Welcome to IT Solutions & Services WordPress Theme
  • Mon - Sat: 8.00 am - 7.00 pm

Communication and Networking

Explain Policy Categories and the Form and Organization Components

Classification of Security Policies Rhodes-Ousley (2013) classifies security policies into three elementary categories namely: Regulatory policies, advisory policies and informative policies (p.111). Irrespective of the category, security policies can only be effective if they are short and easy to understand. Regulatory policies Regulatory policies are put in place to aid the assessment and compliance process. […]

Read more

Explain Computer Policies and Provide an Example of One

What are Computer Policies Computer policies are a group of rules that govern the use of computers and information systems (Rhodes-Ousley, 2013, p.124). The leading collection of rules that make up computer policies are authentication policies. Password policies are rules that govern creation and use of passwords. Password policies rank first in authentication policies. Boyle […]

Read more

Communication Backbones in Metropolitan Area Networks (MANs)

Question Metropolitan Area Networks or MANs utilize high data rates, are highly reliable, and have low data loss. Summarize the two types of communication backbones that are used by MANs. Which of the backbones would you recommend for a small metropolitan area and why? Communication Backbones used in Metropolitan Area Networks (MANs) The two communication […]

Read more

Explain the Functionality of a Firewall and give an Example of a Firewall

Functionality of a Firewall Firewall is a hardware or software-based security system that controls network traffic entering or leaving a network (Rouse, 2014). Firewalls have important functionalities whether implemented for network security or access control. To begin with, firewall safeguards data being sent to different network locations by encrypting the data automatically. This feature allows […]

Read more

Explain the Strengths and Weaknesses of a Firewall

Definition of Firewall White (2015), defines firewall as a set of systems implemented to authenticate and control how users access and use networks. Although firewall is very important for protection of data, network users and network devices, it presents strengths and weaknesses discussed below. Strengths of a Firewall Firewall helps organizations enforce their security policies […]

Read more

Describe a Network Address Translation (NAT) and Provide an example of NAT

Network Address Translation (NAT) Network Address Translation (NAT) is an Internet Protocol (IP) conservation technique that allows network users to have many IP addresses locally and one or few global addresses (Forouzan & Fegan, 2007). Network traffic within the local network setting uses the locally allocated IP addresses while all traffic going outside or entering […]

Read more

Ring, Star, and Bus Network Topologies: Advantages, Disadvantages and Applications

Introduction A network topology is a pattern that devices are connected into local area network (LAN), in a short, which mostly uses some sort of cabling methodologies, such as copper wire and fiber-optic cable. According to (White, 2016), “A local area network (LAN) is a communications network that interconnects a variety of data communications devices […]

Read more