This website uses cookies to ensure you have the best experience. Learn more

Network Physical Threats Essay

1083 words - 5 pages

Physical Threats
Threats can come from many sources and can affect different parts of a system and network. There are physical threats that can compromise a system and deny the use of network resources. Damage can occur on any piece of hardware connected to the system such as servers, routers, switches, and workstations/ PC’s. Access should be controlled to the location where vital hardware is stored. Ensure all doors remain locked and only authorized individuals enter restricted areas. There can also be damage caused by electrical threats. A voltage spike or total power loss can shut down critical systems and cause negative impacts throughout the company. The APC Smart-UPS RT 5000VA 230V ...view middle of the document...

Preventative measures for these types of attacks could include network monitoring devices, firewalls, and intrusion detection/prevention systems. A network administrator can also allow only specified MAC addresses onto the network.
Internal threats can happen to any organization especially those with many employees. An internal threat can come from a current employee or vendor and usually they are disgruntled in some way. Preventative measures are similar to those for internet threats including spyware, anti-virus software, firewalls, and intrusion detection/prevention systems. External threats can occur virtually or in-house, depending on the skill level of the attacker and their ultimate goal. The attacks occur outside the company or organization.
LAN, WAN, Wireless
A local area network (LAN) is a small grouping of computers and devices that are connected through various topologies in a small geographical area. A LAN is usually within one office building, or several connected buildings like a school campus. The topology for a LAN can be a bus, ring, or star depending on the individual network. The most common seems to be the bus topology. Kudler Fine Foods uses an Ethernet bus topology at each store and will use the same set-up at each of the new stores.
A wide-area network (WAN) can be several systems or devices connected over a large distance using phone lines and radio waves. Alternatively, a company can have separate LAN’s around the country or world that are interconnected using leased communication lines. These connected LAN’s can span country and international borders. Kudler Fine Foods has a WAN that currently connects the three stores in California. The WAN will expand to include the three new stores opening up soon.
The wireless networks for a company usually have limited ranges and only work in the same building or office location. The equipment broadcasts a wireless SSID that employees can connect to and roam freely as long as a signal is present. A wireless network could be set-up for the computer systems at each store; however, the existing network seems to be adequate for the store’s needs.
Network Building Blocks
A network is built with a wide assortment of hardware and software devices. Some devices do similar job and others have entirely...

Find Another Essay On Network Physical Threats

INDP for Riordan Essay

3665 words - 15 pages the electrical threat aspect.The basis of hacking into a computer system on a network is more common due to remote access capabilities. On the contrary, physical threats rely on physical access to the network. While this is a considerably less likely aspect of security concerns, the possibility is still there. The servers providing all storage, distribution and sharing of data on the infrastructure are ideally the most sought-after compliment to a

Riordan INDP Essay

3665 words - 15 pages the electrical threat aspect.The basis of hacking into a computer system on a network is more common due to remote access capabilities. On the contrary, physical threats rely on physical access to the network. While this is a considerably less likely aspect of security concerns, the possibility is still there. The servers providing all storage, distribution and sharing of data on the infrastructure are ideally the most sought-after compliment to a

Elements Of Network Security

1606 words - 6 pages Elements of Network Security Introduction The primary objective of a network security system is to, in a cost effective manner, balance convenient access to legitimate users and inaccessibility to attackers. In a nutshell, the goal is to prevent connectivity to anyone intending to cause harm to the network. The harm to which this paper refers can come in the following forms: 1. Application-level security threats, such as e-mail viruses and

Soboat Technology Inc.: Information Sercurity Plan

2272 words - 10 pages , civil liability and criminal liability. Threats can come in many forms including physical probing, invalid input, and linkage of multiple operations. In order to limit these types of threats, Sobota will comply with the following organizational security objectives: audit, information leakage, and risk analysis. A risk analysis will identify portions of Sobota’s network, assign a threat rating to each portion, and apply the appropriate level of

