How to build a secure virtual network

Assignment Help Basic Computer Science
Reference no: EM13935810

How to build a secure virtual network?

This report is based on the concept of virtual network. Today various new technologies have been introduced to fulfill various requirements of the users. As much as technologies are developed the security issues are also increasing. Network security is the major concern today. This report is based on the concept of security of virtual network. In this report we will discuss about that how a secure network can be built. In this report we will discuss about various methods that how security of virtual network can be achieved and what are the various challenges that will be encountered while building virtual network.

Introduction

Motivation

Network security is the major concern today. By getting information about that how virtual network can be secured, it will be better to user wireless applications such as hot spot etc.

Problem Summery

Today server virtualization technologies have been increased to consolidate the physical servers to provide help to various organizations in centralized their data and information. In this case security is very much necessary of those technologies. The achievement of this security is the major concern.

Motivations

Problem History

Not from today but the problem of virtual network security is the basic problem from many years. In past few years various network attacks such as denial of service attack and hacking has been faced by network users. These problems are still continuous.
Problem Interest

The main thing of this problem is that how this virtual network can be protected, because for organization security of virtual networks is big issue.
Problem solution

To protect the virtual networks various security tools are used such as traffic monitoring analysis, Automatic and on-going assessments of virtual network, detection of intrusion and prevention through LAN firewall. But still some security issues are faced by the network issues because various new attacks are implemented by the hackers. (David Marshall, V. ,2008)

Possible improvements

Besides above discussed improvements various other advance solutions are available that can be used handle the security of virtual networks such as server based network access control and network authorization. (Stravarius, J. ,2014)
Project Details

Architecture and Environment
To handle the virtual environment some security platforms that can be provided secure environment for achieve networking are listed as below:

· Compatible virtual environment is VMware.
· Compatible operating system which have related infrastructure
· Compatible network ecosystem elements.

Software and hardware tools
To build a secure virtual network following hardware and software tools are required:

Hardware Tools
· Switches and Network Adapters(Network Interface Card)
· Network Storage devices
· Telecommunication Devices
· Mobile elements such as Laptop, tablet computers and smart phones

Software Tools
· Firewalls and Load Balancer
· Virtual LANs and Virtual Machines

Issues and challenges

There are various issues that are occurred in the virtualization network are listed as below:
· Lack of visibility and awareness in virtual environment
· Maintenance of regulatory compliance
· Security issues for mobile server
· Activation for stored material

Deliverables

Virtual network can provide help to achieve the stored information and data over the remote network. Server virtualization can be achieved properly by the virtual networks.

In this conclusion we can say this network is important in both cases whether virtual network or other network. To maintain the network security above discussed security tools must be used by the network developers.

Reference no: EM13935810

Questions Cloud

How banter can attempt to reduce its economic exposure : Of its revenues, 60% are due to exports to the US, where its product is invoiced in dollars. Explain how Banter can attempt to reduce its economic exposure to exchange rate fluctuations in the dollar.
What kind of vaccine would be the best for a virus : What kind of vaccine (live, dead, whole, viral protein, etc) would be the best for a virus that causes a mild disease in individuals with a heavy cytolytic response and severe to individuals who produced a primarily antibody response? Ideas are ge..
Enron story-theories of leadership : How can what happened at Enron be explained by some of the theories of leadership that you have looked at?
Create a flowchart in powerpoint : I created the program as best I could using what I have learned so far, but it won't run. I also am confused as to how to create a flow chart in some other program to accompany it. Here are my problems:
How to build a secure virtual network : This report is based on the concept of virtual network. Today various new technologies have been introduced to fulfill various requirements of the users. As much as technologies are developed the security issues are also increasing. Network secur..
Determine which colonies might contaminants on streak plate : What are three reasons one might a situation in which bacterial colonies are found on the first section of a streak plate, but not on sections two and three?
Explain the loops in detail : Even should only be reading for the FOR Loop. I tried moving it around and it won't work so I don't know how to fix it to not show on the DO..WHILE Loop and the WHILE Loop
How uva ltd can reduce economic exposure to exchange rate : Its sales to Thai customers are denominated in baht. Explain how UVA Ltd can reduce its economic exposure to exchange rate fluctuations.
Why do hcos strive for transformational styles : Why do high performing HCO's strive for transformational styles? Is this just the current fad or is there another that you would suggest

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create logic circuit which will decode dtmf-like keypad

Create the logic circuit which will decode the DTMF-like keypad. The keypad comprises of 16 keys, numbered 0 to 9, *, #, A, B, C, and D.

  Design the storyboard

Design the storyboard,interactivity diagram, object diagram, and any necessary scripts for an interactive program for customers of Sanderson's Ice Cream Sundaes.

  Remember to make only one step at a time

Prove the following. Remember to make only one step at a time and not skip steps. Remember to write what rule allowed you to make each step, and which lines you applied it to

  What three functions are the most important

DBMS has many functions. What three functions are the most important and why are they most important?

  Define excel will impact your performance in school

Discuss your experience in using Excel prior to taking this course. What new features have you learned? What tips can you offer to other students?

  Explain description design analyses

Description Design Analyses (perhaps include sub-categories for each process) Description of Units being Designed What do they remove? Explain how do they operate?

  Use matlab to write a function function

Use Matlab to write a function function, call it fRotate, with a function, an interval, and an angle as its input arguments.

  Describe organization''s strategic planning on the it systems

Describe the effect of an organization's strategic planning on the IT systems it uses. Address how strategic planning simplifies and complicates IT system development and use.

  Create a powerpoint presentation to present the findings

Create a PowerPoint presentation to present the findings of your research to the widget company that has hired you as a consultant. Use five or more slides that detail the recommendations you are making to the company executives.

  Describe three components found in a web system

In order to design Web forms in Visual Studio.NET

  Evaluate the natural settings of the test environment

Describe and assess the evaluation method being used by the testing company, i.e., nonvisual and verbal recording of browser activities and tester's vocal comments and evaluate the natural settings of the test environment for Web users

  Execute one set of statements if the condition is true

You need to test a condition and then execute one set of statements if the condition is true.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd