Saturday, March 9, 2019
Computer networks assignment
C satisfactory Maximum data grade speed cat 5 Single Mode Fiber assembly line gasps Recommendations Connector Reasons Category e, reasons for purchasing cat depute cable. Cat e cable is the most popular of all http cables, Has a superior bandwidth as comp ared with cat cable. RAJA 45 interrelateor since it is the standard connector utilize to connect to a device and also for wall-plate liaisons. Multi-mode fiber-optic cable square(a) tip connector (SC). Commonly routined as a backbone, fast, chroma susceptible to eavesdropping.Straight tip connector is commonly utilize in Ethernet interlocks that use fiber-optic backbones, more so it is popular for use with multi-mode fiber-optic cable. web Topology for the office Office 1 Task 2 The said(prenominal) design applies to the other offices. Methods for safe intranet 1. Use intranet ground VPN 2. Use of earmark. Advantages of intranet based VPN They enable secure broadband connections (through cable modems, DSL, etc. ). The y mountain acquire signifi mintt communication savings in particular when lots of out-of-door drug users dial-in from outside the local calling area.Secure the connection between the client and SP. generate unauthorized users from tapping into the intranet. Extended connectivity and lower terms. Altered. Disadvantages of intranet based VPN Are non climbable and are more complex that NAS initiated VPN. The need to manage software on the client machines. NAS-initiated Access VPN connections are restricted to pops that depose support VPN. Do not encrypt the connection, between the client and the ISP, but rely on the trade protection of the EST..Advantages of use authentication User id and password is the least dear(predicate) authentication method to use. User ids and passwords can be changed some(prenominal) clock at the users choice, what is more most users know how to change them. No need to install plain software in the case of using ids and passwords. Token authenti cation can be used for login and transaction authentication employments effectively. Biometric authentication is difficult to compromise. Disadvantages of development Authentication d and password authentication is Weak and susceptible to legion(predicate) attacks.Token authentication involves additional costs, such as the cost of the token and any replacement fees. Token authentication requires some amount of user training. security depends on the users ability to maintain the user ID and password secret. Biometric authentication unremarkably involves cost for support and maintenance. Protocols Intranet VPN protocols Pipes or IP guarantor is used to secure Internet communications. Its normally used as a security report for the other protocols. Its considered the standard VPN protocol, specially for site-to-site VPN.PPTP-Point to grade tunneling protocol, a data fall in protocol that establishes a connection between two communicateing nodes, it creates the virtual connect ion across the internet, and extends connection authentication, transmission encryption and compression. LOTT, Layer Two Tunneling Protocol, it does not provide encryption and it relies on PPTP protocol to do this. Authentication cardinal way authentication protocol. Mutual way authentication protocol-protocol that enables both the point of origin and the point of termination of a communication link to curse or authenticate each other.Amended-Schroeder Protocol Media required for connecting the offices Internet metier It acts as a connection long suit Router I. E router to router VPN is used to connect separate offices in assorted locations. Software- net income management software. Internet-To act as medium for connection purposes. Software to enable the devices to communicate and be able to hop out and receive discipline. Sips Hardware requirements to connect the Four Offices 2. Switch. 3. Firewall How plan of attack can be provided to the fraternity intranets via extran et.Staff access their computers in whatever the location they are, they then provide their ids or swords to the companys website upon which they are verified to be the genuine provide, after existence authenticated through the extranet VPN, they are finally suffered to access the offices, if a user tries to sharply access the intranet the firewall in between detects and shuts of the intruder. Intranet and extranet Diagrams Task 3 Security issues related to Intranets and extranets Unauthorized Access An unauthorized person gains access to a companys computer system and access sensitive information.Misuse of user privileges An employee or supplier authorized to use the system for one purpose misuses it for another purpose other than for what it is should be. Users or telecommuters accessing the corporate intranet from their home can or some times expose sensitive data as it is being sent over the wire. Security breaches- at certain times the intranet will experience crotchety traffic like spam, pushing, Edward and mallard. Networks attacks- there can be a network attack in form of forceful intrusion into the intranet or extranet.Lack of encryptions at sometimes confidential information is sh give birth to unauthorized personnel because of the lack of using encryption. Usability problems- omen users will use the intranet improperly through not crafty how to search, retrieve, send and receive information. Weak passwords some users use weak passwords, they hold open them down, never change them and in the end forget their content users are vulnerable to dangerous content like Trojan, worms and viruses that attach on emails.Violations of security policies some users make an attempt to penetrate the network forcefully and illegally without clearance and permission. Protection From viruses Trojan and other threats 1) Adoption of intrusion catching barroom system in the network to offer retention against network attacks. 2) Deployment of effective ema il filters and firewalls to block against suspicious traffic from entering the network. 3) Authentication through use of passwords, smart cards and biometric scanners to over number unauthorized access in the network. ) Use of intranet monitoring soft wares by companies so as to check and monitor what their employees are doing on the intranet or on their own PC. 5) Strict adherence to the security policies put in place by the company any violations of the security policies should be met with strict consequences. 6) Users on the intranet mustiness remember to always update and maintain their security software on every PC and server on the network to ensure protection. 7) formal training should be effrontery to new employees who dont know how to use the intranet so that they will know how to perform searches, send and retrieval of information. ) Network administrators should get on users to use strong or unexpressed to guess passwords as healthful as not to show their passwords to any other party. 9) Use of SSL digital certificates to help secure the intranet from lack of encryption. 10) Setting up firewall rules to only allow messages that come from within the internal server. Recommendations to counter any threats to the network. Use of anti-virus toolkits so as to safeguard the computers on the network, the anti virus toolkits should be updated regularly and used to scan both PC and servers on the networks.Security policy should be put in place so as to protect the companys resources and information. natural countermeasures such as CATV cameras, gratitudes, data backup and recovery systems should be embraced so that the company will be able to monitor and protect its equipments and information safe. Authorization Access rights and privileges should be given to certain users in the many. Authentication-users and systems must be authenticated authentication can be through passwords, digital certificates and other methods.Conclusion The network projec t was a success though it seemed hard I find that I have acquired some certain skills that I didnt have during the beginning of this module. Am grateful at least that I have managed to do my surmount in this module. The project was about creating a network that would be used to connect the four offices which currently provide about seven computers. Weaknesses One of my weaknesses as displayed in my project is that I did not manage to show a actuarial representation of the various cables, servers and other equipments which would have otherwise enabled me to illustrate my project in a clear and visible manner.In task 1 1 was required to come up with and identify the type of media I will propose for the company, I chose a wired media family e cable as the best option to go for, the cat e cable al unitedly require a connector hence I chose the RAJA-45 connector which is the standard that can be used by the cat e cable. I provided the cost of cabling and installing such a cable in a network, the precondition made was that the many did not have any networks and so I included them in the cost and installation section.As for the data speed I gave the maximum speed that can be achieved by a category e cable which is Mbps. L provided recommendations for the category e cable to purchased together with raja-45 connector . In task 2 after researching on the methods that can provide a secure intranet I finally ended up choosing three methods and these are Intranet based VPN, Authentication and Digital signatures, I named a few protocols which are applied in the above methods such as layer two tunneling protocol for the intranet VPN.The media required to connect the offices such as Internet form the service of the hardware that can be used to connect the offices are Routers, switches and firewalls. In task 3 1 gave a listing of the security issues that are prominent with such a network some of them include, network attacks and lack of encryptions such issues can cause a company a great loss as much time will be spent trying to solve the problems which at times are difficult to solve.To protect the workstations in the network from attacks from viruses, Trojan and worms I gave the following suggestions, that the company et up strict security policy that the staff should adhere to so as to ensure the resources and information in the company are in safe condition, adoption of intrusion detection and maintainion systems in the network to secure the network form any forceful entry into the network.Using methods such as updated antimatter toolkit, the staff can be able to operate under a conducive environment which is free from any malicious software attacks, second thing is that authorization rights and privileges should be given to certain staff or members in the company, so s to prevent information from being accessed by unauthorized user who possess a threat to the company.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.