Preview

Ten Rules Industrial Ethernet

Powerful Essays
Open Document
Open Document
1289 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ten Rules Industrial Ethernet
Page 1

The Ten Rules of Industrial Ethernet

I. Thou shalt place high priority on security, for hackers lurketh, thieves stealeth and employees bungleth A Wi-Fi-enabled computer can connect to multiple networks at the same time. Your employees can give a hacker a pathway into your internal network simply by powering up a laptop. Imagine the mess an eco-terrorist could make if he didn’t like the look of your smokestack. Even your well-intentioned employees can bring a network down, simply by blundering around in areas they shouldn’t. Don’t take chances with network security. Most wireless systems employ industry-standard WEP (Wired Equivalent Privacy). A hacker can get around it within a few hours. Look into more powerful standards like Extensible Authentication Protocol and Tunneled Extensible Authentication Protocol. Never assume that your industrial Ethernet products have built-in security features. At the very least, you should use inspection-type firewalls (such as packet filters) to control any access that is based on IP source address, destination address, and port number. Don’t just talk about changing your passwords a regular basis. Do it. And don’t make them easy to guess. Consumer plug and play devices can flood your network with traffic in a "broadcast storm" as they try to selfconfigure or advertise their presence to every other node on the network. Faulty devices can vomit zillions of “runts”, or abnormally short Ethernet frames. Using switches instead of hubs will take care of those problems. Duplicate IP addresses can deactivate devices that otherwise appear to be perfectly functional. II. Thou shalt document thine installation, so that even Homer Simpson mayest discern the system whither thou goest; for to write the IP address on your hand or your forehead shall not be deemed sufficient Document your installation. When devices need to be replaced it needs to happen quickly. Things you need to know and document for every device: - Replacement

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Eyewitness testimonies are considered unreliable and were neglected for helping gather evidence in Steven Truscotts case. There are two witnesses that provided evidence that indicates that a car could have been present where Lynn Harper was rapped. George Edens found Lynn Haper's body and said you could see car skid marks. Bob Lawson said he saw a car parked near spot but he had never seen a car there before. This all corresponds with Steven Truscotts statement that he left Lynn Harper near highway 8 and saw her get into a car. Jocelyne Godette who was 13 provide the police with evidence that did not match up. She testified that she went to the bush looking for Steven that evening because they had a date. But previously she had said she went looking for Lynn. She also asked a local farmer to change his stament to match up with hers. People believed Jocelyne even though her evidence was false and made Steven look responsible . Gordon Logan who was 12, told police he looked up from fishing and saw Steven and Lynn ride across the bridge. Then, shortly afterwards he saw…

    • 553 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    unit 3 lab 3 nt1210

    • 275 Words
    • 1 Page

    Exercise 3.1.1 What would happen if wireless devices were not governed by the Wi- Fi Alliance and each vendor had its own standards and protocols? What impact would this have on your personal life or business communications? If each vendor had their own standards and protocols, we would have a harder time making devices that we use every day to inter-operate. We would to have multiple routers depending on the devices we own and probably would not be able to use internet when we’re in a café, library, or airport because of incompatibility.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    All workstations will be hard wired directly to the network. Any laptop will be connect via a cloaked wifi network. This means it will display no SSID and only allow certain MAC address access to it. WPA 2 encryption will be used with a password system similar to what is covered in the security awareness section. All server rooms will have keycard access to allow only IT access to them.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Keeping our LAN under lock and key prevent tampering of with the networks hardware. Access to the LAN devices is the easiest way to compromise a network. By also applying strict monitoring controls and current security updates are excellent security measures to implement.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    For the LAN domain, Make sure wiring closets, data centers, and computer room are secure. Use a WLAN network keys that require a password for wireless access. And implement encryption between workstation and WAP to maintain confidentiality.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. By implementing the encryption between workstations and WAP you can protect the confidentiality of data transmissions.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Students are expected to practice various skills discussed in all the technical courses in Quarters 1 through 3 of the NSA program at an employer’s site on network related tasks (more confined to the LAN and Microsoft Windows Networking with Server 2008 environments) that would involve installation, configuration, testing, maintenance and documentation of the worksite network and its components, and to properly document the technical information in all involved activities. Such documentation will be used as the source material for Items 2 and 3 defined in the Deliverables section of this document.…

    • 6754 Words
    • 32 Pages
    Satisfactory Essays
  • Good Essays

    | Describe ways to protect hardware, software and data and minimise security riskThere are steps to prevent threats to system and information: access to information sources should be allowed with Username and password/PIN selection. The system set up on password strength; how and when to change passwords (monthly); online identity/profile; Real name, pseudonym; what personal information to include, who can see the information; Respect confidentiality, avoid inappropriate disclosure of…

    • 793 Words
    • 4 Pages
    Good Essays
  • Good Essays

    To secure against attacks from the internet and the external networks the use of a strong antivirus software and internet security software in all the workstations, hosts and servers is important. In addition to this it is important to have a network security policy that will clearly stipulate the use of the Library property and also provide the guidelines on using personal resources in the library network. Since the network is private a white list of all authorised wireless networks should be maintained to avoid unauthorised access from external wireless networks. It is also important to ensure that all hardware and software is in secure zones and environments to avoid physical damage (Stallings, 2007).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    SEC 280 Week 4 Case Study

    • 425 Words
    • 2 Pages

    One of the most basic things we need to do at home is to setup a router and firewall. Many people are not aware of the security risks of not using a firewall at home. Firewalls act as shields from unwanted traffic and intrusion. There are many types of packets that a well setup firewall can defend us from without our even knowing. Securing the router with passwords was also something that for a number of years in the early days of home computing that not many people were aware of. As a consequence home networks were left wide open for anyone to connect to and explore. Once inside they will have access to any machine also on that network.…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It-242 Wlan Check Point

    • 265 Words
    • 2 Pages

    There are several ways a person can go about securing a wireless local area network, or WLAN. One of the best ways in my opinion is to not broadcast the network publicly. This does not prevent people from accessing the network, but instead prevents the network from being visible to others. A person searching for a network to connect to can easily see your network exists. Without broadcasting the network people that are not aware of your network have no way of even knowing it is there. Another way to help to secure a WLAN is by using MAC address filtering. MAC filtering requires a list of the valid MAC addresses the user wants to be able to access the network. Any computer with a MAC address that is not on the provided list will not be able to gain access to the network. These steps alone are not enough to keep a network secure but when used with other security measures such as strong passwords and encryption can make a network a lot less accessible from malicious outsiders. These individuals can be a bothersome hindrance stealing network bandwidth or far more dangerous individuals that intend to cause harm with malicious programs or viruses or to steal private information. A wireless network may never be completely secure, but it is always best practice to use as many security steps as possible to insure the safety of the data on the network.…

    • 265 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Network Hardening

    • 287 Words
    • 2 Pages

    It is very important to go through the process of hardening. Hardening is where you change the hardware and software configurations to make computers and devices as secure as possible. I picked the network layout 1-the workgroup . First with the workstations and laptops you need to shut down the unneeded services or programs or even uninstall them. I would also have some good anti-virus software on the workstations. You also need a hardened image for all of your workstations. To do this you need to install a new copy of the operating system and then harden it. After you have one good hardened workstation you can use it as a model for all other workstations and also laptops. For the router you definitely need to protect it from unauthorized access. The router needs to be password protected and you should periodically change that password. For the cable modem you should keep all unwanted ports closed. I would also schedule a regular scan of all the systems. Now for some of these next things I am talking about they will apply to all devices . Disable remote administration. Administration of your router / access point should be "local only", namely, there is no reason to let people from another country access to your network hardware. If you need to make changes, you should be local to the device. Update the firmware. Believe it or not, consumer network hardware needs to be patched also. Check the support site of the vendor of the device when you get it and check for an update. Sign up for e-mail alerts for updates, if available, or check back on a regular basis for…

    • 287 Words
    • 2 Pages
    Good Essays
  • Better Essays

    14 amendment

    • 1190 Words
    • 5 Pages

    In school, as well as throughout our daily lives, we learn in America to live by the idea of freedom and equality for all. We do not allow race, class, or creed to determine a person’s stature in the community. It may seem as if this is the standard of society, but these ideas of equality have been fought over since the beginning of written history, and even in America today, prejudice still exists. To address these and similar problems, the founding fathers of this nation created a Constitution which included laws that dealt with individual freedoms. However great the founding fathers envisioned the United States Constitution, it did not form a perfect union and justice for all. America would have to amend, or add to, the Constitution in order to serve its constituents better. The most powerful constitutional act towards equality would come with the fourteenth amendment. This amendment permanently changed constitutional law by empowering the Federal government’s jurisdiction to include local and state governments which would be required to abide by new standards of civil rights and privileges.…

    • 1190 Words
    • 5 Pages
    Better Essays