Development of Secure Network System for Complex Network
Johnson Uche Olu-Egbuniwe, Samson OluwaseunFadiya
Abstract
This paper looks at the significance of the implementation of visualization technique in the development of a
secure network on complex networks; also the effects of certain factors like the level of trained staff and IT budget
allocation upon implementation of this technique, as well as their effects on complex networks. Descriptions of
the techniques used to protect and keep PC’s up and undisturbed. Protecting the clients’ security and privacy is of
high priority. This paper sets to look at the internal and external security challenges in businesses and
corporations that implement both wireless networks wired networks. With the introduction of cloud computing,
the risks of viruses, worms and hackers has increased. The use of distributed security is designated to fully cover
and provide more security over data that is shared among faculty members, colleagues, clients and any other user
within the cloud. The problems and issues enlisted by Cisco and Microsoft are reviewed and help in aiding the
proposed project route. The research showed that that the funds allocated to security in the IT budget is
important. The level of trained IT staff showed greater importance for the implementation of visualization in a
complex network.
Full Text: PDF