Preview

Unit 4 Assignment 1: Network Security

Satisfactory Essays
Open Document
Open Document
380 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 4 Assignment 1: Network Security
a. The goals for secure networking are availability for authorized users to access the network; confidentiality for preventing unauthorized users acces; functionality for preventing attackers from altering the operation capabilities and the access control policy driven controls
b. Network security is challenging as the methods of attacking are getting better every year. Information is gathered easily from the packets if there is no SSL connection available with the search engine
c. An example is allowing cell phones into the corporate network totally bypassing the access control strategies, firewalls, antivirus protection, data loss and prevention systems
d. In the castle model there is only one protected single point of entry. This is the way cyber security has been carried out throughout the past 20
…show more content…
This is an expression used by network administrators to convey the thought that making 100 percent network is not possible.
f. Securing a city is more complex that a castles as there is more to secure within the confinements of that city. This means that there is a need for interruption detection, virtual LAN’s, central authentication and encrypted internal traffic.
6. Chapter 4 Test Your Understanding – 11 a, b and c
a. 802.11x is a port based access control because the computer is connected to the port through UTP or directly to switch. The port is real access point control. 802.11X provides access trying to prevent unauthorized client from intruding the network.
b. When a computer is connected to any port it will not be recognized by network since it is not authenticated. After is authenticates itself all the communication in the network will traverse through it. The computer can access the network after the authentication is successful.
c. In large companies it becomes a task to authenticate every single system since it involves many workgroup switches. Having a centralized authenticating server reduces the cost by simplifying heavy authenticating

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 4 Assignment 2

    • 1005 Words
    • 5 Pages

    Conducting actions irrelevant to their work, such as playing games, listening to music, watch videos, and etc.…

    • 1005 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Multiple layers can be used to secure internal threats like keeping employees from accessing inappropriate material, update and patch workstations and run current anti-virus/malware on workstations daily. The layers also help mitigate external threats like hackers by using firewalls and shutting traffic out of the internal network.…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Paquet, C. (2013, February 5). Security Policies > Network Security Concepts and Policies. Retrieved from http://www.ciscopress.com/articles/article.asp?p=1998559&seqNum=3…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    In the WAN domain, enforce encryption, and VPN tunneling for remote connections. Configure routers, and network firewalls to block Ping requests to reduce chance of Denial of Service attacks. Deployment of…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 2 Lan

    • 272 Words
    • 2 Pages

    Define a LAN-to-WAN, Internet, and Web surfing AUP that restricts usage of the company’s Internet connection and permits the company to monitor usage of the corporate Internet connection. Carefully evaluate the implications of each policy and how implementations might impact the IT infrastructure, both positively and negatively. Weigh the benefits and the disadvantages of each method. Consider whether or not a proposed solution causes an interruption to the legitimate users and how it might bring security at the expense of preventing a perfectly legitimate…

    • 272 Words
    • 2 Pages
    Good Essays
  • Good Essays

    To secure the network and ensure a degree of protection from external intrusion, the first step is to ensure it is a private network and each host in the different remote locations is part of the private network; this minimizes the intrusion from public networks. Through the use of firewalls in the central computer network enforces authentication of all users in the network thus minimizing internal and external unauthorised access (Stallings, 2007).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Sec 280 Week 1

    • 667 Words
    • 3 Pages

    In today’s age with more and more computers being connected to the internet every day the presence of these new users on the global network creates an issue of security. Common questions might be as follows, how do I keep my network secure from the outside world? What can I do as an individual to keep us safe? Can we implement any new policy’s to counter this threat? These are all great questions and it is my task to answer these question first I must begin by explaining what threats we face and how to deal with those threats accordingly.…

    • 667 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab8 1 Some Common Risks

    • 505 Words
    • 3 Pages

    Using multi-factor authentication is a recommended best practice when implementing a Remote Access Policy server user authentication service (Scarfone, Hoffman, & Souppaya, 2009).…

    • 505 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Consistent standards for network access and authentication are critical to the company’s information security and are often required by regulations or third-party agreements. Any user accessing the company’s computer systems has the ability to affect the security of all users of the network. An appropriate Network Access and Authentication Policy reduces the risk of a security incident by requiring consistent application of authentication and access standards across the network.…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Evolution of the Internet

    • 777 Words
    • 4 Pages

    Many years ago a network was born having several computers connected and now, that same network has millions of computers connected at all times, it's called the Internet. This paper will explain the evolution and growth of the Internet. It's like a plague growing across the world, signs of its growth are seen everywhere. The Internet was started as an experiment to test networks to try and develop a network that could survive a nuclear attack. While the net has never needed to survive a nuclear blast its design has proven again and again how robust it is. It has with stood many attacks from construction to lightning blowing up a router. The network has always recovered and bypassed the problem.…

    • 777 Words
    • 4 Pages
    Good Essays