Preview

Unit 4 Assignment 1: Network Security

Satisfactory Essays
Open Document
Open Document
380 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 4 Assignment 1: Network Security
a. The goals for secure networking are availability for authorized users to access the network; confidentiality for preventing unauthorized users acces; functionality for preventing attackers from altering the operation capabilities and the access control policy driven controls
b. Network security is challenging as the methods of attacking are getting better every year. Information is gathered easily from the packets if there is no SSL connection available with the search engine
c. An example is allowing cell phones into the corporate network totally bypassing the access control strategies, firewalls, antivirus protection, data loss and prevention systems
d. In the castle model there is only one protected single point of entry. This is the way cyber security has been carried out throughout the past 20
…show more content…
This is an expression used by network administrators to convey the thought that making 100 percent network is not possible.
f. Securing a city is more complex that a castles as there is more to secure within the confinements of that city. This means that there is a need for interruption detection, virtual LAN’s, central authentication and encrypted internal traffic.
6. Chapter 4 Test Your Understanding – 11 a, b and c
a. 802.11x is a port based access control because the computer is connected to the port through UTP or directly to switch. The port is real access point control. 802.11X provides access trying to prevent unauthorized client from intruding the network.
b. When a computer is connected to any port it will not be recognized by network since it is not authenticated. After is authenticates itself all the communication in the network will traverse through it. The computer can access the network after the authentication is successful.
c. In large companies it becomes a task to authenticate every single system since it involves many workgroup switches. Having a centralized authenticating server reduces the cost by simplifying heavy authenticating

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Multiple layers can be used to secure internal threats like keeping employees from accessing inappropriate material, update and patch workstations and run current anti-virus/malware on workstations daily. The layers also help mitigate external threats like hackers by using firewalls and shutting traffic out of the internal network.…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Case Study

    • 825 Words
    • 4 Pages

    Some advantages of using this type of scenario include the ability to manage windows workgroup since has a small number of computers that can be managed individually. Application servers, services or workstation software can be run off one or few machines rather than employing extensive active directory schema changes to be accomplished in a domain model. Complying with third party vendors' software and hardware can be achieved in a simple manner and migrating or installing new operating systems is an easy task that it would not be an option in a Windows Active Directory domain.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Paquet, C. (2013, February 5). Security Policies > Network Security Concepts and Policies. Retrieved from http://www.ciscopress.com/articles/article.asp?p=1998559&seqNum=3…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    Authorized secure remote access, Traffic inspection and Coordinated Threat Control, Centralized security management and enterprise-wide visibility and control.…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    This domain needs strict security controls given the risks and threats of connecting to the internet. This domain is where all data travels into and out of the IT infrastructure. A security solution for unauthorized access through the LAN-to-WAN domain is to apply strict security monitoring controls for intrusion detection and prevention.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    In the workstation domain, we need to make sure that each of the workstations, whether desktop or laptop, has to have antivirus and malware protection installed on them. Express strict access control polices and standards. And mandate annual security awareness training for all employees…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 2 Lan

    • 272 Words
    • 2 Pages

    Define a LAN-to-WAN, Internet, and Web surfing AUP that restricts usage of the company’s Internet connection and permits the company to monitor usage of the corporate Internet connection. Carefully evaluate the implications of each policy and how implementations might impact the IT infrastructure, both positively and negatively. Weigh the benefits and the disadvantages of each method. Consider whether or not a proposed solution causes an interruption to the legitimate users and how it might bring security at the expense of preventing a perfectly legitimate…

    • 272 Words
    • 2 Pages
    Good Essays
  • Good Essays

    These are basic steps towards securing the central database from attacks such as denial of service that is mainly caused by unauthorised access. The strategy is simple and less costly thus cannot cause strain on the budget.…

    • 349 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Consistent standards for network access and authentication are critical to the company’s information security and are often required by regulations or third-party agreements. Any user accessing the company’s computer systems has the ability to affect the security of all users of the network. An appropriate Network Access and Authentication Policy reduces the risk of a security incident by requiring consistent application of authentication and access standards across the network.…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Evolution of the Internet

    • 777 Words
    • 4 Pages

    Many years ago a network was born having several computers connected and now, that same network has millions of computers connected at all times, it's called the Internet. This paper will explain the evolution and growth of the Internet. It's like a plague growing across the world, signs of its growth are seen everywhere. The Internet was started as an experiment to test networks to try and develop a network that could survive a nuclear attack. While the net has never needed to survive a nuclear blast its design has proven again and again how robust it is. It has with stood many attacks from construction to lightning blowing up a router. The network has always recovered and bypassed the problem.…

    • 777 Words
    • 4 Pages
    Good Essays