How to build a secure virtual network

Assignment Help Basic Computer Science
Reference no: EM13935810

How to build a secure virtual network?

This report is based on the concept of virtual network. Today various new technologies have been introduced to fulfill various requirements of the users. As much as technologies are developed the security issues are also increasing. Network security is the major concern today. This report is based on the concept of security of virtual network. In this report we will discuss about that how a secure network can be built. In this report we will discuss about various methods that how security of virtual network can be achieved and what are the various challenges that will be encountered while building virtual network.

Introduction

Motivation

Network security is the major concern today. By getting information about that how virtual network can be secured, it will be better to user wireless applications such as hot spot etc.

Problem Summery

Today server virtualization technologies have been increased to consolidate the physical servers to provide help to various organizations in centralized their data and information. In this case security is very much necessary of those technologies. The achievement of this security is the major concern.

Motivations

Problem History

Not from today but the problem of virtual network security is the basic problem from many years. In past few years various network attacks such as denial of service attack and hacking has been faced by network users. These problems are still continuous.
Problem Interest

The main thing of this problem is that how this virtual network can be protected, because for organization security of virtual networks is big issue.
Problem solution

To protect the virtual networks various security tools are used such as traffic monitoring analysis, Automatic and on-going assessments of virtual network, detection of intrusion and prevention through LAN firewall. But still some security issues are faced by the network issues because various new attacks are implemented by the hackers. (David Marshall, V. ,2008)

Possible improvements

Besides above discussed improvements various other advance solutions are available that can be used handle the security of virtual networks such as server based network access control and network authorization. (Stravarius, J. ,2014)
Project Details

Architecture and Environment
To handle the virtual environment some security platforms that can be provided secure environment for achieve networking are listed as below:

· Compatible virtual environment is VMware.
· Compatible operating system which have related infrastructure
· Compatible network ecosystem elements.

Software and hardware tools
To build a secure virtual network following hardware and software tools are required:

Hardware Tools
· Switches and Network Adapters(Network Interface Card)
· Network Storage devices
· Telecommunication Devices
· Mobile elements such as Laptop, tablet computers and smart phones

Software Tools
· Firewalls and Load Balancer
· Virtual LANs and Virtual Machines

Issues and challenges

There are various issues that are occurred in the virtualization network are listed as below:
· Lack of visibility and awareness in virtual environment
· Maintenance of regulatory compliance
· Security issues for mobile server
· Activation for stored material

Deliverables

Virtual network can provide help to achieve the stored information and data over the remote network. Server virtualization can be achieved properly by the virtual networks.

In this conclusion we can say this network is important in both cases whether virtual network or other network. To maintain the network security above discussed security tools must be used by the network developers.

Reference no: EM13935810

Questions Cloud

How banter can attempt to reduce its economic exposure : Of its revenues, 60% are due to exports to the US, where its product is invoiced in dollars. Explain how Banter can attempt to reduce its economic exposure to exchange rate fluctuations in the dollar.
What kind of vaccine would be the best for a virus : What kind of vaccine (live, dead, whole, viral protein, etc) would be the best for a virus that causes a mild disease in individuals with a heavy cytolytic response and severe to individuals who produced a primarily antibody response? Ideas are ge..
Enron story-theories of leadership : How can what happened at Enron be explained by some of the theories of leadership that you have looked at?
Create a flowchart in powerpoint : I created the program as best I could using what I have learned so far, but it won't run. I also am confused as to how to create a flow chart in some other program to accompany it. Here are my problems:
How to build a secure virtual network : This report is based on the concept of virtual network. Today various new technologies have been introduced to fulfill various requirements of the users. As much as technologies are developed the security issues are also increasing. Network secur..
Determine which colonies might contaminants on streak plate : What are three reasons one might a situation in which bacterial colonies are found on the first section of a streak plate, but not on sections two and three?
Explain the loops in detail : Even should only be reading for the FOR Loop. I tried moving it around and it won't work so I don't know how to fix it to not show on the DO..WHILE Loop and the WHILE Loop
How uva ltd can reduce economic exposure to exchange rate : Its sales to Thai customers are denominated in baht. Explain how UVA Ltd can reduce its economic exposure to exchange rate fluctuations.
Why do hcos strive for transformational styles : Why do high performing HCO's strive for transformational styles? Is this just the current fad or is there another that you would suggest

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Creating relational databases

Consider the following set of database tables. The diagram shows a database made up of 6 tables with all primary keys underlined. Please take note of foreign keys (most of them carry the same names as the corresponding primary keys they reference)..

  Program to randomly select three numbers

Write a program to randomly select the numbers of 3 finalist to recieve a prize. Make sure not to pick the same number twice.

  A _______ is a set of commands

A _______ is a set of commands

  Maintain multiple databases for the two companies

Maintain multiple databases for the two companies

  Travel guidebook from amazon

The Customer receives a Travel Guidebook from Amazon, then reads the book and chooses locations. The Customer also views locations on Google Maps using the Map Program as well as the Earth and Satellite Master files.

  Involved in implementing a database for the restaurant

Draw a conceptual ER diagram in Information Engineering format as discussed in the course that  describes the following aspects involved in implementing a database for the restaurant.

  Use to create style sheets for your web pages

Write a 2-3 page essay that compares the features of two different CSS software packages and describe which you as a web designer might use to create style sheets for your Web pages and why. Explain the benefits of using CSS in developing your web..

  The data layer class

The Data Layer class for your application. The Data Layer class should implement the functionality needed to find user account information; update account info;

  Given two variables is_empty which is associated with a bool

Given two variables is_empty which is associated with a bool

  Find the sum of a fibonacci series upto n terms

Find the sum of a Fibonacci series upto n terms, where n is the input of a Matlab program using for loop. First term i.e. F1=1 and Second term F3=1.uestion here

  Following class definition

Given the following class definition, describe the type of variables used by the arguments and return values of the following member functions (values, pointers, or references):

  Which of two alternatives you should pursue

The WBS identifies all of the work that must be done to complete the project

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd