Multiple User Network Administration Security Essay

8379 words - 34 pages


This report explores the industry standard concepts and best practices including:


        Access control


        Data confidentiality

        Data integrity


Authentication is the ability to verify the identity of a user, host or system process. Access control determines who, when and what is allowed to access an operating system or network. Encryption is the use of mechanisms to scramble information in order to prevent electronic eavesdropping or data tampering. Preserving data confidentiality involves the use of encryption to ensure that confidential data remains secret. Data integrity is about the use of encryption and other mechanisms to ensure that unauthorised persons have not interfered with data during transmission. Auditing involves keeping track of when and by whom data has been accessed. Non-repudiation is the ability to prove that a transaction has in fact occurred.

Security Documents and Organisations
There are a number of security standards and stands organisations. For example, the National Institute of Standards and Technology (NIST), which was sponsored by the US Department of Defense (DOD), created the Trusted Computer System Evaluation Criteria (TCSEC) also known as the Orange Book. The Orange Book, which is still widely used by security professionals, rates the security protection offered by operating systems on a scale from A, the most secure to D the least secure. The most common rating is C-2. Unix, Windows NT and Novell NetWare are all C-2 compliant. Note that an Orange Book rating applies to an operating system configured to run on a given platform. This means that just because an installation of NT is C-2 compliant on vendor A's sever, in need not be C-2 compliant when installed on vendor B's server.
Additional standards include the International Standards Organisation (ISO) 7498-2 and the British Standards BS 7799 (1995 and 1999). The ISO seven-layer model can be used to help describe how specific implementations such as firewalls operate. Of particular interest are The Application, Transport and at Network layers of the model.
The Computer Emergency Response Team (CERT) at is a vendor neutral organisation dedicated to helping computer users to maintain security.
The rest of this chapter is devoted to looking in more detail at the seven aspects of Internet security listed in the introductory paragraph.

Authentication is the ability to verify the identity of a particular person, network host or system process. According to standards such as the Orange Book and ISO 7498-2 you can authenticate in the following ways:

        What you know

        What you have

        What you are

        Where you are
The most common example of "what you know" is a password. You frequently...


Comparison Among DB2 And Oracle In Term of Security

4280 words - 17 pages Security.DCE products in IBM are based on industry-standard technologies which licenses from The Open Group. Actually, DCE security service of DCE products in IBM is based on Kerberos technology. DCE in IBM provides:Centralized administration of users and passwords.No transmission of clear text passwords and user IDs.A single sign-on for users.3.4 Remote Dial-in User Service (RADIUS)RADIUS is a distributed system that secures remote access to network

5NINE Software: Cloud Security For Hyper-V Analysis

1516 words - 6 pages network traffic and alert the users on suspicious activities. It provides deep application level protection. 3.5 Centralized Intelligent Management Console Provides centralized management and control of security and compliance. Other than that, it is has powerful and agentless architecture that virtually eliminates IT administration. It delivers simple administration of policies, rules, filters and logs. Make user has full auditing capabilities

Security Audit

2192 words - 9 pages place to protect the company against loss of information to the outside world. This paper addresses all the issues involved in security auditing of Ariam travel agency’s network and its premises. Security Audit Ariam travel agency handles bulk information that contains sensitive customers and employees’ information; it contains multiple external users and various e-commerce applications. Therefore, data security at this company is very

Local Area Networks (LANs)

1520 words - 6 pages advantages of a Client-Server Network are better performance and Network security administration is easier to maintain. Disadvantages include users not being able to directly share resources on the workstations and network failure due to server failure. Advantages of a Peer-to-Peer Network include flexibility to share resources from any workstation and ability to distribute network applications throughout the network for better performance

Active Directory User Groups Implementation

671 words - 3 pages domain controller.User groups further set and assign permissions for security and access to domain resources. Local groups represent a collection of local users on a single server or computer, with permissions assigned only to resources associated with that single server or computer. Domain local groups represent a collection of domain user accounts or groups specific to the local domain, with permissions to access resources specific to the local

Information Technology – Structure of Data

1139 words - 5 pages technologies present unique security challenges due in part to the relative immaturity of the technology, incomplete security standards, flawed implementations, limited user awareness, and lax security and administrative practices. Without appropriate safeguards, transmitting data wirelessly can be like using an open filing cabinet in a waiting room.Many organizations and users have found that wireless communications and devices are convenient, flexible

Design a Network Infrastructure Because Networks are Configured in Many Ways, Network Systems and Data Communications Analysts are Needed to Design, Test, and Evaluate Systems Such as Local Area...

