- Category: Resources
- Published: 03 September 2014
Capstone Proposal Summary
Internet has been accepted as part of our daily life both for social and business activities. It was designed as a free and open system that allows people from all walks of life to engage in unrestricted information exchange. However, internet is not a secure system since the mode of information exchange is hardly regulated (Midwest Data recovery Inc., 2014). In addition, proliferation of remote access technologies in the recent past has heightened the need for resilient network security. Quest to improve efficiency coupled with fierce competition have driven companies into adoption of latest internet-based technologies such as remote access and e-commerce. The new technologies offer scalable solutions such as lowering operational costs, customer satisfaction, and efficient management. Nonetheless, the latest technologies depend heavily on networks hence raising red flags on vulnerability to network breaches and other security related threats to integrity of personal and organization data (Ur Rehman, n.d. p. 3).
Professionals in the IT sector often rush to solutions that may rescue business survival with good intentions. However, this may not be enough without critically analyzing the real business needs of the company and aligning them to the required IT solution. For instance, a Virtual Private Network (VPN) helps an organization to reduce costs associated to WLAN bandwidth at same time improving connectivity speeds via high-bandwidth supportive devices such as Ethernet, DSL or cable. A VPN refers to a network whose connectivity allows multiple accesses by customers from different locations using a shared network (N3.NHS, n.d.). However, implementation of VPN solutions within an organization network require understanding of associated security risks to the technology. Available VPN protocols and technologies with highest possible security level include IPSec, MPLS, and SSL architectures (CISCO, n.d.). These technologies help in protecting data flowing within VPN from unauthorized access. For example, extension of VPN remote access must address risks associated with remote VPN clients in order to maintain parent corporation’s data integrity, availability and confidentiality. Threats arising from internet can be mitigated by securing an organization’s network particularly at the TCP/IP level. Additional security measures are required to protect network both from external and internal threats such hacking and malicious attacks (Midwest Data recovery Inc., 2014).
Titan Technologies is an upcoming enterprise with its eyes focused on global online business ventures. The company has witnessed immense growth just 2 years after its incorporation. The company is currently exploring growth strategies that will see it engage in outsourced business operations. This will require increased marketing and remote access activities. The purpose of this capstone project is to review its network security current in place, and also threats associated with a VPN implementation. Our focus will be on VPN/firewall implementation as a means of enforcing security policies in the Titan Technologies.
- Next >>