...configure, maintain and monitor rules for multiple profiles, notifications and authenticated exceptions and he would also like me to be able to create and manage inbound and outbound rules and with windows firewall I can accomplish both of these task because Windows Firewall with Advanced Security works by examining the source and destination addresses, source and destination ports, and protocol numbers of a packet, and then comparing them to the rules that are defined by the administrator. When a rule matches a network packet then the action specified in the rule (to allow or block the packet) is taken. Windows Firewall with Advanced Security also lets you allow or block network packets based on whether they are protected by IPsec authentication or encryption. Then I could also have capabilities of Data encryption and connection security rules with Windows Firewall Data protection includes both data integrity and data encryption. Data integrity uses message hashes to ensure that information is not being changed while in transit. Hash message authentication codes (HMAC) sign packets to verify that the information received is exactly the same as the information sent. This is called integrity and it is critical when data is exchanged over unsecured...
Words: 344 - Pages: 2
...SEC 402 WK 8 ASSIGNMENT 2 IMPLEMENTING NETWORK To purchase this visit here: http://www.activitymode.com/product/sec-402-wk-8-assignment-2-implementing-network/ Contact us at: SUPPORT@ACTIVITYMODE.COM SEC 402 WK 8 ASSIGNMENT 2 IMPLEMENTING NETWORK SEC 402 WK 8 Assignment 2 - Implementing Network and Personnel Security Measures Write a four to five (4-5) page paper in which you: 1. Create an information flow diagram, using Visio or Dia, which: a. Illustrates how remote users will securely connect to the government agency’s network. b. Illustrates the patch of network devices that data packets must travel to get from server to remote user’s device and back to server. Note: The graphically depicted solution is not included in the required page length. 2. Provide an equipment list of network security devices that would be needed to ensure the integrity and sensitivity of private information. In this list: a. Propose at least two (2) vendor brands per each device and the associate costs required to procure these items. b. Identify the functionality each device serves and the expected benefits the government agency should experience upon the successful installation of this equipment. 3. Develop a maintenance plan that should be recommended to the government agency to ensure having the latest security measures available within the network in which you: a. Describe the risks associated with not fulfilling the activities outlined within your maintenance......
Words: 832 - Pages: 4
... Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.1.5, timeout is 2 seconds: .!!!! Success rate is 80 percent (4/5), round-trip min/avg/max = 0/0/2 ms PC>ping 192.168.1.5 Pinging 192.168.1.5 with 32 bytes of data: Reply from 192.168.1.5: bytes=32 time=1ms TTL=128 Reply from 192.168.1.5: bytes=32 time=0ms TTL=128 Reply from 192.168.1.5: bytes=32 time=0ms TTL=128 Reply from 192.168.1.5: bytes=32 time=0ms TTL=128 Ping statistics for 192.168.1.5: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 1ms, Average = 0ms Packet Tracer PC Command Line 1.0 PC>ping 192.168.1.4 Pinging 192.168.1.4 with 32 bytes of data: Reply from 192.168.1.4: bytes=32 time=1ms TTL=128 Reply from 192.168.1.4: bytes=32 time=0ms TTL=128 Reply from 192.168.1.4: bytes=32 time=0ms TTL=128 Reply from 192.168.1.4: bytes=32 time=0ms TTL=128 Ping statistics for 192.168.1.4: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 1ms, Average =...
Words: 277 - Pages: 2
...Game.............2 Logging Packets...............3 Sending Packets...............3-4 Dynamic Packets..............5 Packet Blocking...............6 Packet Modification........6 Opcode Labeling..............7 Introduction to RiPEST...7 RiPEST Database.............8 Further Reading................8 1 RiPE Injecting RiPE: If you are using RiPE Launcher: Select the game or process that you want to inject into, and then click the "Inject" button. RiPE Launcher comes with RiPE. Make sure that RiPE Launcher is in the same folder / directory as RiPE.dll. If you are using Injector Gadget: Select the game or process that you want to inject into from the left. Add RiPE.dll to the DLLs to Inject list by browsing for it or dragging the .dll and dropping it into the DLLs to Inject box. After that is done, click the "Inject" button. Do NOT check "Cloak DLL." RiPE uses its own cloaking methods. Selecting a Game: After injecting, you should now see a "Game Selection" dialog. Select the game that you want to use RiPE for from the left, and the version from the right. Click on "Continue." You may additionally "Search for a Plugin" to search the RiPEST plugin database for other plugins. Plugins appear on the Game Selection menu just like any other game. 2 RiPE Logging Packets: To log packets, simply click "Hook Send" or "Hook Recv." Hook Send will log packets sent FROM the client TO the server. Hook Recv will log packets sent FROM the server......
