Preview

Nt1310 Unit 1 Network Security

Good Essays
Open Document
Open Document
598 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 1 Network Security
B. Network Overview
1. Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].
2. Physical Security: The physical layout of the company should be structured with security and access control as a primary concern, along with providing sufficient workspace for employees to work and collaborate. Just
…show more content…
TRUSTED: All devices required for daily work in the company, that should not be accessible by the public, should be placed into the TRUSTED zone. However, the TRUSTED zone can be further divided into separate zones by physical or logical means to provide additional security and access control. This subdivision helps manage and enforce least privilege access to network resources.
4. MANAGEMENT: Devices dedicated to the management and control of other network resources should be placed in the MANAGEMENT security zone. These devices typically connect to dedicated management ports on other network resources. These connections to allow managers to remotely access a device, modify its configurations or perform administrative tasks on the resource. Additionally, network resources may be configured to send log files, periodic status messages or notifications to an administrator or management device across these

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The answers are A. The transport layer divides a data stream into segments and may add reliability and flow control information. The second answer is D. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.…

    • 247 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Case Study

    • 825 Words
    • 4 Pages

    When configuring windows networking, two major approaches are valid to secure all the network resources, the workgroup approach and the Domain approach. The workgroup approach is simply to create a windows peer-to-peer network with a decentralized security system. This workgroup security approach…

    • 825 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    PAN, LAN, HAN, MAN or WAN –Given that the Little Country Store is a little secretly run organization, I would choose to setup a Local Area Network (LAN) for their framework designing. The LAN configuration is the best option for a productive Small Office/Home Office (SOHO) where periphery contraptions, for instance, printers and scanners may be bestowed to different PCs on the framework. Making usage of this preferred standpoint makes using a framework more calm than purchasing a printer for each individual PC. This LAN will have three PCs masterminded in a comparative building structure with a most extraordinary detachment of 200 feet between PCs.…

    • 605 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The deliverables for this project will consist of an inventory by location of the network in a Visio format, description of the security by location of the network, and recommendations for changes to the network design, circuit speeds, and reasons why the changes should be implemented.…

    • 5538 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    Network Perimeter: Network perimeter is defined as the boundary between a privately-owned network, and the public network. The idea between network perimeters is that the assets of a network and the hardware and any other element of the network can be monitored and controlled from outside the organization. The concept of this trend was vital because it was quite necessary to defend the internal assets of the organization. There are numerous systems that organizations are trying to implement to help with this new trend. The belief of the organization is that there is a possibility of ensuring that the assets within the network are managed in such a way that it eliminates all the possible threats. The latest trend in setting up network perimeter is adopting of remote access.…

    • 366 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    This case study is a practical application of all of the knowledge you have acquired from your courses in the networking curriculum over the past two years. It will allow you to demonstrate both your knowledge and experience in networking both academically and hands-on. It will also allow you to draw on what you have learned as you worked your way through the online Microsoft IT Academy Security course. It is intended to be used as first a mid-term examination and then will also be continued as your end of class project and final exam. It presents a thorough review of concepts and applications presented in courses you have taken while at JSRCC. To complete this case study, read the scenario below and perform the tasks that follow. You will perform many of these tasks in teams of two but your final reports will be written individually. In addition to your analysis you are required to submit a formal written proposal that makes specific recommendations. You will be provided additional instructions regarding the format of your project report and other requirements.…

    • 5277 Words
    • 22 Pages
    Powerful Essays
  • Better Essays

    Often, the first thing people tend to think of in network perimeter defense is a firewall (Posey, 2003). In most common environments, firewalls would be placed at the terminal ends of every network segments (Cole, Krutz and Conley, 2005). A firewall’s basic job is to permit or stop packets from flowing into or out of a network. For perimeter security implementation, firewalls are available as a software (installed inside a route) or as a stand-alone hardware appliance (Mosson, 2009).…

    • 1242 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Nowadays, security software is becoming a major part of enterprise business. Software development is activity connected with advanced technology and high level of knowledge. After viewing the growing number of malicious activity, it is now imperative that we develop a plan and stick to it. There are so many threats to vulnerabilities and threats that leave systems open to malicious attacks. Whenever you sit at a computer and log onto the internet, your system, becomes vulnerable. There is now potential for malicious attacks. Knowing what to look for can prevent a lot of these attacks.…

    • 534 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS3220 Assignment 3

    • 980 Words
    • 4 Pages

    As part of the network security team, we will be proving IDI with a network security plan to mitigate the vulnerabilities that have been discovered. A secure site will be set up with network intrusion detection and network protection systems will be available to access via the internal network. Policies will be presented for remote access and the use of VPN. Also contained within this report will be strategies for hardening the network and mitigating risks. An updated network layout with increased network security to meet the current needs will be included.…

    • 980 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Lab 1

    • 753 Words
    • 3 Pages

    b- Protect the organization’s assets. For example, the organization should have AUP to demonstrate how, where, and when can the employees uses the mobile devices, computer or any organization’s assets…

    • 753 Words
    • 3 Pages
    Good Essays
  • Good Essays

    LAN - For the wired portion of our network, I propose a few solutions that will help secure our network. First we will need to ensure the safety of our equipment from tampering. We should have all switches and sensitive equipment (i.e. Servers and Network Attached Storage (NAS) Devices) in a room that is locked at all times. If available, we can use a card access system to monitor employees that gain access to this portion of our network.…

    • 904 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Information Technology

    • 760 Words
    • 4 Pages

    ____ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse.…

    • 760 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Internal Use Only

    • 373 Words
    • 2 Pages

    1. User Domain: This Domain is where only one user will have access to it. This can be configured to internal use only. By default, the IT department tries to maintain a certain level of Security for this, so that nobody can access from the outside, only the IT Department can grant access privilege for Remote Access Point. The User Domain will enforce an acceptable use policy (AUP) to define what each user can and cannot do with any company data that he or she has access to. Also, every user on the company is responsible for the security of the environment. Violation of the AUP can be grounds for immediate dismissal and/or legal actions.…

    • 373 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Network Hardening

    • 2847 Words
    • 12 Pages

    There is nothing more important in any business than securing your network topology from hardware, design and software. This plan is called network hardening and this plan needs to be incredibly detailed with how the network will be secured in each area. The first step to the network hardening plan resides in how you will build the network and then from there how you will secure each section of the network. This paper will discuss access control measures, encryption, PKI, certificates, OS hardening, application hardening, transmission, remote access protection protocols, wireless security, anti-virus software as well as spyware, and email security.…

    • 2847 Words
    • 12 Pages
    Better Essays