This website uses cookies to ensure you have the best experience. Learn more

Building A Secure Network Essay

906 words - 4 pages

Building a Secure Network
The architecture and build design of a secure network is a very intricate and detailed process. It requires a seasoned hand for the development and implementation of the network diagram. A network diagram is a graphical representation containing your backbone equipment, IP addresses, ISP, host machines, and peripherals. Mostly all network diagrams for SOHO networks are the same but may different depending upon the needs of the company. This context will describe and explain the design considerations that should go into building a secure network.
The first step in building secure network is creating the network topology. The topology is a physical and logical layout of the network. It is the DNA and basis of network design. A basic network will contain an Internet Service Provider (ISP) router, boundary router, firewall, switches, severs, and local hosts. The ISP is connected to the border router. The border router is the outside/inside router. The outside is public interface and the inside is the private interface. The boundary router is the first line of defense for traffic coming inside and going outside the network. The router must be configured properly to mitigate the vulnerabilities coming inside the network. The passwords for the router should be strong. Password should not be a common word. They should be alpha numeric with symbols and more than 8 characters. One must consider what ip’s are allowed to send and receive from the outside. IP tables are constructed within the router. These tables contain access lists which will filter the all traffic inbound and outbound outside in a network. Static routing with the router is a good practice it alleviates DDos attacks. Router interfaces not in use are disabled because this closes the door on attacks.
An external firewall is placed between the boundary router and LAN switch and an internal firewall after the LAN switch. this provides another layer of protection. A firewall monitors and prevents various types of attacks. There four basic types of firewalls. The four types are a packet filter firewall, stateful inspection firewall, application proxy firewall and a circuit level proxy firewall. Each of these firewalls is designed differently. Packet filter firewall is the simple firewall. It monitors each data packet coming in or out. It has a rule base to regulate which data packets are permitted or prohibited. This firewall monitors each data packet based on the source and destination ip addresses and port numbers found within the header of the packet. It is easy to configure but is susceptible to ip spoofing attacks. Stateful filter firewalls inspect the information within the data packets. The filter checks for the stability of the connections and legitimacy of the packets coming from those connections. It provides a more...

Find Another Essay On Building a secure network

Project Plan Essay

1849 words - 8 pages for building a secure information system includes security policy to define precisely and fully secure state of the system then set its mechanisms to ensure the implementation. Human error is the most common to the failure of network security. Just simply open up an email’s attachment which contains infected file would bring the whole network of virus thread risk. The other method is called email phishing. “Phishing is an e-mail fraud method in

Computer Networking Security Essay

933 words - 4 pages could break in?” “My workplace is a locked secure building, why do I need a password?” These kinds of questions lull computer users into a false sense of security. Try not to use dates of birth, your favorite number, color, pet, family, etc. These are all easy targets to the trained hacker. Disconnection from the network is a frequent problem, and something every user should know how to fix. It can happen from common place problems such as a loose

Security Audit

1554 words - 7 pages internet connection. More packets and information will be sent across the network with more users online connecting to the Wi-Fi. This would depend on the number of users connecting to the network and using it at one given time. Fourth, the security in the buildings and outside the buildings are weak. Everyone can simply walk into a building and potentially use any computers which can gain network access to secure files. There are no key entries

Technology in the Modern Medical Office

1892 words - 8 pages patient's medical records via a secure computer network. I know from personal experience, my doctor must leave the examination room, and go to her office to access her computer so she can make any updates, enter any notes, or to place an electronic prescription with my pharmacy. This can take anywhere from two to five minutes, and she has to do this for each patient she sees each day. Why does she have to do this, why not just have computers in a

Network Topology

1764 words - 8 pages 2.0 NETWORK TOPOLOGY 2.1 NETWORK WITHIN A BULDING A new three level building will be built to accommodate three computer labs for Faculty of Computer Science and Information Technology. It will be a separate building from the existing one. Each level will accommodate one lab. 50 personal computers (PCs) and a shared printer will be located in each lab. All three labs will be linked to each other and also to a server room located at the second

network administration

1394 words - 6 pages ) #end   TASK3 a. VLAN – a virtual LAN is a switched network that is a logically segmented network. Inter- VLAN communication takes place in machines that are within a single broadcast domain. The broadcast domain could be located anywhere within a building, it could be in different floors and the machines will still communicate with each other. The machines are not required to be in a single physical location. The broadcast domain machines

Overview of Network Security

1050 words - 4 pages security setting to minimal or less. This is a perfect chance for someone to sneak into the network and do terrible things to the files within the network. So be sure to manage the network file share setting to a high security setting that is most secure to your liking. The same goes for your firewall, be sure you manage your firewall setting to block out suspicious activity. One of the most, if not the most, problems with intrusion and theft is act

project plan

1475 words - 6 pages building a network infrastructure. Most architecture use routers with built-in firewalls, as well as software that allow finely-tuned user-access control, data packet monitoring, and strictly defined protocols” (What is Network Infrastructure?). Security can also be controlled by adjusting network sharing properties on individual systems, which limits the folders and files that can be seen by other users on the network. Works Cited How to Secure

What Is Network Security

631 words - 3 pages essential it is an often overlooked business component. Securing an organization's computer system can cost anywhere from $500 and exceeding $50,000, depending upon a company's size and needs. A properly secured network can end up saving untold amounts of money in terms of keeping up with the safety and soundness of the reputation of a company, client trust and sales. Maintaining a secure system can also end up saving money on equipment and software

Key Management for Multicast Groups using Broadcast Encryption and Group Key Agreement

583 words - 3 pages provided to maintain confidentiality and integrity. A few years later, The project 'Development of a Global Network for SEcure Communication based on Quantum Cryptography (SECOQC) [7] aims to pave the way for practical application of the QKD technology. The demonstration involved one-time pad encrypted telephone communication, a secure (AES encryption protected) video conference mainly rely on emerging sophisticated protocols. Consecutively on 2010

INDP for Riordan

3665 words - 15 pages , there are always security vulnerabilities. On a local area network infrastructure, care must be taken to ensure the backbone of the network is physically secured inside the building with no access that can facilitate a tap into the network. Wireless networks are susceptible to hacking due to line of sight or simply pulling the info out of the air. Therefore, it is imperative to identify network security hardware and software that will protect the

Similar Essays

Architecture And Design Considerations That Should Go Into Building A "Secure" Network

938 words - 4 pages security an integral part of drafting the documentation, physical and software requirements that go into building a secure network. Regardless of the size of the project, a good plan should be the first step in the process. The principal question that should be asked is: What is the purpose of this network and what are the resources required to meet this purpose? This will lead to creating a project plan that will include all of the standards which

Implementing A New Wide Secure Wireless Network At Brigham Young University Hawaii

2628 words - 11 pages Introduction Brigham Young University Hawaii Campus wants to implement a campus wide secure wireless network. In their existing system there are some network security flaws such as rouge access point (Easily accessible open network), anyone can access and capture important information of users. We have been hired by the BYU-HAWAII to design and install a wireless network solution for the university. EXISTING SYSTEM Users-3000 User type-Students

Building And Maintaining A Personal Learning Network (Pln)

1335 words - 5 pages Building and Maintaining a Personal Learning Network (PLN) Can a modern educator operate effectively without a PLN? It may be possible. However, - with advances in multimedia technology and the revolution of social networking posturing as a disruptive technology - a wise educator will seize every opportunity in learning to integrate the benefits of social networking with new teaching paradigms. Consequently in this research, a review of

Case Study: Siemens Share Net: Building A Knowledge Network

1302 words - 5 pages AbstractIn response to industry demands, Siemens underwent a major corporate restructuring in 1998; among other changes, a new department was established, the ICN or Information Communications Network. The ICN created ShareNet, an information network readily accessible through any web browser, to take advantage of the knowledge gained from the company's 156 years of experience and the current talents the it has to offer, and make these