Preview

What Are The Two Types Of Network Security Technologies That Can Be Implemented By Tedbrothers Inc.?

Powerful Essays
Open Document
Open Document
1337 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
What Are The Two Types Of Network Security Technologies That Can Be Implemented By Tedbrothers Inc.?
The two (2) types of network security technologies that can be implemented by TedBrothers Inc are SSH and SSL.
The first type of network security technologies that can be implemented by the TedBrothers Inc are the SSL.SSL are the secure sockets layer. SSL is the standard security technology for encrypted link between a server and a client. It usually on the web server and browser only. The SSL can also allow sensitive information such as credit card numbers, and login credential for transmitted securely. To encrypt and decrypt the SSL, it need a certificate to do so. The second type of network security technologies that can be implemented by the TedBrothers Inc are the SSH. SHH are the Secure Shell or Secure Socket Shell. It is a UNIX-based
…show more content…
Step 4: the web server then decrypt the symmetric session key with the using the private key and then send back an acknowledgement encrypted.
Step 5: then the web browser and web server are now encrypt all transmitted data with the session
…show more content…
SSH with a firewall can protect the network by start at the edge and use the firewall to block any access to SHH if there is unauthorized IP addresses. For instance, if the network has like road warriors, the VPN can be used to provide the secured access. It provides a very secured to the network which it is first layer of the security. If the company doesn’t have firewall hardware to protect the network, the company can use the IPTables to limit the SSH access. Restrict users which can be limit the certain users to log on to the network, with the use of AllowUsers directive, the network can be limit the access. It doesn’t require password which SSH only use keys to provide verifications. If the company using the keys, the company can completely disabled the password-based login. By installing this, if the employee had the password, they still cannot login. The image above is the sample image of the Cisco 800 Series Router. This type of router are suitable for starter, beginner or small business. It provide lots of useful for the business or the company itself. The router contains of the enterprise-grade security, the router are also having built-in WAN optimization which include the Gigabit Ethernet, 3G and 4G and also support fiber optics, and also the router can have cloud-application connectivity for transferring files from other employees to

You May Also Find These Documents Helpful

  • Satisfactory Essays

    - SSL and HTTPS will applied to online transactions. Enabling encrypted connection through user login to encrypted pages until sign out. (System/ Application Domain & LAN Domain & Remote Access Domain)…

    • 565 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    • Authentication – the process for “trust” connection establishing between the server and the applier;…

    • 767 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Terminal Services Role enables users working at another computer on the company network or on the Internet to establish a connection to a server and open an application or desktop session there.…

    • 1432 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 3253 Words
    • 14 Pages

    For this you need to edit the /etc /network/interfaces file and you need to add the…

    • 3253 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    ____ supports advanced authentication and encryption technologies; however, it requires Windows machines on both sides of any remote connection.…

    • 817 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    INDP Part 3

    • 1311 Words
    • 4 Pages

    The equipment expected to effectively set up the LAN networks at every area are a switch/firewall mix, a modem, remote network interface cards for every workstation, and the cabling important to associate the switch to the modem and the modem to the Internet to secure the WAN association. Servers and their arrangement additionally have influence in keeping networks and information safe. Each bit of equipment and programming are essential in shielding the network and the information from electronic dangers.…

    • 1311 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 406 Words
    • 2 Pages
    Good Essays
  • Good Essays

    It255 Assignment 8

    • 309 Words
    • 2 Pages

    The more time you spend hardening your network, the safer it will be for not only your customers but your employees as well. Your Human Resources department will undoubtedly have confidential personal information on file for every employee. This could include social security numbers, information on dependents, emergency contacts, home addresses and telephone numbers, etc. That information will most likely be stored in an electronic format somewhere on your network. Keeping that information safe and secure from prying eyes should be a…

    • 309 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab #3

    • 517 Words
    • 3 Pages

    To encrypt a server, you would need to redirect all the incoming web traffic to…

    • 517 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT1210 Final Exam Review

    • 726 Words
    • 3 Pages

    Truth Table 0 AND 0 = False (0) / 1 AND 0 False (0) / 1 AND 1 True (1)…

    • 726 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unsecured Networks – Risk from using unsecured networks can be mitigated but not eliminated. Us encryption technologies to protect the confidentiality and integrity of communications, as well as using mutual authentication mechanisms to verify the identities of both endpoints…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Having well-developed protocols on issues of security, as well as utilizing such well-developed protocols as part of a strategy in attending to security issues, and periodically reviewing such utilized security protocols as time passes-by in order to increase efficiency is the most enduring way to keep enriching the practices of , and in strengthening US homeland security. Due to lack of a single security protocol that could be utilized effectively in attending to all issues pertaining to security, the US government has continued to developing new security protocols, and equally deploys Existing Security Instruments (ESI) such as the…

    • 2640 Words
    • 11 Pages
    Best Essays
  • Satisfactory Essays

    Project Part 1

    • 430 Words
    • 2 Pages

    As we enter a new age of computers and the use of the internet to conduct our business we open ourselves up to a new type of threat. Data and identity theft have become a real problem for many financial and government institutions. To combat this threat Richman Investments has implemented security measures at all seven domains in our IT structure. The seven domains include the User, Workstation, LAN, LAN to WAN, WAN, Remote Access, and System/Application layers.…

    • 430 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    Answer the following questions by filling in the blank using the proper technology or cryptography terms you have learned in class:…

    • 385 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays