Question

You are a systems engineer and your new company Sundial decides to connect your company network...

You are a systems engineer and your new company Sundial decides to connect your company network to the Internet for the first time. Describe precautions you might recommend they take prior to implementing the solution and draw a design/architecture that would be appropriate

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Before connecting to the internet, some basic precautions need to be taken:

  1. Use stronger encryption
    • It's essential to use some variant of WPA (Wi-Fi Protected Access) protection, either WPA or the newer WPA2 standard.
    • For smaller companies and households, it may be practical to use WPA with a pre-shared key. That means that all employees or family members use the same password to connect, and network security depends on them not sharing the password with outsiders.
    • The password should be changed every time an employee leaves the company.
  2. Use a secure WPA password
    • ​​​​​​​Make sure that any password (or passphrase) that protects your Wi-Fi network is long and random so it can't be cracked by a determined hacker.
  3. Check for rogue Wi-Fi access points

    • ​​​​​​​Rogue access points present a huge security risk. These aren't any company's "official" Wi-Fi access points, but ones that have been brought in by employees (perhaps because they can't get a good Wi-Fi signal in their office) or conceivably by hackers who have entered the building and surreptitiously connected one to an Ethernet point and hidden it.

    • To detect rogue access points we need to scan the office and the area around it on a regular basis using a laptop or mobile device equipped with suitable software such as Vistumbler (a wireless network scanner) or airodump-ng. These programs allow the laptop to "sniff" the airwaves to detect any wireless traffic travelling to or from a rogue access point and help identify where they are located.

  4. Provide a separate network for guests

    • ​​​​​​​If we want to allow visitors to use the Wi-Fi, it's sensible to offer a guest network. This means that they can connect to the internet without getting access to the company's or family's internal network.

    • One way to do this is by using a separate internet connection with its own wireless access point. In fact, this is rarely necessary as most business-grade wireless routers have the capability of running two Wi-Fi networks at once - the main network, and another for guests (often with the SSID "Guest".)

  5. Hide the network name

    • ​​​​​​​Wi-Fi access points are usually configured by default to broadcast the name of the wireless network - known as the service set identifier, or SSID - to make it easy to find and connect to. But the SSID can be also be set to "hidden" so that anyone wanting to connect has to know the name of the network before they can connect to it.

    • It's important to note that hiding the SSID should never be the only measure one take to secure the Wi-Fi network because hackers using Wi-Fi scanning tools like airodump-ng can still detect the network and its SSID even when it is set to "hidden."

  6. Use a firewall

    • ​​​​​​​Hardware firewalls provide the first line of defence against attacks coming from outside of the network, and most routers have firewalls built into them, which check data coming into and going out and block any suspicious activity. The devices are usually set with reasonable defaults that ensure they do a decent job.

  7. Enable MAC authentication for the users

    • ​​​​​​​We can limit who accesses your wireless network even further by only allowing certain devices to connect to it and barring the rest. Each wireless device will have a unique serial number known as a MAC address, and MAC authentication only allows access to the network from a set of addresses defined by the administrator.

    • This prevents unauthorised devices from accessing network resources and acts as an additional obstacle for hackers who might want to penetrate your network.

  8. Use a VPN

    • ​​​​​​​A VPN or virtual private network will help one stay safe and secure online while above all keeping their private stuff private. They keep one's data hidden from prying eyes one end to the other by encrypting it. In theory, hackers could penetrate their network and they'd still not be able to do any harm to their system assuming that a VPN is running permanently.

Add a comment
Know the answer?
Add Answer to:
You are a systems engineer and your new company Sundial decides to connect your company network...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • You are working as Network Design Engineer with local service provider and your manager has asked...

    You are working as Network Design Engineer with local service provider and your manager has asked you to propose the design for the below cellular architecture shown in Figure 1. In your design provide the following information with reasons; Base station sites locations, Antenna specification (such as antenna shape, height, gains etc), mention the type of the area considering the cell size (such as suburban, metropolitan, rural etc) and justify you design. Note that the numbers within each cell are...

  • Complete the following short answer questions: 1. Design an Ethernet network to connect a single client...

    Complete the following short answer questions: 1. Design an Ethernet network to connect a single client PC to a single server which will contain a wired connection to both digital storage media as well as an optical device. Both the client and the server will connect to their respective workgroup switches via UTP. Their workgroup switches are connected directly by a trunk link. The two switches are 1,700 meters apart. They need to communicate at 500 Mbps. Your design should...

  • Joe, a new network engineer, is working on the redesign of ABC Enterprise. He has identified...

    Joe, a new network engineer, is working on the redesign of ABC Enterprise. He has identified the organizational needs and created the infrastructure summary report. He is in the process of developing the architectural models for the organization when he begins to become overwhelmed as he contemplates the role of security services within the architecture. What advice can you offer Joe? In your initial response, include the following: Describe how the modular approach may help Joe. Identify the modules or...

  • In your first month as a junior engineer in a structural engineering consulting company, you were...

    In your first month as a junior engineer in a structural engineering consulting company, you were asked by your supervisor to check a design calculation that was previously completed by a senior engineer. The beam in question is part of a floor system, simply supported, and subjected to an ultimate positive moment, Mu, of 835 kip.ft. In the current design, the beam is 14 in x 30 in and has 6 #10 rebars as the tension reinforcement as well as...

  • [25 points] You are an industrial engineer in a manufacturing company. Your role is to select...

    [25 points] You are an industrial engineer in a manufacturing company. Your role is to select the most appropriate materials and manufacturing processes for the manufactured products. a) Draw a decision-making process for the manufacturing process selection and materials selection, and highlight all criteria that should be taken into consideration? b) Select one kitchen appliance​ from below picture. For the selected appliance, identify the most appropriate material for it, and recommend the most appropriate bulk deformation/sheet forming process to produce...

  • Case Project 7-1: Planning a Wireless Network Site Survey You are a network engineer for a small ...

    Case Project 7-1: Planning a Wireless Network Site Survey You are a network engineer for a small motel chain that has just been acquired by a large hotel company. The plan is to keep your company’s motels as a separate brand from the new parent company. The parent com- pany wants to upgrade the facilities in your motel chain, including the wired LANs. The company plans to implement WLANs both to assist in motel administration and to provide guests with...

  • You have been called in to consult on a new network design for XYZ company. The...

    You have been called in to consult on a new network design for XYZ company. The requirements of this design are summarized as follows: on F The building has 3 floors There are 300 user workstations and 10 servers. Users must be grouped according to the projects they're working on, but users for each project are located on all three floors. There must be fault tolerance for communication between the floors. The company leased a building across the street. The...

  • The Neptune Company offers network communications systems to computer users. The company is planning a major...

    The Neptune Company offers network communications systems to computer users. The company is planning a major investment expansion but is unsure of the cost of equity capital as it has no publicly-traded equity. Your assignment is to determine an appropriate equity cost. List and explain the steps you will need to take to complete this assignment.

  • You have been called in to consult on a new network design for XYZ company. The...

    You have been called in to consult on a new network design for XYZ company. The requirements of this design are summarized as follows: ·        The building has 3 floors ·        There are 300 user workstations and 10 servers. ·        Users must be grouped according to the projects they’re working on, but users for each project are located on all three floors. ·        There must be fault tolerance for communication between the floors. ·        The company leased a building across the street. The owner is...

  • Question 2 (20 marks) – Improving network design Jim is impressed by your report and asks you to write a proposal to improve the network, although his budget is limited he tells you that if you can j...

    Question 2 (20 marks) – Improving network design Jim is impressed by your report and asks you to write a proposal to improve the network, although his budget is limited he tells you that if you can justify your design choices you may be able to purchase some more equipment. You will need to provide a new network design diagram in PowerPoint format, thankfully Jim has included a couple of slides with various network equipment elements that you can use...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT