Premium Essay

Strategies to Control and Monitor Network

In:

Submitted By r1o2g3h4
Words 975
Pages 4
FTP – TCP PORT 21 – control command SSH – TCP PORT 22 – secure shell used for secure log-in, file transfer and port forwarding TELNET –TCP PORT 23 – telnet unencrypted text communications SMTP – TCP PORT 25 – simple mail transfer protocol, email routing DNS – TCP/UDP PORT 53 – domain name system TFTP – UDP PORT 69 – trivial file transfer HTTP – TCP PORT 80 and TCP HTTPS PORT 443 – hypertext transfer protocol and secure hypertext POP3 – TCP PORT 110 – post office protocol SNMP – UDP PORT 161 – simple network management protocol HTTPS – TCP PORT 443 – hypertext transfer protocol/ over SSL/TLS

POP3 servers hold incoming email messages and SMTP server handle sending of your email

TCP is connection-oriented protocol and UDP is connectionless protocol

Orig. IEEE Standard Shortname Informal Name Speed Type Cabling 802.3 10BASE5 Ethernet 10Mbps Thick Coaxial

802.3u 100BASE-TX Fast Ethernet 100Mbps UTP

802.3z 1000BASE-X Gigabit Ethernet 1000Mbps Fiber

802.3ae 10GBASE-X 10GbE 10Gbps Fiber

802.3af Power over Ethernet enhancements 12.95w

802.3at Power over Ethernet enhancements 25W

• Carrier Sense Multiple Access with Collision Detection- it’s the LAN access method for Ethernet

• CAT5 – 2 variety cabling UTP or SCTP flexible with speed 10 or 100Mbps up to 100Mhz

CAT5e- Enhanced cat5 cabling with data transfer speed 1000Mbps and less crosstalk than cat5

CAT6 – Cabling made up of 4pairs of copper wires and twice bandwidth of cat5 with speed to Gbps and up to 250Mhz

• UTP – Type of cabling that uses pairs of copper wires twisted together with no additional shielding from the effects of EMI.

STP - Type of cabling that

Similar Documents

Premium Essay

It Security

...Professor Butler, William NextGard Technologies Windows Security Implementation Model Below are the seven areas of concentration for the focus of this essay: in section one Microsoft Windows access controls will be researched and discussed for solutions with details that are appropriate, in section two cryptography methods will be researched and detailed in order to protect the organization, in section three a plan will be devised to protect the company against malicious code and activity, in section four a plan will be implemented to monitor and analyze the network, in section five detailed security guidelines will be discussed, section six will discuss best practices for the security, and the appendix will include the network topology of the sites and the network infrastructure. The goal of this essay is to implement a model that encompasses a complete security model. Below each section discusses the above mentioned topics with a brief summary to close the essay. The matter of security of a network and access permissions is simple when certain protocols are followed. In the scenario for this assignment the company Ken 7 Windows Limited needs protocols for access control measures to protect restricted data. The first step is to ensure the process for setting up controls is understood. A simple way to remember the process is the acronym TPDIE which stands for: think – which means decide what you need, plan – make a plan from the thought process, design – include key roles...

Words: 1425 - Pages: 6

Free Essay

A Fully Functional Network Design for Shelly Fashion

...NETWORKS AND TELECOMMUNICATONS A FULLY FUNCTIONAL NETWORK DESIGN FOR SHELLY FASHION PRESENTED BY: Osazuwa Olufemi George Business requirement Shelly fashion is a clothing boutique that sells clothes to both male and female customers. Their goal is to be the biggest retail clothing store in the country which aims to provide customers from the ages of 5 to 45 years of age a wide variety of quality clothing. The clothing retail store is open six days a week to customers who come in and buy their clothes directly at the store. The transaction is recorded and stored on the store’s computer with a Store Management Software which keeps track of inventory, sales, and computes the profits of the retail store biannually. Shelly fashion is looking to expand its reach using internet technology so it would be able to meet with the growing number of customers and also to connect all its other and future branches together to form a centralized network. With the network the retail store would be able to launch its home delivery option where customers would be able to buy clothes online and have their goods brought to them at their homes without having to be physically present at store. The business owners want to embark on a project to set up a telecommunications network which should be able to reach their business requirements. Shelly fashion’s business requirements for the proposed network are as follows: * Reduce operating cost by cutting cost too make telephone calls...

