Question

Create a 14- to 16-slide Microsoft® PowerPoint® presentation, including Introduction, Conclusion, and Reference slides, that contains...

Create a 14- to 16-slide Microsoft® PowerPoint® presentation, including Introduction, Conclusion, and Reference slides, that contains the following: An accurate description of the "building blocks" of today's data communication networks, such as switches, routers, and cabling.

Provide examples from your network diagram of each building block. A concise strategy to ensure the availability of network access in switched and routed networks. Provide illustrations from your improvements to the original campus networks. An explanation of how firewalls mitigate some network attack scenarios. Give at least two examples from your solutions to the campus network that illustrates how you mitigated network attacks. A list of at least five security concerns inherent to wired, wireless, and mobile networking. A description of at least 3 responsibilities networking teams face in providing networking services, including security, privacy, reliability, and performance.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Since firewalls are created for the protection of any sensitive data to be moved in between the divided network zones they are usually divided into trusted zones with the authorized users in any network, and the least trusted, or untrusted, zones with all the users from the internet trying to access the private network. The firewall will then either permit or deny any traffic based on the set rules specified by the administration department. Two examples from the solutions to the campuses networks that illustrates how exactly I mitigated network attacks with firewalls are first by implementing VLAN solutions which transferred the old LAN into a virtual LAN that upgraded to a Cisco 2600 router which has a built-in security firewall for the network. The second example from the solutions to the campuses networks that illustrates how exactly I mitigated network attacks with firewalls is the implementation of Network Addressing with added subnet addressing, as well as the Internet Connection Firewall, or ICF enabled over the ISP

common security concerns that are inherent to wired, wireless, and mobile networking

  • Rogue Access Points/Ad-Hoc Networks
  • Denial of Service (DOS)
  • Configuration Problems from either misconfigurations or incomplete configurations
  • Passive Capturing
  • Remote Access
  • Software bugs
  • Software/Hardware update issues

1. Wired Network Threats

When comparing wireless vs wired network threats, wireless get the bulk of the attention due to its lack of "physical fences" but wired network threats cannot be ignored. Wired networks threats result from hackers having physical access to a network jack or cable. You can protect yourself from wired network attacks by auditing and mapping your network to ensure that you have an inventory of all access points and endpoints that have direct access to the network. Developing an inventory and physically securing the network are two simple steps that you can take to secure your network today.

2. Wireless Network Threats

It is easier for a cyber attacker to access unprotected wireless networks compared to wired networks. Wireless networks use radio waves to carry data between the network and end users and it can be very difficult to protect those radio waves from being intercepted. Cyber criminals can eavesdrop on wireless networks as long as they are in range of the signal. To protect against wireless network threats, organizations should encrypt their data, enable web filtering and implement comprehensive endpoint protection to protect against malicious software.

3. Mobile Networking

Mobile networking security threats include both physical and software-based threats that can compromise the data on smartphones, tablets and similar mobile devices. Mobile security threats include everything from mobile forms of malware and spyware to the potential for unauthorized access to a device’s data, particularly in the case of accidental loss or theft of the device.

Mobile malware and spyware security threats can access a device’s private data without a user’s knowledge or consent and can also perform malicious actions without the user knowing, including transferring control of the device to a hacker, sending unsolicited messages to the device’s contacts, making expensive phone calls on smartphones, and more.

Following are the responsibilities that a networking team should perform:

  • Designing the Network

The first phase in the life cycle of a network involves creating its design, a task not usually performed by new network administrators. Designing a network involves making decisions about the type of network that best suits the needs of your organization. In larger sites this task is performed by a senior network architect: an experienced network administrator familiar with both network software and hardware.

  • Setting Up the Network

After the new network is designed, the second phase of network administration begins, which involves setting up and configuring the network. This consists of installing the hardware that makes up the physical part of the network, and configuring the files or databases, hosts, routers, and network configuration servers.

The tasks involved in this phase are a major responsibility for network administrators. You should expect to perform these tasks unless your organization is very large, with an adequate network structure already in place.

  • Maintaining the Network

The third phase of network administration consists of ongoing tasks that typically constitute the bulk of your responsibilities. They might include:

Adding new host machines to the network

Administering network security

Administering network services, such as NFSTM services, name services, and electronic mail

Troubleshooting network problems

  • Expanding the Network

The longer a network is in place and functioning properly, the more your organization might want to expand its features and services. Initially, you can increase network population by adding new hosts and expanding network services by providing additional shared software. But eventually, a single network will expand to the point where it can no longer operate efficiently. That is when it must enter the fourth phase of the network administration cycle: expansion.

Several options are available for expanding your network:

Setting up a new network and connecting it to the existing network using a machine functioning as a router, thus creating an internetwork

Configuring machines in users' homes or in remote office sites and enabling these machines to connect over telephone lines to your network

Connecting your network to the Internet, thus enabling users on your network to retrieve information from other systems throughout the world

Configuring UUCP communications, enabling users to exchange files and electronic mail with remote machines

Add a comment
Know the answer?
Add Answer to:
Create a 14- to 16-slide Microsoft® PowerPoint® presentation, including Introduction, Conclusion, and Reference slides, that contains...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below...

    First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT