Describe the lan wan internet intranet and extranet

Assignment Help Computer Network Security
Reference no: EM131123900

1: Jezreel, great post!! Building a network should raise questions, it's not an easy solution and what may work for one, may not work for another, or the same way. And for these reasons: "creating policies are necessary," they should explain:

The why (logic)
The how (processes involved)
The locations (addresses and connections

Documentation saves time, helps trouble shoot, and can help with organization. Another important aspect to consider is data. Class, with your scenarios, please share the following:

Type of data
Protection
Storage?

2: WLAN wireless local area network I think will be my choice network to plan some policy for security. And when I think about it I'm asking for more of a problem. I believe wireless network with signal beginning sent across the air waves is not as secure as a hard wire network. WAN WIDE Area network can send signal across a small city a hard line connection may have a high cost levels compared to the wireless methods.

3: Please describe the following and share which you plan to apply to your scenario?

o Local Area Network (LAN)
o Wide Area Network (WAN)
o Internet
o intranet
o extranet.

Reference no: EM131123900

Questions Cloud

What industry has databases made possible : Explain the impact of databases on businesses. What industry has databases made possible? Give examples of database supported business applications or technology.
Impacts of treatment approach toward aggressive behavior : This paper was prepared for WRTG 391 6361 Advanced Research Writing (2165), taught by Professor Mullenneaux.The impacts of the treatment approach toward aggressive behavior in children and adolescents.
Beaches of what french city in 1940 : The British admiralty estimated that 222 naval vessels and 665 other craft besides private vessels participated in the evacuation of 335,000 men from the beaches of what French city in 1940?
Define three of today important environmental health issues : Describe three of today's most important environmental health issues, either domestic or international. How are these health issues affected by population growth?
Describe the lan wan internet intranet and extranet : WLAN wireless local area network I think will be my choice network to plan some policy for security. Describe the Local Area Network (LAN), Wide Area Network (WAN), Internet, intranet and extranet.
Label the given parts : Label the following parts - Osteon, Concentric lamella, Circumferential lamella, Interstitial lamella and Central canal
Explain the relationship between the environment and health : In 1,000 words, summarize the key issues addressed in this publication; discuss how this publication has contributed to current knowledge and understanding of the dynamic between the environment and health; and explain the relationship between the..
Fmv tax adjusted basis appreciation : Robert and Sylvia propose to have their corporation, Wolverine Universal (WU), acquire another corporation, EMU, Inc., in a stock-for-stock Type B acquisition. The sole shareholder of EMU, Edie Eagle, will receive $400,000 of WU voting stock in the t..
What french general was called the hero of two worlds : What French general was called the hero of two worlds, because he was prominent in both the American Revolution and the French Revolution?

Reviews

Write a Review

Computer Network Security Questions & Answers

  How the virus was able to replicate onto remote servers

Create a graphic rendering of how the virus was able to replicate onto remote servers using Visio or an equivalent such as Dia. Note: The graphically depicted solution is not included in the required page length.

  Explain your method of attack and operation of the law

Explain your method of attack and operation within reasonable parameters of the law. Discuss specific malware, social engineer, or any other type of attacks you would deploy to achieve your desired goals.

  Define security technique that aims to expose flaws

Fuzzing" is a security technique that aims to expose flaws in error handling by providing invalid, random, or unexpected data as inputs to computer systems. Here "system" is used generically, and should be read as "function call, program, or shell..

  Use the stream cipher discused in class

Use ECB mode with block length 3 and the permutation cipher for the following operation.

  Personal information security through public wi-fi

Write paper on Personal information security through public Wi-Fi

  How the database and web services can be protected

Study how the database and web services can be protected against unauthorized use while maintaining access for authorized users by using firewall and VPN techniques

  How must one-s privacy be legally protected or secured

What does privacy mean to you? Is privacy a right or a privilege? How should one's privacy be legally protected or secured, especially when using the Internet?

  How do they fit within the situational crime prevention

What are the countermeasures to those threats, and how do they fit within the Situational Crime Prevention framework - how does the current law help or hinder your countermeasures? Are there any proposals for laws that would assist?

  E-mail that promotes product or service

is unsolicited e-mail that promotes product or service, or they be part of hoax: Infare wireless networks that pretend to offer trustworthy WI-FI connection to the Internet

  State whether this is a ca or end-user certificate

Identify the key elements in this certificate, including the owner''s name and public key, its validity dates, the name of the CA that signed it, and the type and value of signature.

  How is cloud security different than traditional security

Discuss how security for a traditional information system will change when you transfer that system into the cloud. Specifically what are the security implications of using each of the three cloud service models

  Prevent software upgrade problems

What precautions did the organizations in the case take to prevent software upgrade problems? To what extent do you believe those precautions helped?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd