Network Security and Virtual Networks 1) The two critical aspects of network man
ID: 2246943 • Letter: N
Question
Network Security and Virtual Networks
1) The two critical aspects of network management are performance and security. Some of the technical issues involved in managing performance include congestion control, traffic management, and error control. With respect to security, the concerns fall in two categories—passive and active threats. For each of these considerations (performance and security), select one technical solution that can be implemented to alleviate or prevent a performance problem and one technical solution that can be used to alleviate or prevent a security threat. Be specific about the problem and solution in each case.
2) Virtualization has become a key player in our networking world these days. Another important term is the virtual private network (VPN). Are the two terms (virtualization and VPN) related? Discuss and give examples. Do you have any security concerns for using virtual networks? Why?
Explanation / Answer
ANSWER 1:
For performance management on network it is recommend to use network manager and monitoring tools, it will monitor the health of all the network devices and will also check the errors, disk utilization, CPU and memory utilization. Such monitoring tools have ping, trace route, etc. deployed to diagnose any errors which may occur. You will have a visibility of network traffic and you can automate the network change and configuration. Using such tools you can analyze and troubleshoot WAN issues and troubleshoot your VoIP problems. Along with this it is recommended to accelerate and secure applications with a reverse proxy server and add a load balancer.
To prevent a security threat in you network use IDS/IPS system to detect and prevent the unwanted activities in your network. The threats can be prevented from penetrating into your network and the one’s which can’t be prevented can be detected and you can take immediate actions to resolve them.
ANSWER 2:
Virtualization is the concept or method of creating a virtual version of something, including virtual computer hardware platforms, storage devices, and computer network resources.
Virtual Private Network(VPN) extends a private network across a public network and allows the users to send/receive data across public network as if there is no in between public network and the devices are directly connected to the private network.
VPN is used by organizations working remotely to connect to their head office or the centers, it is a cost effective method used where leased lines won't be appropriate. You can encrypt the traffic from remote areas to your center locations and vice-versa. Examples: Client-based VPN.
Security concerns related to VPN involves:
Lack of visibility into network traffic - Hypervisor is used by virtual machines on same server to communicate; Hypervisors introduce a new layer of privileged software that can be attacked.
Communication between virtual machines are popular attack vectors - Communication over virtual network is not monitored which makes them prone to attacks.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.