IBM Solutions

895 words - 4 pages technology services, 2007). Moreover, this special feature is designed in such way to predict the possible threats, defending the network system against them, and prevent the occurrence of data loss as well as cyber-attacks effectively (IBM global technology services, 2007). IBM solution is suitable for any financial services company as it provides physical protection. In IBM solution, digital video surveillance technology is made available to

Functions of A Wide Area Network

2186 words - 9 pages best for client that require only sporadic Wide Area Network usage. Devices transport packet using virtual circuit that provide end to end connectivity. Programmed switching device provide physical connection. Packet header is use to identify the destination. The packet switching offer leased line type service over shared line, but at a much lower cost. Packet-switched network typically use serial connections with speed range from 56 Kbps to E3

Proposal: Network Security

1382 words - 6 pages The organization had just secured a government contract worth millions of dollars. The sensitive nature of the information requires the company evaluate and address security measures. With any network, there are many threats, both internal and external, that can result in loss of productivity, loss of data and even theft of information. I will address several of these threats and propose measures to ensure a protected environment and to

Vulnerability Scanning

1411 words - 6 pages or a false positive. Human judgment is always needed in analyzing the data after the scanning process. • Others: a vulnerability scanner is designed to discover known vulnerabilities only. It cannot identify other security threats, such as those related to physical, operational or procedural issues. • High bandwidth usage slows network performance It is important for the IT staff to understand that a scanner's vulnerability assessment is

wimax

751 words - 4 pages WIMAX Security Issues Threats to The WIMAX Some of the WIMAX threats are: Rogue base stations, DoS attacks, Man-in-the-middle attacks, and Network manipulation with spoofed management frames, Threats in the physical layer. Rogue base stations It is defined as an attacker, which copies a legitimate base station. It allows hackers to confuse subscribers. WiMAX uses time division multiple access, thus the rogue base station must transfer with a

Intorduction To IT Security

1201 words - 5 pages potentially harmful entities. The Handbook of Information Security Management tells us that there are a number of ways to identify, analyze, and assess risk. In developing a plan to secure a network there are many areas to focus on. One of them is risk, and the potential for risks should be addressed and plans and procedures developed to mitigate such risks. Risks can come in the form of external and internal threats. Whether of a physical

net hacking

1065 words - 5 pages every prying eye becomes hard as the number of networks that can access the Internet increases. Another thing to note would be physical factors that can affect the network from the inside, for not just about everybody would be willing to protect the network. Sometimes there will be those who will try to infiltrate the network for their own benefit. People who take, delete and change data without consent or breaks into the network to destroy it are

Similar Essays

All About Network Security Essay

873 words - 4 pages Network security is as important as securing your own home. There are networks all around us and large or small businesses all rely on their computer network to keep running smooth. Network security is not as easy an issue as it sounds. There are many technicalities involved especially when your network is the backbone of your business. Increment in the number of networks brings with it new and lethal security threats. All the important

Securing Wlan/Lan Essay

1734 words - 7 pages security have arisen as productivity increased. By means, wireless signals proliferate beyond the physical boundaries of the organization, nullifying the traditional view that the inside of the organization is protected (Secunia, 2007). Signals from unsecured WLANs that stretch outside the corporate network can be found and used by unauthorized personnel—or even malevolent hackers. Albeit the wireless medium has precise exceptional characteristics

Architecture And Design Considerations That Should Go Into Building A "Secure" Network

938 words - 4 pages security an integral part of drafting the documentation, physical and software requirements that go into building a secure network. Regardless of the size of the project, a good plan should be the first step in the process. The principal question that should be asked is: What is the purpose of this network and what are the resources required to meet this purpose? This will lead to creating a project plan that will include all of the standards which

Technical Project Paper

2157 words - 9 pages include periodic testing of the wireless network and performing security audits of the wireless devices. Some of the potential impact of all of the physical vulnerabilities and threats to the network and the pharmacy can be measured in a monetary terms in reference to the actual cost of repairs and the cost of replacement of the items. However not all of the cost will be monetary. Some of the cost could be in the loss of reputation of the