Words: 2953 - Pages: 12

Premium Essay

Implementing Global Strategy

...Implementing Strategy in Companies That Compete Across Industries and Countries 13 - 1 Managing Corporate Strategy Through the Multidivisional Structure • Functional or product structures are not sufficient when a company enters new industries • Multidivisional structure innovations – Divisions (operating responsibility) – Corporate headquarters staff to monitor divisions (strategic responsibility) – Each division may be organized 13 - 2 Multidivisional Structure 13 - 3 Advantages of a Multidivisional Structure • • • • Enhanced corporate financial control Enhanced strategic control Growth Stronger pursuit of internal efficiency 13 - 4 Problems in Implementing a Multidivisional Structure • Establishing the divisional-corporate authority relationship • Distortion of information • Competition for resources • Transfer pricing • Short-term R&D focus • Duplication of functional resources 13 - 5 Structure, Control, Culture, and Corporate-Level Strategy • Unrelated diversification – Easiest and cheapest strategy to manage – Allows corporate managers to evaluate divisional performance easily and accurately – Divisions have considerable autonomy – No integration among divisions is necessary 13 - 6 Structure, Control, Culture, and Corporate-Level Strategy (cont’d) • Vertical integration – More expensive than unrelated diversification – Multidivisional structure provides necessary controls to achieve benefits from the control of resource transfers...

Words: 783 - Pages: 4

Premium Essay

Unit 4 Discussion 1 Is 3230

...very likely than ever before. To monitor and protect information from hackers, malicious and well-meaning insiders, EducationS will need to select solutions based on an operational model for security that is risk-based and content-aware. Stop incursion by targeted attacks- To prevent incursions, it is necessary to shut down each of these avenues into the organization’s information assets. Core systems protection, IT compliance controls assessment automation, and endpoint management, in addition to endpoint, Web, and messaging security solutions, should be combined to stop targeted attacks. (Why) Because the top four means of hacker incursion into a company’s network are through exploiting system vulnerabilities, default password violations, SQL injections, and targeted malware attacks  Identify threats by correlating real-time alerts with global intelligence- To help identify and respond to the threat of a targeted attack, security information and event management systems can flag suspicious network activity for investigation. (Why) The value of such real-time alerts is much greater when the information they provide can be correlated in real time with current research and analysis of the worldwide threat environment.  Proactively protect information- You must accurately identify and proactively protect your most sensitive information wherever it is stored, sent, or used. By enforcing unified data protection policies across servers, networks, and endpoints throughout the enterprise...

Words: 460 - Pages: 2

Premium Essay

Chapter 7 Review Questions

...positives are just a problem, and false negatives are failures in the systems. 3. A network-based IDPS monitors traffic, and host-based IDPS stays on a particular computer or server and monitors that system. 4. Signature-based IDPS examine data traffic for patterns that match signatures, and behavior-based IDPS collect data from normal traffic and establish a baseline. 5. A switched-port analysis port is a data port on a switched device that copies all designated traffic from the switch device so the traffic can be stored and analyzed for IDPS. 6. In the Centralized control strategy all IDPS control functions are implemented and managed in a central location. Fully-Distributed is the opposite of Centralized, and in this strategy each monitoring site uses its own paired sensors to perform its own control functions to complete necessary detection, reaction, and response functions. 7. Honeypots are decoy systems designed to lure potential attackers away from critical systems. When more than one honeypot is connected to a number of honey pot systems on a subnet it’s called a honeynet. 8. A padded-cell is a tougher honeypot, when its detected attackers it smoothly sends them to a special stimulated environment where they can no longer cause harm. 9. Network footprinting is the organized research of the internet addresses owned or controlled by a target organization. 10. Network fingerprinting is a survey of all the target organization’s internet addresses that...

Words: 541 - Pages: 3

Premium Essay

Caregroup

...*  In 2002, the entire IT network for five Massachusetts hospitals and CareGroup providers went down for almost four days * We examine the repercussions of this network failure, and the technological and structural issues that led to the network collapse. * We also propose risk management strategies to avoid similar problems in the future, specific steps that CareGroup should take, and 10 key lessons to be learned from this case  * In 1996, five sizable hospitals in Massachusetts merged. * CareGroup was the team of healthcare providers who offered healthcare to this vast patient population. * The IT department of CareGroup needed to create an IT network that integrated each facility's numerous departments  * By 2002, the hospitals were brought together on a common system and shared what was believed to be among the most advanced network systems in the United States at the time  What went wrong? * In November 2002, a researcher in CareGroup was experimenting with a file sharing application * Upon finding that his wife was in labor, he suddenly left with the software running in an untested state * This new application began to explore surrounding networks and copied data in large volumes, eventually moving terabytes of data across the network * On November 13 2002, the entire network for CareGroup went down for almost four days * No one in the IT department was able to identify the problem- eventually field experts from Cisco were called...

Words: 913 - Pages: 4

Premium Essay

Security N Tsting

...security controls. Identify types of security events and baseline anomalies that might indicate suspicious activity. I. Unscheduled reboots on machines and servers that aren’t updates. II. non-business related websites. III. jump in packets. IV. passwords entered wrong to many times. Policy violations and security breaches: I. Watching the event logs of your servers for failed logons and other security-related events. Logs can tell an Admin a lot about the root of the issue and makes it easier to fix or manage from happening again. II. Best way to get rid of the traffic to certain web sites is to make a block list or outsource a company to make a block list for you. III. Use a software network scanner to monitor or track them. IV. User passwords are probably one of the most vulnerable ways to have a security breach. A proper password should consist of 8 characters or more, capital, number, system, and never a word, or date. Next best thing is ACS. Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate the risk and minimize exposer: 1.A user made unauthorized use of network resources by attacking network entities. Fire the employee or put employee on probation with limited access. 2.Open network drive shares allow storage privileges to outside users. 3.Sensitive laptop data is unencrypted and susceptible to physical theft. Monitor for port scanning...

Words: 328 - Pages: 2

Premium Essay

Project Management Samsung

...ASSIGNMENT ON DEVELOPING STRATEGIC MANAGEMENT AND LEADERSHIP SKILLS COURSE CODE: GOTXH04/WFPA GROUP D SUBMITTED BY Group D – 3 (SAMSUNG) TO THE SCHOOL OF FINANCE AND PROFESSIONAL STUDIES IN PARTIAL FULFILMENT OF THE REQUIREMENT FOR THE AWARD OF POST GRADUATE DIPLOMA IN MANAGEMENT STUDIES (PGDMS). COURSE LECTURERS DATE: 05/08/2011 1.Project Executive Summary The overall project is focusing on a plan to design and launch the next generation mobile handset –Samsung Solid Extreme which will be called V2 as per clients needs. This project plan has aim and objectives to be achieved within the agreed project scope. The deliverables of this plan contains network diagram and Gantt chart to measure the project performances and on-going approaches. Moreover, in order to indentify and handle the risk involved within the project, this project will use risk register. Key areas of this project approach will be the stages in PBS, WBS and CBS where it will function as a framework of this project and affect the final outcome of this whole project. The ideal outcome of this project will be a successful launch of a new V2 design within the time, budget and scope limit. 2. Project overview Using the Client briefing document, this section will describe: • Project background and context, • Main requirements of the Project. Project Planning Inc. has been invited by an SME electronics design company , to tender for the commission...

Words: 3979 - Pages: 16

Premium Essay

P3410 Wireless Security

...What capabilities should a wireless security toolkit include? P339-340 A wireless security toolkit should include the ability to sniff wireless traffic, scan wireless hosts, and assess the level of privacy or confidentiality afforded on the wireless network. 16. What is biometric authentication? What does the term biometric mean? P341 Biometric authentication uses measurable human characteristics or traits to authenticate the identity of a proposed systems user. “Biometrics is the measurement and statistical analysis of people’s physical and behavioral characteristics. The technology is mainly used for identification and access control, or for identifying individuals that are under surveillance.” (Rouse, 2000-2017) 17. Are any biometric recognition characteristics considered more reliable others? Which are the most reliable? P341 Only three human characteristics are usually considered truly unique: iris, retina, and fingerprint. As per Table 7-3 in our book, fingerprint is the most reliable characteristic. 18. What is a false reject rate? What is a false accept rate? What is their relationship to the crossover error...

Words: 1428 - Pages: 6

Premium Essay

Ford vs Dell

...excelled in since 1903. Ford can never be virtually integrated like Dell but the Ford Company can adopt some of Dell’s concepts of virtual integration to strive for excellence in supply chain management. As Director of Supply Chain Systems, I am convinced that Ford can implement portions of Dell’s Virtual Integration strategy even though the Ford Company differs in many respects from Dell. A modification of the virtual integration system that Dell uses should be applied to Ford’s supplier base, distribution system, dealerships, and divisions. Issue Identification Ford must find ways to improve their supply chain management to compete in a global market and continue to retain its market share in an increasingly competitive, saturated and over capacitated US market. Ford must act now or risk losing market share. The main issue Ford must deal with is decreasing the volume and complexity of its supplier base as it is plagued with costly inefficiencies. Secondly, Ford must get closer to its customers to better understand their needs and wants and to create better forecasting of demand. Teri Takai must decide within a week if Ford should model its supply chain strategy close to Dell’s Virtual Integration. Environment and Root Cause Analysis The Ford Motor Company is the 2nd largest industrial corporation in the world with revenues of $144 billion. Ford employs over 370,000 employees and has operations in 200 countries. What Ford does best is design and manufacture automobiles for...

Words: 1490 - Pages: 6

Free Essay

Jd Js

...will be responsible developing and implementing a national strategy for achieving the annual oncology sales objectives of the company. You will monitor and control the sales budget to ensure optimum utilisation of resources in the region. You would network regularly with Oncologists and provide timely and updated information about services offered. You will, with your Team, forge appropriate partnerships with key players in the Healthcare Industry to promote the achievement of Company's objectives. Part of your role will also include monitoring activities of your Competitive Set and collating data on new products, services, financials and performance in the region. You will provide adequate training to your Team and ensure that they are up to date on developments JOB ANALYSIS To work as Head - Oncology Sales with this Leading Chain of Diagnostic Clinics with a Pan India and International presence Job Description Title Head- Oncology Sales (National Level Assignment) Education MBA (Marketting) or equivalent PG Degree. Reporting To CMO Knowledge Industry, Competitor, Maeket (Oncology) Reported By 4 sales heads Skills Networking, Leadership, teamability, development, innovation Job Role And Responsibility 1 Developing and implementing a national strategy for achieving the annual oncology sales objectives of the company. 2 Monitor and Control the sales budget Knowledge Basic of sales budgeting etc...

Words: 368 - Pages: 2

Premium Essay

Data Prevention Breach

...have critical information assets such as customer data, intellectual property, trade secrets, and proprietary corporate data, the risk of a data breach is now higher than ever before. To monitor and protect information from hackers, malicious and well-meaning insiders, organizations should select solutions based on an operational model for security that is risk-based and content-aware. Here are six steps that any organization can take, using proven solutions to significantly reduce the risk of a data breach. 1 2 3 4 5 6 Stop incurSion By targeteD attackS The top four means of hacker incursion into a company’s network are through exploiting system vulnerabilities, default password violations, SQL injections, and targeted malware attacks. To prevent incursions, it is necessary to shut down each of these avenues into the organization’s information assets. Core systems protection, IT compliance controls assessment automation, and endpoint management, in addition to endpoint, Web, and messaging security solutions, should be combined to stop targeted attacks. iDentify threatS By correlating real-time alertS with gloBal intelligence To help identify and respond to the threat of a targeted attack, security information and event management systems can flag suspicious network activity for investigation. The value of such real-time alerts is much greater when the information they provide can be correlated in real time with current research and analysis of the worldwide...

Words: 642 - Pages: 3

Premium Essay

Books of Ark

...written permission. Case Study: Critical Controls that Could Have Prevented Target Breach In December 2013 over 40 million credit cards were stolen from nearly 2000 Target stores by accessing data on point of sale (POS) systems. This paper will explore known issues in the Target breach and consider some of the Critical Controls that could have been used to both prevent this breach and mitigate losses. AD Copyright SANS Institute Author Retains Full Rights Case Study: Critical Controls that Could Have Prevented Target Breach GIAC (GSEC) Gold Certification Author: Teri Radichel, teri@radicalsoftware.com Advisor: Stephen Northcutt Accepted: August 5th 2014 Abstract In December 2013 over 40 million credit cards were stolen from nearly 2000 Target stores by accessing data on point of sale (POS) systems. This paper will explore known issues in the Target breach and consider some of the Critical Controls that could have been used to both prevent this breach and mitigate losses. From what is known about the Target breach, there were multiple factors that led to data loss: vendors were subject to phishing attacks, network segregation was lacking, point of sale systems were vulnerable to memory scraping malware and detection strategies employed by Target failed. A possible solution for preventing and mitigating similar breaches using a defense in depth model will be presented using a multi-layered security strategy. Considerations of human factors that contributed...

Words: 8983 - Pages: 36

Premium Essay

Product Lineup for the Upcoming Year Often Differed from Year to Year

...partial implementation and execution of the virtual integration of Dell’s direct model. Although there are several key differences between these two industries, Dell’s strategy(Exhibit 3) still could be applied to Ford. Under this model, Ford can use the information technologies to interact and transact from their supplier to customer. Reduce the layers would increase both operation control efficiency and the flexibility in supply chain. Every big change may cause high risk of the issues during the implementations. Ford should build the special group the Monitor the process in order to make the transactions to go smoothly.   Issue Identification The growth of this industry and new technology pushed Ford need to do the redesign for their supply chain as Dell or not. Issues for existing Supply Base:  No Direct feedback from customer.  No flexible for supplier management.  Long lead time for the parts.  Large data base of suppliers and network  Lack of technology and technological sophistication that prevail in the supply chain, especially at lower tiers (Exhibit 1) Virtual integration would require changes in fundamental operations. Compare with Dell, Ford cannot make the change easily because they have a large data base of the business, thousand suppliers and operates in a more complex network of business relationship. Environmental and Root Cause Analysis Ford founded on 1903 and now...

Words: 1104 - Pages: 5

Premium Essay

Lab 2 Ist

...Lab 2 - Align Risks, Threats, and Vulnerabilities to COBIT PO9 Risk Mgmt. Controls Part 1 4. Discuss the primary goal of the COBIT v4.1 framework. Provide a basic description of cobit. * The purpose of Control Objectives for Information and related Technology (COBIT) is to provide management and business process owners with an information technology (IT) governance model that helps in delivering value from IT and understanding and managing the risks associated with IT. COBIT helps bridge the gaps amongst business requirements, control needs and technical issues. It is a control model to meet the needs of IT governance and ensure the integrity of information and information systems. 5. Explain the major objective of the Control area (COBIT 4.1 Controls Collaboration link on the left side of the COBIT website) * “The COBIT Controls area within ISACA's Knowledge Center promotes collaboration and sharing of information, solutions and experience among COBIT users.” 6. From the COBIT Domains and Control Objectives section, list each of the types of control objectives and briefly describe them based on the descriptions on the website. * Plan and Organize – “This domain covers strategy and tactics, and concerns the identification of the way IT can best contribute to the achievement of the business objectives. The realization of the strategic vision needs to be planned, communicated and managed for different perspectives. A proper organization as well as technological...

Words: 4162 - Pages: 17