How to build a secure virtual network

Assignment Help Basic Computer Science
Reference no: EM13935810

How to build a secure virtual network?

This report is based on the concept of virtual network. Today various new technologies have been introduced to fulfill various requirements of the users. As much as technologies are developed the security issues are also increasing. Network security is the major concern today. This report is based on the concept of security of virtual network. In this report we will discuss about that how a secure network can be built. In this report we will discuss about various methods that how security of virtual network can be achieved and what are the various challenges that will be encountered while building virtual network.

Introduction

Motivation

Network security is the major concern today. By getting information about that how virtual network can be secured, it will be better to user wireless applications such as hot spot etc.

Problem Summery

Today server virtualization technologies have been increased to consolidate the physical servers to provide help to various organizations in centralized their data and information. In this case security is very much necessary of those technologies. The achievement of this security is the major concern.

Motivations

Problem History

Not from today but the problem of virtual network security is the basic problem from many years. In past few years various network attacks such as denial of service attack and hacking has been faced by network users. These problems are still continuous.
Problem Interest

The main thing of this problem is that how this virtual network can be protected, because for organization security of virtual networks is big issue.
Problem solution

To protect the virtual networks various security tools are used such as traffic monitoring analysis, Automatic and on-going assessments of virtual network, detection of intrusion and prevention through LAN firewall. But still some security issues are faced by the network issues because various new attacks are implemented by the hackers. (David Marshall, V. ,2008)

Possible improvements

Besides above discussed improvements various other advance solutions are available that can be used handle the security of virtual networks such as server based network access control and network authorization. (Stravarius, J. ,2014)
Project Details

Architecture and Environment
To handle the virtual environment some security platforms that can be provided secure environment for achieve networking are listed as below:

· Compatible virtual environment is VMware.
· Compatible operating system which have related infrastructure
· Compatible network ecosystem elements.

Software and hardware tools
To build a secure virtual network following hardware and software tools are required:

Hardware Tools
· Switches and Network Adapters(Network Interface Card)
· Network Storage devices
· Telecommunication Devices
· Mobile elements such as Laptop, tablet computers and smart phones

Software Tools
· Firewalls and Load Balancer
· Virtual LANs and Virtual Machines

Issues and challenges

There are various issues that are occurred in the virtualization network are listed as below:
· Lack of visibility and awareness in virtual environment
· Maintenance of regulatory compliance
· Security issues for mobile server
· Activation for stored material

Deliverables

Virtual network can provide help to achieve the stored information and data over the remote network. Server virtualization can be achieved properly by the virtual networks.

In this conclusion we can say this network is important in both cases whether virtual network or other network. To maintain the network security above discussed security tools must be used by the network developers.

Reference no: EM13935810

Questions Cloud

How banter can attempt to reduce its economic exposure : Of its revenues, 60% are due to exports to the US, where its product is invoiced in dollars. Explain how Banter can attempt to reduce its economic exposure to exchange rate fluctuations in the dollar.
What kind of vaccine would be the best for a virus : What kind of vaccine (live, dead, whole, viral protein, etc) would be the best for a virus that causes a mild disease in individuals with a heavy cytolytic response and severe to individuals who produced a primarily antibody response? Ideas are ge..
Enron story-theories of leadership : How can what happened at Enron be explained by some of the theories of leadership that you have looked at?
Create a flowchart in powerpoint : I created the program as best I could using what I have learned so far, but it won't run. I also am confused as to how to create a flow chart in some other program to accompany it. Here are my problems:
How to build a secure virtual network : This report is based on the concept of virtual network. Today various new technologies have been introduced to fulfill various requirements of the users. As much as technologies are developed the security issues are also increasing. Network secur..
Determine which colonies might contaminants on streak plate : What are three reasons one might a situation in which bacterial colonies are found on the first section of a streak plate, but not on sections two and three?
Explain the loops in detail : Even should only be reading for the FOR Loop. I tried moving it around and it won't work so I don't know how to fix it to not show on the DO..WHILE Loop and the WHILE Loop
How uva ltd can reduce economic exposure to exchange rate : Its sales to Thai customers are denominated in baht. Explain how UVA Ltd can reduce its economic exposure to exchange rate fluctuations.
Why do hcos strive for transformational styles : Why do high performing HCO's strive for transformational styles? Is this just the current fad or is there another that you would suggest

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd