls.
Retrieved November 7, 2007 at http://www.windowsecurity.com/uplarticle/NetworkSecurity/Network_Access_Controls.pdf
Security recommendations for a VPN. Microsoft. Retrieved November 7, 2007 at http://www.microsoft.com/technet/isa/2004/help/fw_VPNIntro.mspx?mfr=true
Stallings W. (2006). Cryptography and Network Security. Prentice Hall College.
Vacca, J.R. (2006) Guide to Wireless Network Security. Springer: New York......