NT1330 Unit 3 Assignment 3

Good Essays
Desktop and laptop grouping them together because they are so similar the device they self-are not security concerns. It the operation system that would have the security concerns, that is why they have patches for the OS.
Server this goes back to the OS, but with a server, you have a different level of access can be assigned to users. A report that conducted by Kaspersky Labs ("Global IT Security Risks Surve2014," 2014) stated that even virtualized have security risk that needs to watch.
Netbook security concerns mostly know as Google these have Chrome OS, which runs Linux the major security risk that could be associated with the Netbook is that the source code is open source. However, mostly the device have a distributor that would issue the OS of Linux, by doing this they may lock down the source code to wear it could be access. Moreover, Linux does not have too many virus or threats known to its name this makes to where not too many threats.
…show more content…
Also, make sure that the OS is up-to-date including all the software.
Firewall these devices are designed to keep threats out of the company network, but unfortunately, the devices are configured by humans which can have error or security risks put in place to take over the network.
Routers these are the same setup as the firewall, by users to config the setting the one thing the company does not want to do is use the default setting for any router. Routers are the essential, but workhorses of modern computer networking yet few users realize they are computers, with their operating systems, software, and vulnerabilities.
Switch security concerns again this would be the same as router and firewall these devices are set up by humans. So the interaction they have with them has to be careful that plans are laid out for setting up the

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 4503 Words
    • 19 Pages

    From the knowledge gained, the student are requires to draft a new version of OS that include a new name for the OS , LOGO, design principles and so on and prepare for the Report and presentation…

    • 4503 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Unit 8 Assignment 1

    • 509 Words
    • 3 Pages

    Zone –Alarm is a two way firewall. The software is free! It also provides an array of features like identity theft protection, online backup’s, and web security. Linksys has firewall settings on their SOHO routers. These firewalls protect the entire network. Most of the SOHO routers on the market today are wireless and provide all different types of wireless security including WPA 2 and also allowing for parental control. Firewalls are sometimes bought as a standalone device but most of the time these days they are built into the router. Software routers are installed on your computer and protect your computer from unwanted traffic.…

    • 509 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    wk 4 lab 2

    • 403 Words
    • 1 Page

    1. Unauthorized network probing and port scanning. IP router, firewall and network appliance operation system vulnerability.…

    • 403 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    One needs to consider the security setting for the network devices. There are some basic configurations that one can choose to use in their configuration. Passwords and a username should be used for consoling and remote access to any network device. Enable passwords and encrypting those password are best practice’s for any engineer. Configuration of a username and password for virtual lines, will help in keeping unwanted persons out of your network device along with, a banner upon logging into a device. Banners are messages that will display a warning to any unauthorized person looking to access the device. Shutting down unused ports in a switch, will keep unwanted clients of the network and people from just plugging a laptop into the port for access.…

    • 1491 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    After reviewing the new network design, we have seen several threats and came up with countermeasures to prevent these attacks. The first threat is the connection between the internet and the company’s router and connection between the wireless router and switch. Hackers, viruses, and malware can easily get in through this connection and infect the network. The countermeasure for this is a firewall or intrusion detection system. This equipment will help detect any unwanted guests the get onto the network. You can control what traffic comes in and out of your network. Next would be the wireless router being unsecured. If this router is left open and SSID board casting, any within its range can access the company’s network. A countermeasure for this is password encryption and stealth id. Hiding the id of the router will allow it to be hidden from anyone scanning for wireless routers to use. Encryption password puts a lock on the router to where only people with the key can access the router. The last threat would be the workstations and laptops. Users make the most mistakes on these machines. They download and go to places they shouldn’t which causes the risk of viruses and hackers. Countermeasures are Anti Viruses, patches, and teaching. Anti-viruses will help protect against viruses and malware that can allow hackers to enter the system and still information. It’s important to keep the definitions up to date so the AV can protect against the latest viruses. Updating OS with patches can also prevent security threats. Teaching users the dos and don’ts of security issues can help them be aware of the threats and what they should do to help prevent risks from occurring.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    After further review to three relevant sections: hardware, software and policy, Aircraft Solutions needs special attention to hardware and policy relates processes. The Defense Division is routed through Headquarters, the Commercial Division is however directly connected to the Internet, but no firewall has been setup. This action is a concern for Aircraft Solutions. A policy vulnerability that has been noticed is the rule that states “routers and firewalls rule-sets would be evaluated once in every two years”. With today’s world and technology changing ever so often security threats happen by Internet hackers, on an everyday basis. This is a rather impractical and long time span for a company to ensure that their security measures are up-to-date. These weaknesses are detailed in the sections below:…

    • 745 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    Firewalls are hardware or software-based network security system that controls the outgoing and incoming network traffic by analyzing the data packets and determining whether they should be allowed through or not based upon the settings. A firewall establishes a barrier between a trusted, secure internal network and another network that is not assumed to be secure and trusted. Many computers and other hardware such as routers and modems have built-in firewall capabilities. These firewalls can be effective with little or no configuration. Software firewalls can be installed on your computer and can be configured according to your needs. Many software firewalls have user defined controls for setting up safe file and printer sharing and to block unsafe applications from running on your computer. Software firewalls may also incorporate privacy controls and web content…

    • 498 Words
    • 2 Pages
    Good Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Keeping our LAN under lock and key prevent tampering of with the networks hardware. Access to the LAN devices is the easiest way to compromise a network. By also applying strict monitoring controls and current security updates are excellent security measures to implement.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    As The Organization

    • 338 Words
    • 2 Pages

    Having the computers and other network devices managed by authentication through a server will keep unauthorized devices from accessing the network, and ensure the overall integrity of the network as a whole.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 3 Assignment 1

    • 5050 Words
    • 21 Pages

    This is a rudimentary diagram representing the basic network that is employed in the Boston College Rochford Campus.…

    • 5050 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 3 Assignment 3

    • 4996 Words
    • 20 Pages

    This document is copyrighted by the National Fire Protection Association (NFPA), 1 Batterymarch Park, Quincy, MA 02269-9101 USA.…

    • 4996 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    INDP Part 3

    • 1311 Words
    • 4 Pages

    The equipment expected to effectively set up the LAN networks at every area are a switch/firewall mix, a modem, remote network interface cards for every workstation, and the cabling important to associate the switch to the modem and the modem to the Internet to secure the WAN association. Servers and their arrangement additionally have influence in keeping networks and information safe. Each bit of equipment and programming are essential in shielding the network and the information from electronic dangers.…

    • 1311 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    He or she must read magazines and journals to learn about commonly available technologies that can be used on a network or work in parallel to it. For example, security personnel must be aware of how electrical power-line network adapters work. By understand how this technology works, the security administrator can can prevent an employee from setting up a second Ethernet adapter in his or her computer, creating a workgroup of covert network of employees communicating and running a private business over the electrical wires in the building.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Satisfactory Essays

    a) Firewalls: Controls the traffic flow between a trusted network and an untrusted network. Usually firewalls are used to protect the boundaries of a network.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays