Preview

Mia Casa Network

Satisfactory Essays
Open Document
Open Document
294 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mia Casa Network
| Brian Kirton | IT283-01 | | Week 6 Assignment | Kaplan University |

|

Wide Area Network

1. Current Mia Casa Foods-LA

2. Proposed Mia Casa Foods-LA

3. Explanation of proposed network My proposed network consists of six servers each firewalled, routed, and switched. Subnets created and composed of 250 workstations per 6 D-link-Layer 3-48 port 10/100/1000 switches which are a high performance LAN device. Using subnets makes the routing process simpler and data flow faster which lessens traffic problems. Basically, sub netting divides this large network into smaller and easier to handle networks. 4. Antivirus Software can be a number of choices. Upgrading already used antivirus would probably work as well as any other antivirus available. 5. Securing individual machines can be done with firewalled routers which protect an entire network. Individual machines therefore could use software firewalls and/or install the secure browser. Administrators can also configure firewalls to stop certain traffic that does not meet specifications. Cleaning the machines by removing un-needed programs and software, and not knowing administrators credentials is a plus. 6-7. Adding security to the webpage and intranet webpage could be done by hiring a good web-site developer. 8. Issues of updating software can be accomplished by using Windows Server Update Services for any Microsoft products. Any custom software or in-house software should be updated and taken care of by the company’s developers. Any software that was purchased from a third party should be updated by the third party.

References Dye, M. A., McDonald, R., & Rufi, A. W. (2008). Network Fundamentals: CCNA Exploration Companion Guide. Indianapolis, IN: Cisco. Foundations In Information Technology: Pearson Custom Publishing
Dean, T. (2010). Network+ Guide to Networks (5th Ed.) Boston, MA: Course



References: Dye, M. A., McDonald, R., & Rufi, A. W. (2008). Network Fundamentals: CCNA Exploration Companion Guide. Indianapolis, IN: Cisco. Foundations In Information Technology: Pearson Custom Publishing Dean, T. (2010). Network+ Guide to Networks (5th Ed.) Boston, MA: Course Technology.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Networking basics

    • 519 Words
    • 3 Pages

    References: Dean, Tamara (2010). Network+ Guide to Networks, 5th Edition. Boston, MA: Course Technology, Cengage Learning.…

    • 519 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cited: Solomon, M., & Kim, D. (2013). Fundamentals of Communications and Networking. Burlington: Jones & Bartlett Learning.…

    • 304 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Finally, the system/application domain would require virtual testing of everything before any implementation, hardening of all servers, and keeping up with patches and updates regularly after testing has been completed. Some of the more efficient ways to implement better access controls in a company would start with the proper level of authorization policies including physical controls for facilities. The authorization policy would appropriate entry system access controls that specify what areas are to be locked at all times and what type of locking mechanism should be implemented. It would also include the implementation of secondary locks on specific equipment and storage cabinets…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When creating a multi-layered security plan, I would look at all seven domains of the IT infrastructure and then increase the security on each of those domains because that will increase the security for the whole plan. In the user domain, this is the quickest way for the system to be compromised the users. So I would implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will also need to be changed every 90 days and the same password cannot be used again for three calendar years. In the workstation domain, I would make sure that each workstations, whether desktop or laptop has some security on it like antivirus and malware protection installed. Laptops can be very vulnerable for loss or theft, which would make me install an encrypted hard drive so if it is stolen the data can only be retrieved by the owner. For the LAN domain, just train all users about email scams. I would guess that most users know not to access suspicious emails when on our system but I would still implement to the users a quick training course. Then I we should add spam filters this will help get rid of most of the junk email. In the LAN-to-WAN domain, we need to shut down the File Transfer Protocol (FTP) server we have running and switch it over to use secure FTP so that only users allowed on our system can access our FTP server. In the WAN domain, we need to make sure that we have firewalls set up on our network that will filter all incoming traffic. This firewall will stop all traffic coming on to our system that is not meant or not wanted our network. In the Remote Access Domain, we need to establish strict user password policies, as well as lockout policies to defend against brute force attacks, require the use of authorization tokens have a real-time lockout procedure if token is lost, or stolen. The last domain is System/Application domain we need to…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Laptops and workstations have their own set of security risks associated with them. They are vulnerable to being compromised by malware, spyware, or even hackers that take advantage of certain exploits. Laptops, workstations and mobile devices are susceptible to malicious software attacks, theft or loss. Viruses and malware can affect these devices and are usually acquired through contaminated email attachments and hyperlinks that redirect the user to exploited web sites or are transferred through USB storage devices. Viruses and malware can also be acquired by downloading infected files or programs that are designed by hackers. Because of the need to protect systems against threats, all workstations and laptops should be secured with antivirus and firewall software and updated and patched on a regular basis to fix vulnerabilities with the software that hackers may exploit. Since the laptops are mobile by nature they are at risk of being stolen along with all of the data saved on their hard drives. The best security method for this would be to encrypt the hard drives on the laptops and where feasible only store sensitive data on corporate servers…

    • 612 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week3 Hacking

    • 391 Words
    • 2 Pages

    Workstation and Desktop devices are prone to viruses, malware, and malicious software, especially if the user surfs the Internet and World Wide Web. Given that users connect to the Internet and World Wide Web, what security countermeasures can organization implement to help mitigate the risk caused from viruses, malware, and malicious software?…

    • 391 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Netw420 Week 5

    • 526 Words
    • 3 Pages

    References: * Clemm, A. Network Management Fundamentals Edition 1 (1st ed). Pearson Learning Solutions. Retrieved from http://devry.vitalsource.com/books/9781256084068/id/ch02lev2sec9…

    • 526 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Hudson, K., & Cannon, K. (2000). CCNA Guide: Cisco Networking Fundamentals. Cambridge, MA: Course Technology, a division of Thomson Learning.…

    • 1195 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Virtualize the Browser- Give user machines a virtualized instance of a pre-configured standard browser. This eliminates the freedom to surf unsafe websites, download questionable files, install browser toolkits, store passwords, etc. The virtual instance gives the ability to apply the same standards and security settings to each client machine using a copy. Even successful intruders will not be able to access the core OS or execute code…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Regan, P. (2004). Chapter 12: Introduction to Routers and Routing in Wide Area Networks. Prentice-Hall.…

    • 554 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unit 8 Assignment

    • 594 Words
    • 3 Pages

    * Is there a backup plan implemented for in case a virus does infect a computer or the network?…

    • 594 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 4

    • 1313 Words
    • 6 Pages

    Which Layer 4 protocol does EIGRP use to provide reliability for the transmission of routing information?…

    • 1313 Words
    • 6 Pages
    Good Essays
  • Best Essays

    Tomsho, G., Tittel, E., & Johnson, D. (2004). Guide to Networking Essentials, 4th Edition. Boston, MA: Course Technology. Retrieved March 18, 2008, from University of Phoenix, rEsource, NTC360—Network & Telecommunications Concepts Course Web site.…

    • 2834 Words
    • 12 Pages
    Best Essays
  • Powerful Essays

    * All computers that are connected to the network must have the standard supported anti-virus software installed and scheduled to run at regular intervals. In addition, the anti-virus software and the virus definition files must be kept up-to-date.…

    • 1030 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Ccna 1 Final Exam

    • 2829 Words
    • 12 Pages

    3 Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?…

    • 2829 Words
    • 12 Pages
    Good Essays

Related Topics