Network Security And Management Essay

3952 words - 16 pages

Network Security and Management
Brandi Schoch
CTU Online
Introduction to Network Management
IT245-1403A-09
Jennifer Gaddy
August 11, 2014

Table of Contents
Table of Contents 2
Identifying the Network 3
The Organization 3
Network Servers 3
Network Personnel 3
Diagramming the Network 5
Network Architecture 5
Speed and Distance 6
Access Method 6
Network Models 8
OSI Model 8
FCAPS Model 11
The Diagrams 13
Protocols and Agents 14
Protocols Used Presently 14
Security Concerns 15
Network Security 16
Viruses, Worms and Trojan Horses 16
Hacker Attacks 17
Identity Theft 17
Network Management 18
Managing Hardware and Applications 18
Managing ...view middle of the document...

Network Personnel
Each computer user is responsible for all their data. However all data is backed up by the network administrator (me) with portable hard drives which are then put in a safe location. This is important for family member’s personal data as well as business data. The administrator’s hub also has larger hard drive capability and acts as a temporary backup in case of portable drive failure.
The Jr Network Administrator (my son) handles the consoles data and system. All data from these consoles is saved within the hard drive of the console. This data is not as important as it only pertains to our entertainment.

Diagramming the Network

Network Architecture
This network starts with a modem. However this is too simplistic a definition for what this piece of hardware does. It is combination of modem, router, switch, and firewall. It handles both hardwired and wireless clients. For simplicity it will be referred to as the modem. The main business computer is hardwired into this modem. The other computers, laptops, tablets, smartphones and consoles all connect to this modem wirelessly. The main printer is also connected wirelessly.

Speed and Distance
Speed can be an issue with this network due to the limitations of internet availability in this area. DSL is the only cost effective option right now. Unfortunately, our phone lines are older and have not been replaced yet. So we cannot get high speed DSL in our area. This means instead of getting 7 Mbps we are only able to work at a 3.5 Mbps, as all clients are not used simultaneously there is not much issue with lagging. Bear in mind that this is just download speed; upload speed is much slower at 911 Kbps which is actually less than one megabit of data.
Distance is not really an issue as all clients, servers, and modems are within the same 1300 ft. building.
Access Method
As shown in the diagram above there is only one computer connected to the network physically. The printer and all other client/servers are connected via Wlan. The modem automatically picks up each device and has to be approved through the network administrator to be added to the network. This modem has an unmanaged switch. Wireless access standards on my device are done through a combined 802.11b and 802.11g connections.
There are no repeaters on this network. There is only the LAN/WLAN and no other LANs connected to my network.
This architecture is typical for a residential household or a small business. It provides enough protection and very little maintenance for the homeowner or small business owner who doesn’t want to deal with a complicated system. Most of the “work” is taken care of by the internet provider company who also provides tech services from their office or comes to your home or office. They also provide the hardware for internet access, and network access, as well as the first firewall of protection from the internet. The homeowner/small business owner is really only responsible...

Other Papers Like Network Security and Management

Network Security Essay

966 words - 4 pages Network Security When it comes to networking and the security of networks, there are several different methods of protecting networks. Of these differing methods, some of them sound similar, but provide differing levels of security. In the following paragraphs, I will try to explain the differences between some of the methods used. • Explain the difference between historical and statistical logging. Logging is a simple way of keeping a

Network Security Essay

1817 words - 8 pages data between networks, and serving as a router when routing data to individual systems. Brouter functions as a filter that allows some data into the local network and redirects unknown data to the other network. 2) Enhance security using NAC/NAP methodologies Network access control (NAC) products entered the market a few years ago to fill this gap. A typical NAC solution provides an endpoint assessment of the computer and then enables access

Network Security Assessment

3062 words - 13 pages  Network Security Assessment Prepared for: University of Maryland University College Prepared by: David Yurchak I. Vulnerability Assessments In the same way as other associations in the monetary administrations and different segments, agent merchants (firms) are the objective of digital assaults. The recurrence and complexity of these assaults are expanding, and individual intermediary merchants and the business, in

Network Security Administration

823 words - 4 pages Unit 2. Assignment 1. Disk Redundancy Research 1. What does RAID stand for? RAID (originally redundant array of inexpensive disks, now commonly redundant array of independent disks) (unknown, 2015) 2. When would we use RAID? You would use RAID when you have a lot of important data that you are constantly changing and need to back up often. 3. Define the following types of RAID. a. RAID 0 RAID 0 consists of striping, without mirroring or

Paper

269 words - 2 pages Ruben Quinones IT245 - Introduction to Network Management Colorado Technical University Online Professor: Dr. Shawn P. Murray Phase 1 Individual Project Due January 13, 2013 Table of Contents Section 1: Target Organization - Identifying the Network 3 Section 2: Diagramming the Network - Network Architecture 4 Section 3: Network Models 5 Section 4: Network Protocols and Agents 6 Section 5: Network Security 7 Section 6: Network

Network design

655 words - 3 pages users hence better security. Out-band systems will be deployed by having connecting an access server to each device’s management port. Access server in this case can have both public IP addresses and private IP addresses to monitor the access from each monitored device. Protocols and software for in-band and out-band Protocol/software solution Effect on network traffic In-band Protocols include; SMTP and HTTP and Simple Network

Netw420 Week 3 Paper

544 words - 3 pages management framework created by the International Organization for Standardization (ISO). The five network management categories within the FCAPS are: * Fault Management * Configuration Management * Accounting (Administration) * Performance Management * Security Management They all have an important role within the company that they must do, and they all get paid differently based on what they are doing, some of them it can

Essay.Designing.A.Security.Strategy

874 words - 4 pages Essay Designing a Security Strategy Geo-Probe Inc. (GPI) 20 years in business, a company with constant growth and success. GPI provides construction management, engineering design, programming and environmental planning, and other A-E projects in support of a, industry, different government and commercial clients. GPI has 300 employees and ten branch office locations. GPI has many computers and network device attach to their network like any

Network Management System

758 words - 4 pages ), and Meter Data Management (MDM)” (Cisco Connected Grid Network Management System, 2014). This management system can monitor multiple networks and all of the security applications needed to protect the network. Cisco claims that their network management system is very secure. They have a modular software platform and a pluggable architecture that gives the network connections “to a multivendor ecosystem of legacy and next-generation power grid

Network Management

3884 words - 16 pages 11 7. References 12 Introduction N etwork management is a broader subject of managing the whole network consistently. There are some supportive products like software and hardware to enable the users of network to manage the network properly. It covers a wide area of management such as fault, security, performance, configuration and more. These all aspect of network management has to be accomplished successfully to gain the obvious

Text Questions

534 words - 3 pages all relevant members of your organization in the policy. * Train proactively on the elements of your security policy. * Divide network management into the FCAPS areas. * Take inventory of the network management tools in use and investigate their shortcomings. * Train employees to seek out new and emerging technologies and implement a formal review process. * Invest in training for all levels of IT staff, especially in the areas of new and emerging technologies.

Related Essays

: It Security And Disaster Recovery Management

1012 words - 5 pages Trident University Alfonso Nunez Module 1 Case Assignment ITM527: IT Security and Disaster Recovery Management Dr. Kenneth Phillips August 26, 2013 Introduction The Malcolm Baldrige National Quality has evolved from a means of recognizing and promoting exemplary quality management practices to a comprehensive framework for world class performance, widely used as a model for improvement. As such, its

Risk Management: Role In Justice And Security Organizations

720 words - 3 pages Risk Management: Role in Justice and Security Organizations Introduction Risk, as it applies to justice and security organizations means “the uncertainty of financial loss, the variations between actual and expected results, or the probability that a loss has occurred or will occur” (Broder, 2006, p. 3). Businesses and organizations all across the country have risk management programs in place to help minimize losses. Risk most often is

Network Security Essay

1846 words - 8 pages , 1999] Checkpoint software technologies with its leading software for ISPs, the provider-I is also a big player in the Network security business. Provider-I is basically a server management software that provides exclusive static software protection against security breach. The software enables several firewalls/ VPN-1 securities on a single server. Through such facility as the Distributed management and control, the security policy editor helps

Network Security Essay 586 Words

586 words - 3 pages Nasario Birrueta IT 200: Milestone Three Network Security Network security is one of the most important aspects of implementing a fully functional working network, downtime caused by poor network security can cause major economic loses. The two matters that need to be addressed is the User and Physical equipment. Network security begins with the user. As such would implement a Network Use policy that the employee must sign and