IMPLEMENTATION OF MICRO-SEGMENTATION OF A COMPUTER NETWORK TO IMPROVE NETWORK SECURITY

You have 10 free previews remaining
Previews reset on: Oct 31, 2025
Preview attempts remaining: 10 10 remaining

📄 Project Abstract

The rise of hybrid-cloud data centers, as well as Virtualization has created an IT environment that is time-consuming and difficult to manage due to its ever changing state meaning breaches are more likely to occur and mitigating their impact is crucial. To address these shortcomings, this project discusses how Micro-segmentation based on the Zero Trust Model works by segmenting a network and identifying its components in order to protect it from attacks. Micro-segmentation functions by securing environments, inter and intra application traffic within a data center to greatly protect it while preventing network intrusion and isolating threats if they should occur. The implementation was done using VMware HOL Labs to simulate the micro-segmentation process. The study results in determining how to migrate and protect network resources using hypervisors with each of its virtual machines and individual components by involving the use of stateful firewalls while making analysis of traffic t...

🔍 Key Research Areas Covered
  • ✅ Literature Review & Theoretical Framework
  • ✅ Research Methodology & Data Collection
  • ✅ Data Analysis & Statistical Methods
  • ✅ Findings & Results Discussion
  • ✅ Recommendations & Conclusions
  • ✅ References & Bibliography
📚 Complete Project Structure
Chapter 1: Introduction & Background
  • Problem Statement & Objectives
Chapter 2: Literature Review
  • Theoretical Framework & Related Studies
Chapter 3: Research Methodology
  • Data Collection & Analysis Methods
Chapter 4: Data Analysis & Results
  • Findings & Statistical Analysis
Chapter 5: Discussion & Conclusion
  • Recommendations & Future Research
Appendices: Supporting Documents
  • Questionnaires, Data, References
⭐ Why Choose This Computer Science And Mathematics Project Topics Project?
🎯 Well-Researched

Thoroughly researched with current and relevant sources

📊 Complete Data

Includes statistical analysis and detailed findings

✍️ Original Content

100% original research with proper citations

📝 Properly Formatted

APA/MLA formatting with table of contents

🎓 Supervisor Approved

Meets university standards and requirements

⚡ Instant Download

Immediate access after purchase

💬 What Students Say

"This project provided excellent guidance for my Computer Science And Mathematics Project Topics research. The methodology was clear and the data analysis helped me understand the proper approach."

— Final Year Student, Science Project Topics
Full Citation:

ODEY, OYALOWO TOLUWANISE. (). IMPLEMENTATION OF MICRO-SEGMENTATION OF A COMPUTER NETWORK TO IMPROVE NETWORK SECURITY. African and General Studies, 40, 14858.

Citation Formats:
APA
ODEY, OYALOWO TOLUWANISE. (). IMPLEMENTATION OF MICRO-SEGMENTATION OF A COMPUTER NETWORK TO IMPROVE NETWORK SECURITY. African and General Studies, 40, 14858.
MLA
ODEY, OYALOWO TOLUWANISE. "IMPLEMENTATION OF MICRO-SEGMENTATION OF A COMPUTER NETWORK TO IMPROVE NETWORK SECURITY." African and General Studies, vol. 40, , pp. 14858.
Chicago
ODEY, OYALOWO TOLUWANISE. "IMPLEMENTATION OF MICRO-SEGMENTATION OF A COMPUTER NETWORK TO IMPROVE NETWORK SECURITY." African and General Studies 40 (): 14858.
Full Citation:

ODEY, OYALOWO TOLUWANISE. (). IMPLEMENTATION OF MICRO-SEGMENTATION OF A COMPUTER NETWORK TO IMPROVE NETWORK SECURITY. African and General Studies, 40, 14858.

Citation Formats:
APA
ODEY, OYALOWO TOLUWANISE. (). IMPLEMENTATION OF MICRO-SEGMENTATION OF A COMPUTER NETWORK TO IMPROVE NETWORK SECURITY. African and General Studies, 40, 14858.
MLA
ODEY, OYALOWO TOLUWANISE. "IMPLEMENTATION OF MICRO-SEGMENTATION OF A COMPUTER NETWORK TO IMPROVE NETWORK SECURITY." African and General Studies, vol. 40, , pp. 14858.
Chicago
ODEY, OYALOWO TOLUWANISE. "IMPLEMENTATION OF MICRO-SEGMENTATION OF A COMPUTER NETWORK TO IMPROVE NETWORK SECURITY." African and General Studies 40 (): 14858.
Need Help?