Preview

Nt1310 Unit 3 Assignment 1

Better Essays
Open Document
Open Document
3788 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 3 Assignment 1
Principles of Network Security
Security Management
September 17, 2013

Contents

Network Security Requirements

With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information. OSI
With OSI (Open Systems Interconnection) was developed to help standardize networking. The OSI model has been an element of computer network design since the early 1980’s. With the OSI model it shows how the network protocols and equipment should communicate and work together as one. With the OSI as a standard with in ISO (International Standards Organization) todays current technology does not always conform to the standard of the ISO, but it
…show more content…
Applications that use the Internet can have weaknesses when it comes to updates. Usually vendors will release patches to address some of these weaknesses when they are discovered. For some reason the full patch is not installed this now makes the application vulnerable. When the user downloads a document, media file, or even just a HTML page on this un-patched system the system can be compromised. With this happening this can cause more malware to be downloaded making the overall system worse. With the IPS in place the patches with the vulnerable application can be scanned by network traffic for patterns with the IPS it will help you will data about the network on a regular basis to see what is going on. With the IPS in place we will have the control to set it up with all the policy’s that are needed to help fight against any

You May Also Find These Documents Helpful

  • Powerful Essays

    It is important to test the cables before you install them and after they are installed. Although there are many tools that are used for testing the cables in a network this paper is only going to talk about three. The first one is the multifunction cable scanner, they are available for testing both copper and fiber optic cable. One such model is the Hobbes 258898 it can test every pin of almost 20 often used cables from coax to 40 pin ribbon cables. It identifies opens, shorts and mis-wires at the pin level. With a multifunction cable tester you can perform a range of tests that you would normally need a few different testers to do. You can do wire-mapping, test for the length of the cable, test the attenuation, and you can test NEXT (near end crosstalk) for copper cables. They will also test for optical power and signal loss in fiber optic cables. A lot of the multifunction cable testers perform other more comprehensive test such as PS-NEXT, ACRF, PS-ACRF, delay…

    • 659 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Studying the seven layers of the OSI design, a decision to be taken is that the layer three, also referred to as the network layer is the one which WAN protocols operates on. The network layer carries out regular tasks as well as pinpoints end-to-end addressing and routing datagrams (Regan, 2004). There exists a unit known as brouter that some layers incorporate which works like a router and a bridge. Routers and switches work on layers 2-4 (data link layer, network layer as well as transport layer). As mentioned earlier, on layer two of the OSI model, network layer, is the place where the addressing and routing is carried out. On the transport layer of the OSI model is the place where the flow control and mistake handling works. Lastly, on layer four the synchronizations and assemblies are completed.…

    • 254 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    This paper will discuss the three types of network topologies discussed in Chapter 3. They are, hierarchical star, bus, and ring network topologies. Each has its advantages and disadvantages as will be discussed…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1410 Words
    • 6 Pages

    Don’t limit yourself to modular sizes listed in a catalog - surf2 tables are available in 1 inch…

    • 1410 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Mt1310 Unit 7 Essay

    • 1045 Words
    • 5 Pages

    The hardware and software functions of the SS7 protocol are divided into functional abstractions called "levels." These levels map loosely to the Open Systems Interconnect (OSI) 7-layer model defined by the International Standards Organization (ISO).…

    • 1045 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    I recently had to deal with a problem with the Event Name as: BlueScreen. The Locale ID of the fault can be designated by the numerical value as: 5146. I am a touch apprehensive as to whether such a typical fault has been triggered owing to a virus attack. What should I do to eliminate the fault and ensure that the problem does not occur all over again?…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 3 Assignment 1

    • 6320 Words
    • 26 Pages

    “A bus network topology is a network architecture in which a set of clients are connected via a shared communications line/cables” (Abu, 2013). There are several common instances of the bus architecture, including one in the motherboard of most computers. Bus networks may be the simplest way to connect multiple clients even though many may have problems. When two clients want to transmit at the same time on the same bus, this may cause some problems. Thus systems use bus networks normally some may have scheme for collision handling or collision avoidance for communication on the bus. Though this may be quite often in using Carrier Sense Multiple Access or the presence of a bus master’s who controls access to the shared bus resource.…

    • 6320 Words
    • 26 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 3299 Words
    • 14 Pages

    Magnifier will allocate a section of your screen (by default at the top) where it will display a magnified version of what is under your mouse. It is also possible to configure it to follow the keyboard focus instead of the mouse position.…

    • 3299 Words
    • 14 Pages
    Good Essays
  • Good Essays

    nt1210 unit 1 lab1

    • 1325 Words
    • 5 Pages

    8. The TCP/IP and OSI models have some obvious differences, like the number of layers. Think about the more commonly used version of the TCP/IP model discussed in this chapter, and then think about how to talk about TCP/IP using OSI…

    • 1325 Words
    • 5 Pages
    Good Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Assignment 1

    • 2136 Words
    • 9 Pages

    Sorting, Filtering, and Paging with the Entity Framework in an ASP.NET MVC Application ................... 55…

    • 2136 Words
    • 9 Pages
    Satisfactory Essays
  • Good Essays

    In order to get any new technology out to the public there are certain procedures and documentations that a publisher must go through. I won’t be going over the entire process but instead I’ll be focusing on two areas which are Request for Comments (RFC) and an Internet Draft. Even the most popular networking technologies used today like IP and Ethernet had to go through these processes at some point. I’ll also be explaining the organizations that must produce the documentation and the processes to produce said documents.…

    • 634 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Don’t share or divulge your passwords to anyone. It is risky. Evil minded people could gain access to your accounts with such passwords. Remember that you would be held responsible for anything done through your accounts.…

    • 599 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The Evolution of Xtp

    • 5335 Words
    • 22 Pages

    The quantity of network and protocol research can be measured by observing the number of publications in the area. In the 1960’s and early 1970’s most of the papers published in the biennial ACM SIGOPS Proceedings were devoted to operating system topics like paging, process control, and file management. By the 1980’s the balance changed so that most of the papers presented some aspect of networking in the context of operating systems. The papers presented in the first workshop in a series dedicated to protocol research [9] reference much of the work of the 1980’s and suggest that the 1990’s may be a time of significant progress in this area. Contemporary protocol research is influenced by developments in other technical fields. For example VLSI techniques are commonly incorporated into the design of protocols, systems, and media -…

    • 5335 Words
    • 22 Pages
    Powerful Essays
  • Satisfactory Essays

    a) State FOUR (4) principles underpinning the Open Systems Interconnection (OSI) Reference Model. b) Describe the purpose of the physical layer of the OSI Reference Model. c) State THREE (3) elements of network design that relate to the physical layer of the OSI Reference Model. d) Describe the purpose of the data link layer.…

    • 608 Words
    • 3 Pages
    Satisfactory Essays