Preview

Mia Casa Network

Satisfactory Essays
Open Document
Open Document
294 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mia Casa Network
| Brian Kirton | IT283-01 | | Week 6 Assignment | Kaplan University |

|

Wide Area Network

1. Current Mia Casa Foods-LA

2. Proposed Mia Casa Foods-LA

3. Explanation of proposed network My proposed network consists of six servers each firewalled, routed, and switched. Subnets created and composed of 250 workstations per 6 D-link-Layer 3-48 port 10/100/1000 switches which are a high performance LAN device. Using subnets makes the routing process simpler and data flow faster which lessens traffic problems. Basically, sub netting divides this large network into smaller and easier to handle networks. 4. Antivirus Software can be a number of choices. Upgrading already used antivirus would probably work as well as any other antivirus available. 5. Securing individual machines can be done with firewalled routers which protect an entire network. Individual machines therefore could use software firewalls and/or install the secure browser. Administrators can also configure firewalls to stop certain traffic that does not meet specifications. Cleaning the machines by removing un-needed programs and software, and not knowing administrators credentials is a plus. 6-7. Adding security to the webpage and intranet webpage could be done by hiring a good web-site developer. 8. Issues of updating software can be accomplished by using Windows Server Update Services for any Microsoft products. Any custom software or in-house software should be updated and taken care of by the company’s developers. Any software that was purchased from a third party should be updated by the third party.

References Dye, M. A., McDonald, R., & Rufi, A. W. (2008). Network Fundamentals: CCNA Exploration Companion Guide. Indianapolis, IN: Cisco. Foundations In Information Technology: Pearson Custom Publishing
Dean, T. (2010). Network+ Guide to Networks (5th Ed.) Boston, MA: Course



References: Dye, M. A., McDonald, R., & Rufi, A. W. (2008). Network Fundamentals: CCNA Exploration Companion Guide. Indianapolis, IN: Cisco. Foundations In Information Technology: Pearson Custom Publishing Dean, T. (2010). Network+ Guide to Networks (5th Ed.) Boston, MA: Course Technology.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Cited: Solomon, M., & Kim, D. (2013). Fundamentals of Communications and Networking. Burlington: Jones & Bartlett Learning.…

    • 304 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Virtualize the Browser- Give user machines a virtualized instance of a pre-configured standard browser. This eliminates the freedom to surf unsafe websites, download questionable files, install browser toolkits, store passwords, etc. The virtual instance gives the ability to apply the same standards and security settings to each client machine using a copy. Even successful intruders will not be able to access the core OS or execute code…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 4

    • 1313 Words
    • 6 Pages

    Which Layer 4 protocol does EIGRP use to provide reliability for the transmission of routing information?…

    • 1313 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    When creating a multi-layered security plan, I would look at all seven domains of the IT infrastructure and then increase the security on each of those domains because that will increase the security for the whole plan. In the user domain, this is the quickest way for the system to be compromised the users. So I would implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will also need to be changed every 90 days and the same password cannot be used again for three calendar years. In the workstation domain, I would make sure that each workstations, whether desktop or laptop has some security on it like antivirus and malware protection installed. Laptops can be very vulnerable for loss or theft, which would make me install an encrypted hard drive so if it is stolen the data can only be retrieved by the owner. For the LAN domain, just train all users about email scams. I would guess that most users know not to access suspicious emails when on our system but I would still implement to the users a quick training course. Then I we should add spam filters this will help get rid of most of the junk email. In the LAN-to-WAN domain, we need to shut down the File Transfer Protocol (FTP) server we have running and switch it over to use secure FTP so that only users allowed on our system can access our FTP server. In the WAN domain, we need to make sure that we have firewalls set up on our network that will filter all incoming traffic. This firewall will stop all traffic coming on to our system that is not meant or not wanted our network. In the Remote Access Domain, we need to establish strict user password policies, as well as lockout policies to defend against brute force attacks, require the use of authorization tokens have a real-time lockout procedure if token is lost, or stolen. The last domain is System/Application domain we need to…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Finally, the system/application domain would require virtual testing of everything before any implementation, hardening of all servers, and keeping up with patches and updates regularly after testing has been completed. Some of the more efficient ways to implement better access controls in a company would start with the proper level of authorization policies including physical controls for facilities. The authorization policy would appropriate entry system access controls that specify what areas are to be locked at all times and what type of locking mechanism should be implemented. It would also include the implementation of secondary locks on specific equipment and storage cabinets…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Laptops and workstations have their own set of security risks associated with them. They are vulnerable to being compromised by malware, spyware, or even hackers that take advantage of certain exploits. Laptops, workstations and mobile devices are susceptible to malicious software attacks, theft or loss. Viruses and malware can affect these devices and are usually acquired through contaminated email attachments and hyperlinks that redirect the user to exploited web sites or are transferred through USB storage devices. Viruses and malware can also be acquired by downloading infected files or programs that are designed by hackers. Because of the need to protect systems against threats, all workstations and laptops should be secured with antivirus and firewall software and updated and patched on a regular basis to fix vulnerabilities with the software that hackers may exploit. Since the laptops are mobile by nature they are at risk of being stolen along with all of the data saved on their hard drives. The best security method for this would be to encrypt the hard drives on the laptops and where feasible only store sensitive data on corporate servers…

    • 612 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. By enabling password protection on all workstations and implementing a three try timeout/lockout on an un-successful entered password, you can protect your company from unauthorized users trying to gain access by password hacking.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Netw420 Week 5

    • 526 Words
    • 3 Pages

    References: * Clemm, A. Network Management Fundamentals Edition 1 (1st ed). Pearson Learning Solutions. Retrieved from http://devry.vitalsource.com/books/9781256084068/id/ch02lev2sec9…

    • 526 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Unit 8 Assignment

    • 594 Words
    • 3 Pages

    * Are there user ID and passwords on all the computers to prevent unauthorized access?…

    • 594 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Week3 Hacking

    • 391 Words
    • 2 Pages

    Workstation and Desktop devices are prone to viruses, malware, and malicious software, especially if the user surfs the Internet and World Wide Web. Given that users connect to the Internet and World Wide Web, what security countermeasures can organization implement to help mitigate the risk caused from viruses, malware, and malicious software?…

    • 391 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Regan, P. (2004). Chapter 12: Introduction to Routers and Routing in Wide Area Networks. Prentice-Hall.…

    • 554 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    * All computers that are connected to the network must have the standard supported anti-virus software installed and scheduled to run at regular intervals. In addition, the anti-virus software and the virus definition files must be kept up-to-date.…

    • 1030 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Networking basics

    • 519 Words
    • 3 Pages

    References: Dean, Tamara (2010). Network+ Guide to Networks, 5th Edition. Boston, MA: Course Technology, Cengage Learning.…

    • 519 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Ccna 1 Final Exam

    • 2829 Words
    • 12 Pages

    3 Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?…

    • 2829 Words
    • 12 Pages
    Good Essays

Related Topics