1,551
12
Essay, 2 pages (350 words)

Network design

Network Design Insert Insert Network design requires give-and-take to achieve business goals. What four trade-offs would need to be made to achieve maximum security of the system?
Cost and time trade-off. The time taken to complete a particular activity can be compromised i. e. reduced by investing more in the activity (Pino, 2014). However, this should be within the acceptable limits. Thus, the time took to analyze the network to completing it is dependent on the amount of cash we invest in carrying out this activity.
Performance of the network and security tradeoff. Every business loves to have high performance as regards to their speeds of operation. Workers in the institution hate it when the system runs slow or simply goes below the threshold. The result is a decrease in production and could lead to data getting lost. The strained technical team may be forced to cut out some features in the firewall to ensure that the throughput is optimum. The latter puts the organization at a risk of attack by malicious persons.
Specification of individuals involved in implementing the security of the network. How well trained are the administrators trained regarding security? The manner in which the managers and users will become partisan to the objective is critical (Seigneur & Slagell, 2010). It also involves how the procedures followed to ensure that they are trained regarding security policies and what to follow. A security plan, therefore, requires the support of the entire team working in an organization. How to get the management team, the technical group and end users is a significant challenge for an organization to achieve its aims regarding security.
There is also a tradeoff in ensuring that the security is. The following is vital with the changing risks now and again. Thus, an organization requires coming up with alerts, carry out frequent testing, offering training to the administrators and improving on their policy plan. Administrators may be through this process of constant testing, monitoring, changing of plans and making the security system better. They may need compensation that the organization may not consider as vital thus compromising the entire process.
References
Pino, R. (2014). Network Science and Cybersecurity. Dordrecht: Springer.
Seigneur, J., & Slagell, A. (2010). Collaborative computer security and trust management. Hershey, Pa.: IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA).

Thank's for Your Vote!
Network design. Page 1
Network design. Page 2
Network design. Page 3

This work, titled "Network design" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Network design'. 30 September.

Reference

AssignBuster. (2022, September 30). Network design. Retrieved from https://assignbuster.com/network-design-essay-samples-2/

References

AssignBuster. 2022. "Network design." September 30, 2022. https://assignbuster.com/network-design-essay-samples-2/.

1. AssignBuster. "Network design." September 30, 2022. https://assignbuster.com/network-design-essay-samples-2/.


Bibliography


AssignBuster. "Network design." September 30, 2022. https://assignbuster.com/network-design-essay-samples-2/.

Work Cited

"Network design." AssignBuster, 30 Sept. 2022, assignbuster.com/network-design-essay-samples-2/.

Get in Touch

Please, let us know if you have any ideas on improving Network design, or our service. We will be happy to hear what you think: [email protected]