1,667
10
Essay, 2 pages (350 words)

Network design

Advertising We'll write a high-quality original custom paper on Network design just for you with a 15% discount for the 1st order Use a Discount Use a Discount

Network Design Insert Insert Network design requires give-and-take to achieve business goals. What four trade-offs would need to be made to achieve maximum security of the system?
Cost and time trade-off. The time taken to complete a particular activity can be compromised i. e. reduced by investing more in the activity (Pino, 2014). However, this should be within the acceptable limits. Thus, the time took to analyze the network to completing it is dependent on the amount of cash we invest in carrying out this activity.
Performance of the network and security tradeoff. Every business loves to have high performance as regards to their speeds of operation. Workers in the institution hate it when the system runs slow or simply goes below the threshold. The result is a decrease in production and could lead to data getting lost. The strained technical team may be forced to cut out some features in the firewall to ensure that the throughput is optimum. The latter puts the organization at a risk of attack by malicious persons.
Specification of individuals involved in implementing the security of the network. How well trained are the administrators trained regarding security? The manner in which the managers and users will become partisan to the objective is critical (Seigneur & Slagell, 2010). It also involves how the procedures followed to ensure that they are trained regarding security policies and what to follow. A security plan, therefore, requires the support of the entire team working in an organization. How to get the management team, the technical group and end users is a significant challenge for an organization to achieve its aims regarding security.
There is also a tradeoff in ensuring that the security is. The following is vital with the changing risks now and again. Thus, an organization requires coming up with alerts, carry out frequent testing, offering training to the administrators and improving on their policy plan. Administrators may be through this process of constant testing, monitoring, changing of plans and making the security system better. They may need compensation that the organization may not consider as vital thus compromising the entire process.
References
Pino, R. (2014). Network Science and Cybersecurity. Dordrecht: Springer.
Seigneur, J., & Slagell, A. (2010). Collaborative computer security and trust management. Hershey, Pa.: IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA).

Thanks for Voting!
Network design. Page 1
Network design. Page 2
Network design. Page 3

The paper "Network design" was written by a real student and voluntarily submitted to this database. You can use this work as a sample in order to gain inspiration or start the research for your own writing. You aren't allowed to use any part of this example without properly citing it first.

If you are the author of this paper and don't want it to be used on EduPony, contact us for its removal.

Ask for Removal

Cite this Essay

References

EduPony. (2022) 'Network design'. 26 January.

Reference

EduPony. (2022, January 26). Network design. Retrieved from https://edupony.com/network-design-essay-examples-2/

References

EduPony. 2022. "Network design." January 26, 2022. https://edupony.com/network-design-essay-examples-2/.

1. EduPony. "Network design." January 26, 2022. https://edupony.com/network-design-essay-examples-2/.


Bibliography


EduPony. "Network design." January 26, 2022. https://edupony.com/network-design-essay-examples-2/.

Work Cited

"Network design." EduPony, 26 Jan. 2022, edupony.com/network-design-essay-examples-2/.

Contact EduPony

If you have any suggestions on how to improve Network design, please do not hesitate to contact us. We want to know more: [email protected]