Words: 1937 - Pages: 8
...for a change in the way data is delivered. Currently it’s by one packet of information (data) at a time. After some research I have learned there are a number of ways people are trying to change this method of data delivery. Some of them are: • Packets • Capsules • Holograms and Lasers • Teleportation I will give a brief explanation of each one and include the advantages and disadvantages. The current technology uses packets which are small files of information wrapped by a header and footer with security information on the both sides. These are the destination the packets are being sent to and the source that the packets are coming from. The advantages are: Packets are very secure because they can use encryption. Key exchange algorithms are used to securely exchange a shared secret value between two computers over an unsecured network connection. The computers exchange information that, when processed by the algorithm, produces the shared secret value. A third computer listening on the network and intercepting network packets between the first two computers cannot determine the shared secret value. The shared secret value can then be used as a session key, or to generate a session key, to encrypt the rest of the communications used in the IPsec negotiations. (Technet) • Small enough to send quickly The disadvantages are: • high learning curve • only sent one packet at a time Bottom line with packets it is like downloading a two-hour movie in 3 hours with a......
Words: 1069 - Pages: 5
...Cost of yoodles is Rs. 10. 2. Sales Pattern in two halfs of 2011 is in the ratio 45:55. 3. The Duzy Pasar Retail Chain is available in 77 cities Working: | Demeter | Category | Total sales Ytd. 2011(Rs.) | 15381861.56 | 314249823.08 | Projected Yearly sales FY 2011(Rs.) | 34147733 | 697634607 | Target Market share | 15% | - | New Projected Sales FY 2011 | 104645191 | - | Incremental Sale | 69995007 | | Total Cost of BTL | 109152928 | - | ROI | 64% | - | Calculation of the cost: The following are the various costs for the BTL activities: Sample explanation: 1. Wet Sampling: 1 packet will serve 5 customers No. of customers per day: 40 (metros)+ 30(B & C Class cities) No. of packets per day per hyper per metro: 8+5.2=13.2 Total no. of packets: 8*15 (metros)+ 5.2* (77-15)= 442 Cost per day: 442* 7(unit cost of a packet)= 3097 per month Total cost for the next six month (2nd half-year): Rs. 557424 Similar calculations are done for other BTL Strategies. Analysis of the data provided: 1. For yoodles, in terms of cities. , the highest growth in sales nos.is in Mini metros & town class (‘C’ & ’D’ Class cities). 2. Also, the growth is highest for Modern Stores- Urban. 3. Region wise: * In Ytd. 2010, South & East did decently whereas North & west had extremely poor sales. * In Ytd. 2011, North & West picked up in sales. But Still we have highlighted North & West to strengthen its......
Words: 283 - Pages: 2
...Expectations from students: The aim of this Term Paper is to produce a Programming logic or Animation on the assigned Topic. The assignment is to read the existing system/problem and create a program of your concept to obtain the expected results. Assistance from text and reference books, articles and reports on the concerned topics from Internet can be taken but the animation logic should be your own piece of work. Along with, students are supposed to write an abstract of the topic with example, real world applications, and impact on society or solutions recommended. Abstract submission: (3-4 pages) • Description of the topic • Example of the given topic • Future plan of the given work. The Abstract (Synopsis) of the topic must be submitted latest by 15thof Sept and submission will be accepted thereafter. Final submission: a) A report containing following contents: 1. Introduction Provide a brief textual description of the problem. Elaborate on the given problem statement, providing some more detail. 2. Background a. What was the weakness in the previous algorithm/concepts and requirement of existing algorithm/concept? 3. Methodology : a. Steps of making the program (graphics be used to showcase the output) 4. Observation a. Result in the form of output and a well formatted report. 5. Future Scope and Suggestion --- Suggestion to improve the......
Words: 835 - Pages: 4
...William Kollie IS3120: Convergence of IP Based Network MR. McMiller July 20 2014 The dial up connection is made from a computer through modem and telephone line to the ISP's computer. The computer uses data in digital form. It means that it the computer can transmit data in 1's and 0's on and off also called digital or binary form. On other hand, telephone lines transmit data in analog form. It means that they transmit data by sound. the telephone line from your house is joined to a special terminal that sends the data received from their computers in form of audio signals from to enter the Public Switched Telephone Network PSTN. From PSTN, it is routed to the person or ISP that the modem is calling through the internet. Dial-up connection face connectivity problem which the user has to deal with. Dial up connection is unstable, dialup demand phone line connection which block incoming calls access, the chief disadvantage of dialup Internet, as compared with broadband Internet, is its slowness. Access to modern broadband networks is essential in the information age, said FCC Chairman Tom Wheeler. Yet 15 million Americans live in areas where they can’t get wireline broadband no matter how much they want it. These funds will jump-start broadband access in areas that would otherwise be bypassed by the digital economy. At least 100 million U.S. homes should have affordable access to actual download speeds of at least 100 megabits per second and actual upload......