8965 words - 36 pages encapsulated PPP frames can be encrypted and/or compressed.The following diagram shows of an L2TP packet containing user data:Internet Protocol Security (IPsec):IPsec is a collection of multiple related protocols. It can be used as a complete VPN protocol solution, or it can be used as the encryption scheme within L2TP or PPTP. IPsec exists at the network layer (Layer Three) in OSI model. IPSec defines the packet format for an IP over IP tunnel

Riordan Manufacturing, Inc. - Operation Gatekeeper

2914 words - 12 pages desktop layer because it focuses on connecting client nodes, such as workstations to the network. This layer ensures that packets are delivered to end user computers. Each department is on separate network segments (VLANs) for access security purposes (Added Security configuration on the switch end). Printers fall under the same category, for example: If a department does not want another department to print to that specific printer, they just

Internet working

2386 words - 10 pages description or necessity. A roving profile will be implemented so employees can move from computer to computer. User accounts will be automatically locked off after 30minutes of inactivity on a particular workstation.LAN ADMINSTRATION RECOMENDATIONSIT department will be responsible for all LAN administration. They will monitor all network traffic on the LAN to minimize network congestion. The IT staff will disable all inactive ports to eliminate anyone

Network Attributes, Roles and Protocols

1339 words - 5 pages connected to LAN's         There are 2 main types of networks; Workgroup and Domain.         Workgroups can support up to 10 machines and have a low security arrangement. Domains on the other hand can have an unlimited number of machines and have a high security arrangement.         In a Workgroup network, each person has to administer his or her own computer whereas on a Domain network the administration is centralised to the

Novell Network for Company Security

4530 words - 18 pages that they are easy to remember. A user usually chooses a password that is close to them; therefore, it cuts down on the amount of people having problems with getting into the programs they need. Another way to offer security is to build walls around what you want secured. In the computer industry, these are called firewalls. A firewall is a sort of perimeter security. In order to gain access to the network, you must identify yourself

Similar Essays

Operating Systems Are The Very Basis Of Computer Software Programs.

2266 words - 9 pages multiple users access to a single printer, it will also give you information on the use of the printer. All print jobs are sent to a Network Printer, controlled by the server, where they will wait in turn to be printed. Certain rules can be applied to every job that is sent to the printer (especially common on multi user systems), for example one user may have priority over another so their printing would jump the other in the print queue.System

Network Administrator Essay

1025 words - 4 pages , 2007). So network administrators maintain the connection between multiple computers and ensure they are able to talk to each other in an effort to share information over a wired or wireless connection. They also help end user with communication issues, (printing, software install) and overall PC computing help. With this in mind let’s take a look at the career possibilities of a system administrator. Between now and 2012, the number of network and

Workplace Systems Support Essay

637 words - 3 pages used to further control access to network resources. Other security measures the administrator utilizes include using login scripts to allow only certain users, or groups, access to computer and network drives, files, or applications. Users are allowed access to system resources by means of a user account, which is set up by the administrator, and then the users are allocated a username and password. This allows the network administrator to set

Windows Server Essay

667 words - 3 pages user to create a snap shot of the shared folders and copy of the single and multiple volumes. This feature provides easy access to any previous version of files, folder and data volume through the Windows explorer.* Storage Area Network (SANS) support improved handling on fiber and SAN host bus adapter that use with SAN services and easy administration such as control and protection on the SAN volume.* Virtual Disk Services provide support on