TO: Professor Jason W. Ellis.
FROM: Mamadou Diallo
Date: 03/03/2021
SUBJECT: 500-Word SUMMARY of Article about Computer Network.
Competition in the current worldâs business organizations has been a helping factor to push many of them to advancement. Businesses operate under the micro and macro environment. The two environment types act as forces toward the scope of changes within the organization. Zaliwski (2005) wants to communicate to such organizations concerning the Computer Network Simulation (CNS) and Network Security Auditing (NSA) that would follow the spatial pattern. In the article, Zaliwski (2005) informs that the micro issues require immediate attention from the management system. The disruption of the business organization operations by macro-threats such as the government and the competitors is under check by the law and customs. However, the micro-level of threats involves those who are not satisfied by the laws and rules that govern the procedures. An example is the computer network threats. Therefore, the suggestion would be to have professionals who have the skills to manage the computer networks that, from the nature of the current system, must wipe out its complexity of the security-related software and easing of the security auditing methodologies. Zaliwski (2005) reports that the complexity of the system and the hardness of the methodologies make it uneasy for the staff to apply it. The proposal does not neglect that the security model must align to the policies and the procedures of the organization and working hand in hand with the organizational structure (Zaliwski, 2005). Although security systems are critical to the organizationâs operations, they need to be simple for usability and easy to interact with. Besides, it needs to be cheap and involving an effective and less expensive laboratory. The use of the laboratory, in this case, is research and teaching sessions for the advancement of security system related to the computer network.
As per Zaliwski (2005), the possible method to arrive at the goal is to create a virtual computer network in a physical lab. That would mean a shortening of the physical computer chains that would have added expense to the system. The system would work with open source, commercial and rare solutions. Also, the system would require graphical network visualization. It would help the professionals to understand the data connections (Zaliwski, 2005). Besides, software for network design and administration and the management part would be necessary for the system to be effective. There is no other system that would work better except the one that involves three sub-systems. They include the spatial models, the repositories, and the virtual networks (Zaliwski, 2005). The entire system would require three computers where one would serve as the host for all virtual machines. The User Mode Linux is the creator and maintenance operator of the computer. The second would connect to the virtual world, while the third would design and keep data for auditing purposes. The system that Zaliwski (2005) describes is a lightweight one and simple for the professional use. Also, the system is cheap and affordable from the micro-business firms and the teaching departments. The auditing methodologies would be simple, unlike the existing systems that keep the professionals scratching their heads. Therefore, the solution is to move the network lab from physical to virtual.
Reference
Zaliwski, A. J. (2005). Computer network simulation and network security auditing in a spatial context of an organization. Informing Science: International Journal of an Emerging Trans discipline, 2(7), 159-168.