Words: 687 - Pages: 3
... Step 11- 192.168.1.97 Step 12- No Step 13- None Step 14- No it could not ping default gateway, 192.168.1.15 Step 15- No Step 18- R1, R2, and R3 are connected, because it use PPP Step 19- Fa0/0 192.168.1.65 255.255.255.224 Step 21- Yes Step 22- 192.168.1.49, 192.168.1.98, 192.168.1.33, 192.168.1.78; R1 forward the packet to R3 which send it to R2 which sends it to PC2 Step 24- 192.168.1.98 R3 S0/0/0 Step 26- 192.168.1.34 belongs to R3 S0/0/1; 192.168.1.17 belongs to R1 S0/0/0 Step 27- Yes, Serial interface S0/0/1 Step 28- Yes, passive interface S0/0/1 Lab 7 Step 2- R2 Fa0/0 192.168.2.254, PC2 192.168.2.2 Step 3- 192.168.1.0/24, 192.168.2.0/24, 192.168.3.0/24, 192.168.12.0/24, 192.168.13.0/24, and 192.168.23.0/24 Step 4- Yes, All route exist on table Step 5- R3 S0/0/0 192.168.13.3, R1 S0/0/1 192.168.13.1 Step 6- Goes to R3 then back to R1 Step 8- 192.168.2.0/24 via 192.168.13.3 Step 9- there is no route to 192.168.2.0/24 Step 10- use static default 0.0.0.0 S0/0/0 Step 11- R1 use a static route to 192.168.2.0 that send the packet to R3 and R3 use default to send it back to R1 Step 12- No Step 13- No, from R1 to R2 Step 14- ip route 192.168.2.0 255.255.255.0 192.168.13.3 Step 15- Use command “configure terminal” then command “no ip route” 192.168.2.0 255.255.255.0 192.168.13.3 Step 16- It will take 192.168.12.2 Step 17- Takes route......
Words: 610 - Pages: 3
...Lab 6.1 Review 1. It uses a beacon like transmission to find other devices on IBSS mode and on the same SSID to connect and share. 2. It has a very very short range and is unable to penetrate walls and other objects. 3. It is able to maintain connection anywhere in the house it is setup in without the need of trailing a connection cable like wired connections so you get a tradeoff of speed vs versatility Lab 6.2 Review 1. The biggest problem would be collision if multiple routers are using the same channel a common example of this is Comcast routers are set to use a channel close to the signal for the ps3 so you get a depredation of signal and loss of data packets as the connection goes on. 2. If a previously stated standard is not compatible with your adapter you could have issues with your connection not connecting Lab 6.3 Review 1. Um well I could write a book but simply a guest having access to your network could result in any imaginable results on your network to name a few rootkits,Trojan droppers, Remote Access Terminals, Keyloggers, Viruse’s. 2. Setting a MAC filter is a good way to filter who has access to your network its simply like saying Fred has access to the building with his fingerprint being scanned by a biometric scanner. Although this can be spoofed by spoofing your mac but you would still have to find out which macs are allowed and have to make sure the mac your spoofing is not connected so that you do not receive a duplicate error. Lab Review 6...
Words: 393 - Pages: 2
...something like a spoken language that uses electricity. A header and/or trailer as a place to store a message that needs to flow through the network with the user data. Leased line creates the equivalent of a cable directly between two remote sites. T Internet Protocol (IP), list the rules so that the network can forward data from end to end through the entire TCP/IP network. IP address identifies that device in a TCP/IP network. Remember, computer networks, including TCP/IP networks, need to deliver bits from one device to another. IP routing defines exactly how routers makes their choices of how to forward data in a TCP/IP network. : frame and packet. The term frame specifically refers to encapsulated data that includes the data-link header and trailer, plus everything in between—including the IP header. The term packet refers to what sits between the data-link header and trailer, but not including the data-link header and...
