How to build a secure virtual network

Assignment Help Basic Computer Science
Reference no: EM13935810

How to build a secure virtual network?

This report is based on the concept of virtual network. Today various new technologies have been introduced to fulfill various requirements of the users. As much as technologies are developed the security issues are also increasing. Network security is the major concern today. This report is based on the concept of security of virtual network. In this report we will discuss about that how a secure network can be built. In this report we will discuss about various methods that how security of virtual network can be achieved and what are the various challenges that will be encountered while building virtual network.

Introduction

Motivation

Network security is the major concern today. By getting information about that how virtual network can be secured, it will be better to user wireless applications such as hot spot etc.

Problem Summery

Today server virtualization technologies have been increased to consolidate the physical servers to provide help to various organizations in centralized their data and information. In this case security is very much necessary of those technologies. The achievement of this security is the major concern.

Motivations

Problem History

Not from today but the problem of virtual network security is the basic problem from many years. In past few years various network attacks such as denial of service attack and hacking has been faced by network users. These problems are still continuous.
Problem Interest

The main thing of this problem is that how this virtual network can be protected, because for organization security of virtual networks is big issue.
Problem solution

To protect the virtual networks various security tools are used such as traffic monitoring analysis, Automatic and on-going assessments of virtual network, detection of intrusion and prevention through LAN firewall. But still some security issues are faced by the network issues because various new attacks are implemented by the hackers. (David Marshall, V. ,2008)

Possible improvements

Besides above discussed improvements various other advance solutions are available that can be used handle the security of virtual networks such as server based network access control and network authorization. (Stravarius, J. ,2014)
Project Details

Architecture and Environment
To handle the virtual environment some security platforms that can be provided secure environment for achieve networking are listed as below:

· Compatible virtual environment is VMware.
· Compatible operating system which have related infrastructure
· Compatible network ecosystem elements.

Software and hardware tools
To build a secure virtual network following hardware and software tools are required:

Hardware Tools
· Switches and Network Adapters(Network Interface Card)
· Network Storage devices
· Telecommunication Devices
· Mobile elements such as Laptop, tablet computers and smart phones

Software Tools
· Firewalls and Load Balancer
· Virtual LANs and Virtual Machines

Issues and challenges

There are various issues that are occurred in the virtualization network are listed as below:
· Lack of visibility and awareness in virtual environment
· Maintenance of regulatory compliance
· Security issues for mobile server
· Activation for stored material

Deliverables

Virtual network can provide help to achieve the stored information and data over the remote network. Server virtualization can be achieved properly by the virtual networks.

In this conclusion we can say this network is important in both cases whether virtual network or other network. To maintain the network security above discussed security tools must be used by the network developers.

Reference no: EM13935810

Questions Cloud

How banter can attempt to reduce its economic exposure : Of its revenues, 60% are due to exports to the US, where its product is invoiced in dollars. Explain how Banter can attempt to reduce its economic exposure to exchange rate fluctuations in the dollar.
What kind of vaccine would be the best for a virus : What kind of vaccine (live, dead, whole, viral protein, etc) would be the best for a virus that causes a mild disease in individuals with a heavy cytolytic response and severe to individuals who produced a primarily antibody response? Ideas are ge..
Enron story-theories of leadership : How can what happened at Enron be explained by some of the theories of leadership that you have looked at?
Create a flowchart in powerpoint : I created the program as best I could using what I have learned so far, but it won't run. I also am confused as to how to create a flow chart in some other program to accompany it. Here are my problems:
How to build a secure virtual network : This report is based on the concept of virtual network. Today various new technologies have been introduced to fulfill various requirements of the users. As much as technologies are developed the security issues are also increasing. Network secur..
Determine which colonies might contaminants on streak plate : What are three reasons one might a situation in which bacterial colonies are found on the first section of a streak plate, but not on sections two and three?
Explain the loops in detail : Even should only be reading for the FOR Loop. I tried moving it around and it won't work so I don't know how to fix it to not show on the DO..WHILE Loop and the WHILE Loop
How uva ltd can reduce economic exposure to exchange rate : Its sales to Thai customers are denominated in baht. Explain how UVA Ltd can reduce its economic exposure to exchange rate fluctuations.
Why do hcos strive for transformational styles : Why do high performing HCO's strive for transformational styles? Is this just the current fad or is there another that you would suggest

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Discuss different reasons terminating a process and command

discuss the different reasons for terminating a process and the commands used for this purpose.

  Explain main points to write in the communications plan

Recognize the main points you would write in the communications plan at this point in project. What suggestions would you give your project team to aid it manage user expectations?

  Preventing or mitigating dos or distributed dos

Topic of the Paper: Technique(s) or scheme(s) or method(s) for detecting, preventing or mitigating DoS or Distributed DoS (DDoS) attacks. Assignment Guidelines

  Discuss any two major security flaws in us or anywhere

Discuss any two major security flaws in US or anywhere, one of which is a violation of Integrity, while the other is a violation of Confidentiality, with clear explain.

  Explain us supreme court-s reaction bribery of internal

Explain what was U.S. Supreme Court's reaction to case where business executive was found guilty of aiding and abetting in bribery of Internal Revenue Service Agent.

  What other errors are there if any cin value

void getValue(int value&) { cout > value& } I already know "cint" should be "cin". What other errors are there, if any? Should the cin value "value&" have the ampersand attached, or not?

  What is the position of the first queue element

Suppose that queue is implemented as an array with the special reserved slot, as described in this chapter. Also, suppose that the size of the array implementing queue is 100. If the value of queueFront is 50, what is the position of the first queue ..

  Use jsp to display current date & time

Fail authentication page will ask user to create the new account if the user does not have an account on the system.

  What will you also back up onto a flash drive

Of that information, what will you also back up onto a flash drive? How often would you perform the backup process? How often do you currently back up information on your computer's hard drive

  What bit pattern will be in memory cell

What bit patterns will be in registers 0, 1, and 2 when the machine halts? What bit pattern will be in the memory cell at address 30 when the machine halts?

  Use eulers method

Use Euler's Method with (a) h=.5, (b) h=.25, and (c) h=.05 to solve dy/dx=yx^3-2.3y over the interval from x=0 to 2, where y(0)=1.

  Create a java or c sharp application that simulates

Create a Java or C# application that simulates

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd