Preview

NT1330 Unit 3 Assignment 3

Good Essays
Open Document
Open Document
1030 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT1330 Unit 3 Assignment 3
Desktop and laptop grouping them together because they are so similar the device they self-are not security concerns. It the operation system that would have the security concerns, that is why they have patches for the OS.
Server this goes back to the OS, but with a server, you have a different level of access can be assigned to users. A report that conducted by Kaspersky Labs ("Global IT Security Risks Surve2014," 2014) stated that even virtualized have security risk that needs to watch.
Netbook security concerns mostly know as Google these have Chrome OS, which runs Linux the major security risk that could be associated with the Netbook is that the source code is open source. However, mostly the device have a distributor that would issue the OS of Linux, by doing this they may lock down the source code to wear it could be access. Moreover, Linux does not have too many virus or threats known to its name this makes to where not too many threats.
…show more content…
Also, make sure that the OS is up-to-date including all the software.
Firewall these devices are designed to keep threats out of the company network, but unfortunately, the devices are configured by humans which can have error or security risks put in place to take over the network.
Routers these are the same setup as the firewall, by users to config the setting the one thing the company does not want to do is use the default setting for any router. Routers are the essential, but workhorses of modern computer networking yet few users realize they are computers, with their operating systems, software, and vulnerabilities.
Switch security concerns again this would be the same as router and firewall these devices are set up by humans. So the interaction they have with them has to be careful that plans are laid out for setting up the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Now, select a virtual switch depending on how you have configured the host. Proceed to the configuration of port properties. Give the port a specific name. I have given the label as ‘VMK’. Enter VLAN ID if there is any or else chose ‘None’. Put a check next to the ‘Virtual SAN traffic’ box and then click ‘Next’. Now start with configuring IPv4 settings for this port. After completing that, click ‘Next’. Click on the finish button to end the configuration for port group creation. Make sure that the group is created. Again a new window will pop up showing the devices created and their respective IP addresses. After confirming that the host is created, repeat this procedure two more times, since we require at least three hosts for configuring VSAN.…

    • 229 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 5 Assignment 1

    • 1348 Words
    • 6 Pages

    4. The server accept the connection and to send the data from server to client and vice…

    • 1348 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    a) Firewalls: Controls the traffic flow between a trusted network and an untrusted network. Usually firewalls are used to protect the boundaries of a network.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    robust hardware based firewall. Having an intranet is a key feature that will enable the…

    • 4187 Words
    • 22 Pages
    Powerful Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    Firewalls are hardware or software-based network security system that controls the outgoing and incoming network traffic by analyzing the data packets and determining whether they should be allowed through or not based upon the settings. A firewall establishes a barrier between a trusted, secure internal network and another network that is not assumed to be secure and trusted. Many computers and other hardware such as routers and modems have built-in firewall capabilities. These firewalls can be effective with little or no configuration. Software firewalls can be installed on your computer and can be configured according to your needs. Many software firewalls have user defined controls for setting up safe file and printer sharing and to block unsafe applications from running on your computer. Software firewalls may also incorporate privacy controls and web content…

    • 498 Words
    • 2 Pages
    Good Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Keeping our LAN under lock and key prevent tampering of with the networks hardware. Access to the LAN devices is the easiest way to compromise a network. By also applying strict monitoring controls and current security updates are excellent security measures to implement.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Unit 8 Assignment 1

    • 509 Words
    • 3 Pages

    Zone –Alarm is a two way firewall. The software is free! It also provides an array of features like identity theft protection, online backup’s, and web security. Linksys has firewall settings on their SOHO routers. These firewalls protect the entire network. Most of the SOHO routers on the market today are wireless and provide all different types of wireless security including WPA 2 and also allowing for parental control. Firewalls are sometimes bought as a standalone device but most of the time these days they are built into the router. Software routers are installed on your computer and protect your computer from unwanted traffic.…

    • 509 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    wk 4 lab 2

    • 403 Words
    • 1 Page

    1. Unauthorized network probing and port scanning. IP router, firewall and network appliance operation system vulnerability.…

    • 403 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    G. Work in pairs. Now go back to exercise D. Use five words in the vocabulary box to help you make another five sentences about a list of things to do or take for a picnic. Remember to use imperatives.…

    • 60 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    After further review to three relevant sections: hardware, software and policy, Aircraft Solutions needs special attention to hardware and policy relates processes. The Defense Division is routed through Headquarters, the Commercial Division is however directly connected to the Internet, but no firewall has been setup. This action is a concern for Aircraft Solutions. A policy vulnerability that has been noticed is the rule that states “routers and firewalls rule-sets would be evaluated once in every two years”. With today’s world and technology changing ever so often security threats happen by Internet hackers, on an everyday basis. This is a rather impractical and long time span for a company to ensure that their security measures are up-to-date. These weaknesses are detailed in the sections below:…

    • 745 Words
    • 3 Pages
    Good Essays
  • Good Essays

    He or she must read magazines and journals to learn about commonly available technologies that can be used on a network or work in parallel to it. For example, security personnel must be aware of how electrical power-line network adapters work. By understand how this technology works, the security administrator can can prevent an employee from setting up a second Ethernet adapter in his or her computer, creating a workgroup of covert network of employees communicating and running a private business over the electrical wires in the building.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Better Essays

    One needs to consider the security setting for the network devices. There are some basic configurations that one can choose to use in their configuration. Passwords and a username should be used for consoling and remote access to any network device. Enable passwords and encrypting those password are best practice’s for any engineer. Configuration of a username and password for virtual lines, will help in keeping unwanted persons out of your network device along with, a banner upon logging into a device. Banners are messages that will display a warning to any unauthorized person looking to access the device. Shutting down unused ports in a switch, will keep unwanted clients of the network and people from just plugging a laptop into the port for access.…

    • 1491 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    As The Organization

    • 338 Words
    • 2 Pages

    Having the computers and other network devices managed by authentication through a server will keep unauthorized devices from accessing the network, and ensure the overall integrity of the network as a whole.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Desktop vs. Laptops

    • 620 Words
    • 3 Pages

    Laptops have few disadvantages to them. The do not come with a mouse and would have to buy one separate. Laptops are more delicate and can brake easily if dropped. It is harder to type on them because keyboards are usually smaller. You always have to have a power cord with you if bringing it somewhere because the power runs out on them faster. If you are not in a place that has a plug then your laptop will not work if not powered up. Laptops can be stolen more easier then desktops because the are more portable and smaller…

    • 620 Words
    • 3 Pages
    Good Essays
  • Good Essays

    There are many likenesses when it comes to desktop and laptop computers. Things like being able to use the internet, or the types of programs, or operating systems, and the memory capacity of your computer. When using computers, all of them are internet compatible; all you have to do is have an internet provider. Both types can use the same programs as long as they have…

    • 457 Words
    • 2 Pages
    Good Essays