Words: 257 - Pages: 2
...Kod Projek : | BITU 3973 | UNIVERSITI TEKNIKAL MALAYSIA MELAKAFACULTY OF INFORMATION AND COMMUNICATION TECHNOLOGYPROJEK SARJANA MUDA 1PROPOSAL FORM[Incomplete form will be rejected] | A | TITLE OF PROPOSED PROJECT:Tajuk projek yang dicadangkan :ANALYSIS ON IPV6 ATTACK (SMURF6) | B | DETAILS OF STUDENT / MAKLUMAT PELAJAR | B(i) | Name of Student:Nama Pelajar: JAMALUDDIN BIN NAFIS Identity card no.:No. Kad Pengenalan : 910424-14-6277Student card no.:No. Kad Pelajar : B031310034 | B(ii) | CorrespondenceAddress :Alamat Surat Menyurat : 66G JLN MELUR 3 SERI MELUR KG MELAYU AMPANG 68000 SELANGOR DARUL EHSAN. | B(iii) | Program Pengajian:Study Program:BITS BITS BITM BITM BITI BITI BITC BITC BITD BITD | B(iv) | Home Telephone No.: No. Telefon Rumah: Handphone No.:No. Telefon Bimbit: 017-6160196 | B(v) | E-mail Address:Alamat e-mel: jamaluddin.nafis@ymail.com | C | PROJECT INFORMATION / MAKLUMAT PROJEK | C(i) | Project Area (Please tick): Bidang Projek (Sila tanda ( √ )): A. Intelligent Information Systems Sistem Informasi Pintar B. Software Technology Teknologi Perisian C. Database Technology Teknologi Pangkalan......
Words: 1224 - Pages: 5
...Getting a Mobile IP is extremely important for any kind of mobile devices linked to the internet. In case there was no Mobile IP, a computer device would need to get a fresh IP each time it shifted from one network to a different one. The reason is since TCP/IP depends on origin as well as destination IP handles for being referenced in the data packet headers: Which means the mobile devices are not able of modifying the IP address as well as maintaining a continuous link. That's the place where Mobile IP comes into play as well as altered that. Having Mobile IP every time a device goes to afresh network, the IP address of the device is provided. One of the benefits of using Mobile IP which is obvious to everybody is that it lets the cordless devices to move around freely into new networks without losing net connection. For users which use cordless devices on a regular basis, it means that maintaining online connectivity to VPNs as well as company intranets, enhances employees efficiency. (Cisco, 2007)Just like anything else there are also drawbacks to Mobile IP. There are lots of routers on the market which are designed to throw away packages which are meant for IP addresses that do not exist in the networks. This is chiefly carried out prevent the network from any attacks. So as to fix this issue, there will have to be enhanced header sizes, that leads to a higher amount of net traffic loads. There are lots of items that are keeping back Mobile IP. Obsolete as well as rival......
Words: 322 - Pages: 2
...Packet Filtering Index Should arriving packet be allowed in? Should a departing packet be let out? Filter packet-by-packet, making decisions to forward/drop a packet based on: Functions of Packet Filter Control: Allow only those packets that you are interested in to pass through. Security: Reject packets from malicious outsiders Watchfulness: Log packets to/from outside world In a software firewall, packet filtering is done by a program called a packet filter. The packet filter examines the header of each packet based on a specific set of rules, and on that basis, decides to prevent it from passing (called DROP) or allow it to pass (called ACCEPT). There are three ways in which a packet filter can be configured, once the set of filtering rules has been defined. In the first method, the filter accepts only those packets that it is certain are safe, dropping all others. This is the most secure mode, but it can cause inconvenience if legitimate packets are inadvertently dropped. In the second method, the filter drops only the packets that it is certain are unsafe, accepting all others. This mode is the least secure, but is causes less inconvenience, particularly in casual Web browsing. In the third method, if the filter encounters a packet for which its rules do not provide instructions, that packet can be quarantined, or the user can be specifically queried concerning what should be done with it. This can be inconvenient if it causes numerous dialog boxes to......
Words: 256 - Pages: 2
...and Route Maintenance, where the Route Discovery mechanism handles establishment of routes and the Route Maintenance mechanism keeps route information updated. Assumptions Some assumptions concerning the behavior of the nodes that participate in the ad hoc network are made. The most important assumptions are the following: A1. All nodes that participate in the network are willing to participate fully in the protocols of the network. A2. The diameter of an ad hoc network is the minimum number of hops necessary for a packet to reach from any node located at one extreme edge of the ad hoc network to another node located at the opposite extreme. We assume that this diameter will often be small (e.g., perhaps 5 or 10 hops), but it may often be greater than 1. A3. Nodes can detect the error through a standard link-layer checksum or Cyclic Redundancy Check (CRC), and discard corrupted packages . A4. The speed at which nodes move is moderate with respect to packet transmission latency and wireless transmission range of the particular underlying network hardware in use. A5. Each node can be identified by a unique id by which it is recognized in the network. Mode of Operation DSR operate on demand, which means that no data, such as route advertisement messages, is send periodically and therefore routing traffic caused by DSR can scale down and overhead packages can be avoided. DSR is a source routing protocol, which means the entire route is...
Words: 1841 - Pages: 8