Categories: Uncategorized

Final Proposal Form

Final Project Proposal Form
Project Final Proposal Form

Programme: Individual Project Year:

Student Number:

Title: Network Monitoring

Aim: The main objective of the study is to investigate various systems of monitoring networks that can be implemented in business enterprises to mitigate security threats from cyber-attacks. The study will provide recommendations on the most viable network framework proposal suitable for monitoring network systems.
Objectives:

i. Identify existing security vulnerabilities that may be exploited during cyber-attacks on network systems.
ii. Evaluate the recommended solution effective to offer protection to enterprise network security using a developed prototype for monitoring networks. The flexibility of the system is key to incorporating other elements like systems of database storage.
iii. Develop a customised network security protocol to mitigate and monitor threats posed to the network system of the enterprise to control any existing risks.
iv. Establish well-documented policies outlining the authorized personnel with the mandate of operating the network resources to avoid unnecessary breaches of the enterprise network security protocols.

Rationale:
Currently, the technological world is experiencing rapid changes due to innovative processes. Therefore, cybersecurity is increasingly becoming a key area of concern due to the constant cyber-attacks on network systems. This study seeks to investigate enterprise network systems to identify effective ways of monitoring these systems. The project is aimed at establishing solutions to improving the performance of network systems against failure posed by security threats.
Facilities required:

i. Anti-virus software: Any potential viruses can be identified and eliminated by the software when network administrators scan enterprise network systems in a bid to keep systems free from security attacks.
ii. Server: The server acts as the storage unit for network resources such as files, software applications of security configuration, as well as databases. Serve is used as a primary tool to maintain confidentiality by restricting personnel to protect the network and improve its performance.
iii. Firewall: This tool is useful in monitoring and identifying any potential network threats. Therefore, it should be installed with proper configurations to maintain its functionality against possible network attacks.
iv. Ethernet cables: This equipment is used in the network connection between computers and servers. The cables ensure the workability of networks and information transfer.
v. Operating system: Network monitoring systems are incorporated in various operating systems such as Linux and Windows. The operating system is configured to work effectively by enabling the proposed solution to function and protect the network systems efficiently.
vi. Intrusion detection system: The system works in conjunction with the network monitoring system to maintain a threat-free environment within networks.
Supervisor:

admin

Share
Published by
admin

Recent Posts

Childbirth

For this short paper activity, you will learn about the three delays model, which explains…

9 months ago

Literature

 This is a short essay that compares a common theme or motif in two works…

9 months ago

Hospital Adult Medical Surgical Collaboration Area

Topic : Hospital adult medical surgical collaboration area a. Current Menu Analysis (5 points/5%) Analyze…

9 months ago

Predictive and Qualitative Analysis Report

As a sales manager, you will use statistical methods to support actionable business decisions for Pastas R Us,…

9 months ago

Business Intelligence

Read the business intelligence articles: Getting to Know the World of Business Intelligence Business intelligence…

9 months ago

Alcohol Abuse

The behaviors of a population can put it at risk for specific health conditions. Studies…

9 months ago