The computer network security implementation in an enterprise project
Pukelyte, Ilona (2021)
Lataukset:
Pukelyte, Ilona
2021
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:amk-202105097854
https://urn.fi/URN:NBN:fi:amk-202105097854
Tiivistelmä
The main purpose of this thesis is to investigate existing information security technologies
and implement these elements into a computer network. The project has two main parts:
research and implementation. Each part has its own objectives.
The objectives in the research part consisted of determining what modern technologies exists to enhance a network security and concluding what kind of technology should be installed in the implementation part. The objectives in the implementation part consisted of creating tables with data that could be used, creating a simulation environment, which would somewhat represent the real world, deciding between using a graphic user interface and a command line interface as well as using commands that could be executed to install the chosen security tool. However, it is important to note that while the chosen commands are used for a specific device, yet the technologies can be implemented anywhere where they meet the hardware and software requirements as their working principle stays the same.
Qualitative methods were used to obtain specific information about technologies and security measures. The data was collected by using books and official documentation. The thesis is formatted to be used as a technology installation guide. All things considered the thesis could be marked as complete because data transmission with security means were analyzed and implemented in a designed environment with a set of parameters corresponding to created specifications
and implement these elements into a computer network. The project has two main parts:
research and implementation. Each part has its own objectives.
The objectives in the research part consisted of determining what modern technologies exists to enhance a network security and concluding what kind of technology should be installed in the implementation part. The objectives in the implementation part consisted of creating tables with data that could be used, creating a simulation environment, which would somewhat represent the real world, deciding between using a graphic user interface and a command line interface as well as using commands that could be executed to install the chosen security tool. However, it is important to note that while the chosen commands are used for a specific device, yet the technologies can be implemented anywhere where they meet the hardware and software requirements as their working principle stays the same.
Qualitative methods were used to obtain specific information about technologies and security measures. The data was collected by using books and official documentation. The thesis is formatted to be used as a technology installation guide. All things considered the thesis could be marked as complete because data transmission with security means were analyzed and implemented in a designed environment with a set of parameters corresponding to created specifications