Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
This study aimed to design and implement an efficient security routing protocol for cloud-based networks using Cisco Packet Tracer. The research addressed the increasing reliance on cloud-based networks for data storage and processing, which has elevated the importance of network security due to threats like unauthorized access, data breaches, and insider attacks. The unique characteristics of cloud computing, such as shared resources and dynamic scalability, further compound these security challenges. The research objectives were to identify and categorize security threats in cloud-based networks, evaluate existing security solutions, propose enhanced security measures, and validate the proposed solutions through Cisco Packet Tracer simulations. The study adopted a mixed-methods approach, combining quantitative and qualitative research designs to comprehensively address these objectives. Primary data were collected through surveys and network analysis tools within Cisco Packet Tracer, while secondary data were derived from an extensive literature review. A Random sampling technique was employed to select participants with relevant expertise in cloud security.
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
This study aimed to design and implement an efficient security routing protocol for cloud-based networks using Cisco Packet Tracer. The research addressed the increasing reliance on cloud-based networks for data storage and processing, which has elevated the importance of network security due to threats like unauthorized access, data breaches, and insider attacks. The unique characteristics of cloud computing, such as shared resources and dynamic scalability, further compound these security challenges. The research objectives were to identify and categorize security threats in cloud-based networks, evaluate existing security solutions, propose enhanced security measures, and validate the proposed solutions through Cisco Packet Tracer simulations. The study adopted a mixed-methods approach, combining quantitative and qualitative research designs to comprehensively address these objectives. Primary data were collected through surveys and network analysis tools within Cisco Packet Tracer, while secondary data were derived from an extensive literature review. A Random sampling technique was employed to select participants with relevant expertise in cloud security.