Term Paper on "Analyzing Networking Comprehensive Secure Solution"

Term Paper 8 pages (3447 words) Sources: 4

[EXCERPT] . . . .

).

Indirect Costs

These would include costs incurred in training personnel, operational procedures transformation, increased system outage during initial operation, activity disruptions and software support development.

IP Infrastructure

Printers, servers, routers and other common resources will be configured with static IPs to ensure less confusion among employees when utilizing these resources. For the non-static IPs, a DHCP server will be installed to manage the process of allocating IPs to users. The company will need a class C IP address assigned to accommodate its future growth (Brazzichelli, 2008). Assuming a total of 3 departments, ABC Inc. will need 3 subnets each with 62 users. The three subnets created can further be sub-netted to create more departments. The fourth subnet will be used for expansion incase another department comes up. The IP address will be submitted as in the table below to ensure that new devices are assigned unique IP addresses as they join the network:

Table 1: Network IP Addressing

IP Address:

Subnet Mask:

255.255.255.192/26

IP Addresses of Subnets/Department/Group

Department/Group

IP Address

1

192.168.0.0/26 (Gateway-192.168.0.1)

2

192.168.0.64/26 (Gateway-192.168.0.65)

3

192.168.0.128/26 (Gateway-192.168.0.129)

4

192.168.0.192/26 (Gateway-192.168.0.193)
Continue scrolling to

download full paper
>

FTP server

192.168.0.2 (static)

Printer

192.168.0.66 (static)

Router

192.168.0.194 (static)

The static IPs above should be configured on the respective devices and excluded from the DHCP pool to ensure there is no case of conflicting IPs.

Security

It is important for ABC Accounting Inc. to safeguard its network from both internal and external threats.

Threats

Social Engineering/Internal Threats

In a social engineering attack, the system or network is compromised by the attacker via social interactions with their target, whom they trick to give them information that will be used to attack and compromise it; phone calls and emails are mainly used in such attacks. Some types of social engineered attacks include:

Phishing

Impersonation (of an administrator, user or vendor, by the attacker) (Microsoft Website, 2016)

Network-based Attacks

The majority of security attacks are network based. Remote systems are usually used to launch attacks that are based on networks by the hackers. Some examples of attacks launched through a network include:

Eavesdropping such as bugging, wiretapping, listening to conversations or even induction using SF receiver.

Spoofing

Hijacking

Hacking

Phishing

Denial of service attack

Ignorance, Human Error and Omission

Of all security breaches that occur through data and voice networks, more than half of them are caused by ignorance and human errors and omissions (Zack, 2010).

ABC Accounting Inc.'s Current Security Threats

The current security threats can harm this company, affect its assets and critical functions, and in a worst case scenario, they can completely paralyze it. They include:

Natural disasters

Intruders

Unhappy or disgruntled employees

Criminals

Terrorists

Flaws in the design of networks, configuration of hardware, applications or operating systems.

Leaving terminals or computers not in use connected to the network.

Use of Passwords that are easy to guess.

Malicious Programs such as Computer Viruses, Spyware and Malware

Risk Assessment Matrix

The risk assessment matrix helped in the determination of the possibility of the current security threats occurring, and their consequences. In order to show the probable damage that can result from the occurrence of a current threat, vulnerability is assigned a risk level that can be high, moderate, or even low. It was assumed that no controls have been put in place by ABC. Therefore, I used this matrix to analyze the security risks (Zack, 2010).

Table 2: Risk Assessment matrix

RISK ASSESSMENT MATRIX

VULNERABILITY AND POSSIBLE DAMAGE CONSEQUENCES

RISK OF MONETARY LOSS

RISK OF PRODUCTIVITY LOSS

RISK OF LOSS IN CUSTOMER CONFIDENCE

H

M

L

H

M

L

H

M

L

CONFIDENTIAL AND SENSITIVE INFORMATION

Unauthorized modification, disclosure and destruction of information

Inadvertent destruction or modification of information

Misdelivery or non-delivery of service

Degradation or denial of service

COMPUTER SOFTWARE (APPLICATIONS AND OPERATING SYSTEMS)

Unauthorized modification, disclosure and destruction of information

Inadvertent destruction or modification of information

Misdelivery or non-delivery of service

Degradation or denial of service

NETWORKS/COMMUNICATIONS

Unauthorized modification, disclosure and destruction of information

Inadvertent destruction or modification of information

Misdelivery or non-delivery of service

Degradation or denial of service

FACILITIES AND EQUIPMENT LIKE HARDWARE

Unauthorized modification, disclosure and destruction of information

Inadvertent destruction or modification of information

Misdelivery or non-delivery of service

Degradation or denial of service

PERSONNEL

Unauthorized modification, disclosure and destruction of information

Inadvertent destruction or modification of information

Misdelivery or non-delivery of service

Degradation or denial of service

Key:

H -- Stands for High

M -- Stands for Moderate

L -- Stands for Low

Table 3: Summary of the Risk Assessment

SUMMARY OF RISK ASSESSMENT TABLE

VULNERABILITY AREA

RISK CATEGORY

MONETARY LOSS

PRODUCTIVITY LOSS

LOSS OF CUSTOMER CONFIDENCE

GENERAL RISK

CONFIDENTIAL & SENSITIVE INFORMATION

H

H

H

H

COMPUTER SOFTWARE (Applications and OS)

H

H

H

H

NETWORKS/COMMUNICATIONS

H

H

H

H

FACILITIES & EQUIPMENT like Hardware

H

H

H

H

PERSONNEL

H

H

H

H

Key:

H -- Stands for High

Consequences/Damages Caused by Current Threats

There are three major consequences or damages that ABC Accounting Inc. can suffer as a result of the security threats it faces. These damages include:

Loss of money

Decrease or loss of productivity

Loss of customer confidence in the business

Solution to Threats Identified

Various possible threats to the security of ABC Accounting Inc. were identified as mentioned above. There are several solutions to these threats that can be implemented to ensure that in case they occur, the systems are not negatively affected in any way. The solutions are as described below:

Encryption

Encryption allows for the conversion of information to be transmitted in a format that is not comprehensible or human readable. It ensures that either in the form of text or voice, data is only read or heard by the intended persons and sent to the right destination or received by the intended recipient. It also ensures that data is not altered during transmission, whether it is voice or text. With encryption, recipients are also sure that the information they received is from trustworthy sources or persons, with genuine intentions. It makes use of a private and public key, stream cipher, block cipher, padding, as well as digital certificates for encryptions. The protocols used for encryption are Kerberos, Pretty Good Privacy (PGP), Internet Protocol Security (IPSec) and Secure Sockets Layer (SSL) (Zack, 2010).

There are two types of encryptions; asymmetric and symmetric key encryptions. DES and RSA encryption standards govern the encryption methods and techniques.

Authentication

In order to access network resources, users are required to identify themselves through a process known as authentication. Authentication of company systems can be realized through usernames and passwords for access to computers or network accounts and biometrics (such as fingerprints or retina scans) used in environments that have been critically sensitive and thus require high security. There are three types of authentications, namely: anonymous, basic and integrated windows. VPN and RAS network services make use of authentication protocols such as Password Authentication Protocol (PAP), Challenge Handshake Authentication Protocol (CHAP) that uses MD5 hash algorithm, Microsoft Challenge Authentication Protocol (MS-CHAP) that uses the MD4 hash algorithm and Extensible Authentication Protocol (EAP) that uses public keys, Kerberos, digital certificates, RADIUS and smart card logon authentications (Anderson & Benedetti, 2009).

Authorization

Authentication authorizes or allows users to access resources depending on the permissions, privileges or rights granted to them. Permissions are an access level that grants users access to resources such as folders, files or objects, whereas rights are privileges given to users to perform any kind of task within an operating system.

User-level Security

User-level security gives an option for choosing a list of users who can access certain resources. This feature is found in Windows Server 2003/2008, Windows XP and Vista.

Share-level Security

This feature is found in older Windows OS like Windows 95 and 98; it allows for assignment of passwords to resources. This level is not just easy to implement, but also easy to maintain. User-level security is more popular and secure because it is very hard to control access in share-level security.

Firewalls

Firewalls are used to secure networks and systems through packet-filtering. They are configured to allow certain packets to pass through them to the networks being safeguarded; unwanted packets or those considered insecure are blocked from accessing the network. Normally at default, firewalls are configured to block all traffic or packets. Exceptions are then configured to allow the required or genuine traffic to pass through the firewall. There are three types of firewall configurations, namely: dual-homed host, screened host and screened subnet firewalls (Anderson & Benedetti, 2009).

There are three types of firewalls namely: packet-filtering, application-level and circuit-level. Each of these firewalls utilizes different approaches to security. Depending on the configuration of the firewall, packet-filtering types examine packets to determine the ones given an exception to gain access to the network. Application level firewalls operate at the presentation, application and session layers of the OSI levels; information is understood and monitored to ensure that it is safe, as part of verification. Although circuit-level are similar to application-level firewalls,… READ MORE

How to Reference "Analyzing Networking Comprehensive Secure Solution" Term Paper in a Bibliography

Analyzing Networking Comprehensive Secure Solution.” A1-TermPaper.com, 2016, https://www.a1-termpaper.com/topics/essay/looking-networking-comprehensive-secure/4700740. Accessed 28 Sep 2024.

Analyzing Networking Comprehensive Secure Solution (2016). Retrieved from https://www.a1-termpaper.com/topics/essay/looking-networking-comprehensive-secure/4700740
A1-TermPaper.com. (2016). Analyzing Networking Comprehensive Secure Solution. [online] Available at: https://www.a1-termpaper.com/topics/essay/looking-networking-comprehensive-secure/4700740 [Accessed 28 Sep, 2024].
”Analyzing Networking Comprehensive Secure Solution” 2016. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/looking-networking-comprehensive-secure/4700740.
”Analyzing Networking Comprehensive Secure Solution” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/looking-networking-comprehensive-secure/4700740.
[1] ”Analyzing Networking Comprehensive Secure Solution”, A1-TermPaper.com, 2016. [Online]. Available: https://www.a1-termpaper.com/topics/essay/looking-networking-comprehensive-secure/4700740. [Accessed: 28-Sep-2024].
1. Analyzing Networking Comprehensive Secure Solution [Internet]. A1-TermPaper.com. 2016 [cited 28 September 2024]. Available from: https://www.a1-termpaper.com/topics/essay/looking-networking-comprehensive-secure/4700740
1. Analyzing Networking Comprehensive Secure Solution. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/looking-networking-comprehensive-secure/4700740. Published 2016. Accessed September 28, 2024.

Related Term Papers:

Addressing Wireless Networking Technology and Security a Moving Target Research Proposal

Paper Icon

Wireless Networking Technology and Security: A Moving Target

The objective of this work is to focus on wireless networking technologies, protocols, standards and operations. Additionally examined will be the capabilities… read more

Research Proposal 22 pages (7497 words) Sources: 16 Style: APA Topic: Computers / IT / Internet


Management of Enterprise Wide Networking Term Paper

Paper Icon

Management of Enterprise-Wide Networking

The concept of network management broadly indicates managing of computer networks. There prevails an extensive variety of software and hardware products that assist the network system… read more

Term Paper 10 pages (3545 words) Sources: 1+ Topic: Computers / IT / Internet


Information Technology: Telemedicine Solutions Offered to Remote Research Proposal

Paper Icon

Information Technology: Telemedicine Solutions Offered to Remote Places in the Country of Greece

The term 'telemedicine' derives from the Greek 'tele' meaning 'at a distance' and the present word 'medicine'… read more

Research Proposal 36 pages (9778 words) Sources: 50 Style: Harvard Topic: Healthcare / Health / Obamacare


Change Management for Enterprise 2.0 Implementations Dissertation

Paper Icon

Enterprise 2.0 technologies employ social media tools to help individuals within organizations identify and connect with each other in ways that promote information sharing and collaboration (Hagel & Brown 2012).… read more

Dissertation 40 pages (14654 words) Sources: 80 Style: Harvard Topic: Computers / IT / Internet


Portfolio Management Software for E-Government and How to Secure the Connection Capstone Project

Paper Icon

initiatives require bold solutions, and the Abu Dhabi Plan for 2030 represents an excellent opportunity to provide timely and cost-effective solutions that will help achieve the visionary goals of the… read more

Capstone Project 38 pages (10456 words) Sources: 70 Topic: Management / Organizations


Sat, Sep 28, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!