Wednesday, January 23, 2019
Ing Life
ING Life Bo Sun CIS 505 Communication Technologies Strayer University DarcelFord, Ph. D. February 11, 2013 Difficulties and Risks Associated with net take to the woods Originally, meshing was designed for absolute security environment. Therefore, the protocols which are consisting of the infrastructure of Internet have no security concerns. This means Internet is easily to be vulnerable. Although major part of security issues are from inside, Internet does take external threats. When users refer the Internet, the web browsers might contain breaches that permit scripts to access the placement and may cause damages potentially.In addition, when information is transmitting through the domain network, the transmission might be captured by someone else. This is known as man-in-the middle attack. (Dean, 2009) Another potential common adventure associated with Internet is called reconnaissance mission threats. Attackers could detect the reachable networks, devices and services throu gh the Internet connection, or tied(p) draw an entire network map. Furthermore, DoS attack is another risk users could encounter when using Internet. Hackers attempts to over-whelm the system in order to make it shut down. Oppenheimer, 2011) Analyze INGs Solution The security instrument existing in the current INGs network is implemented a fire amongst the external brokers and the internal servers. Basically, this is not enough to protect the network, especially, the information of ING involves underground personal information. The information should be protected carefully. Securing Internet connection a variety of overlapping security mechanisms will be equipped to stock warrant the security of the Internet connection.Common mechanisms include firewalls, packet filters, physical security, audit logs, enfranchisement and authorization. At the same time, technicians in addition need to implement packet filters to clog the Internet routers from the DoS attacks. DoS attacks ha ve great intimidation to humankind servers. In this condition, reliable operating system and applications are critical to illuminate the potential attacks. CGI and other types of scripts also could take care of the servers. Finally, firewall mechanism is good when facing Dos attacks.Firewall technologies, physical security, authentication and authorization mechanisms, auditing, and possibly encryption consist of the security mechanisms utilized on remote access (Oppenheimer, 2011). in addition these normal network security mechanisms, a proper routing protocol is also important to Internet connection. The selected protocol should support route authentication. And static and default option routing is an issue need to be concerned because of potential compromised routing updates. Finally, clear police force and comprehensive training for the employee is significant.After all, most security issues are leaded by human errors. Critique the Extranet Solution To support extranet conn ection for brokers is an excellent decision. It is plain for users to get access to the information which they needed. On the other hand, extranet is easily to be managed from the security aspect. Administrators could implement security mechanisms simply. Remote-access VPN is another way could be utilise to connect the brokers. According to Oppenheimer, Reomte-access VPNs permit on-demond access to an organizations internetwork, via secure, encrypted connections. (Oppenheimer, 2011) This travel is suitable for the remote uses which dont need always connection. Users connect the corporates network through service providers network, this could decrease the budget of connection and the the work of network administritors. Install redundent mechanism could imprive brokers service. When primary database shut down, the backup devices could guarantee the network connection work normally. References Dean, T. (2009). network+ guide to networks. Mason Cengage erudition. Oppenheimer, P. (20 11). Top-down Network Design. Boston Pearson Learning Solutions.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment