Faculty of Polytechnics, University of Zenica , Zenica , Bosnia and Herzegovina
The rapid development of technology caused many business processes to start using electronic processing of data, what implied development of local networks in many companies and organizations. Most network infrastructures have been developed incrementally, and expanded according to the needs, and mostly an ad-hoc approach was applied, without a lot of planning and taking care of security. Network implementers, in general, were no professionals, so the network issues and security risks happen often. Many pieces of today's network infrastructure have obsolete network equipment, with configured protocols that have become insecure, and physical implementation of the network is often a big collision domain. This paper will present approach, i.e., how a quality network infrastructure can be created and what are the key steps in identifying the weak points of the network infrastructure.
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.