Download as:
Rating : ⭐⭐⭐⭐⭐
Price: $10.99
Language:EN
Pages: 16
Words: 2238

Explain the factors associated with the security of a computer network

Wired

Wireless

Parking lot attack

Spoofing attacks

Draw the detailed network diagram

Reasons and justification

Other various potential attacks on the wireless/wired network could be as follows

Word count: 1500

Introduction

Explain the factors associated with the security of a computer network

Wired

Wireless

Computer network security implementing wireless is a major concern for individuals and organizations because of the vital information stored on the network and the most critical processes of a university are done through the network. If a network is to fail or security is compromised an organization could be completely crippled. For example, if the university was to lose their cash EPOS system network then they would suffer a huge loss of business and would take, depending on the brutality of the breach it could take several hours to days to fix.

Also at risk is employee and client privacy. If the universities network is hacked into they would have access to client/students databases or private information, as well as employee databases. The most important thing to keep in mind when it comes to wireless network security is keeping unauthorized users from accessing your network. The first step is to know your wireless network’s range and to use specific software to grant access only to authorized users which leaves all those who aren’t trusted off your network.

Wireless design

Possible security issues

War driving

Parking lot attack

Spoofing attacks

Radios server and solution to possible attacks

These attacks can be stopped by building a Radios server, these servers are made in parts by installing CA is certified authority and NPS network policy server on active directory and where it says add roles you will add network policy and access services.

These services that will be installed on your server will allow for WPA2 which is an pre-share key (PSK) that is used for home users or enterprises like the university to have a secure authentication method within the university that is to only be shared within the university to diverse unauthorised users to not be granted access to the campus Wi-Fi.

Authentication

  • Authentication is used by a server when the server needs to know exactly who is accessing their information or site.

  • Authentication is used by a client when the client needs to know that the server is system it claims to be.

Encryption

  • Encryption involves the process of transforming data so that it is not readable by anyone who does not have a decryption key/password

  • The Secure Shell (SSH) and Socket Layer (SSL) protocols are usually used in encryption processes. The SSL drives the secure part of “https://”

Tunnelling technologies (VPN)

Design of the campus wireless network

WIFI Key Scale 2cm = 30 metres
Channel 1
Channel 6
Channel 11

WPA

WPA 2

Reasons and justification

I have decided that building (1) would not need any wireless access because even though some buildings on the campus are easy for anyone to attack the network it would be best to avoid any signal at all the reasons for this are explained under the sections (possible security threats) in my report.

I have also decided there will be no need for access points for wireless signal at all during sports as it will only become a distraction to students within the campus and I’m amusing most documentation will be established in the main buildings and saved before taking outside.

Conclusion

Bibliography

https://www.youtube.com/watch?v=D2oWbsK-hKM

https://www.youtube.com/watch?v=NgKAwBkrtAI

References

Appendix

Other various potential attacks on the computer network wireless/wired network could be as follows

Trojan Horse

Intruders use several different ways of gaining access to your network. Some of the most common ones are Trojan horses, denial of service, e-mail spoofing, e-mail borne viruses and packet sniffing. A Trojan horse is a program that appears legitimate, but performs some illicit activity when it is run. It may be used to locate password information or make the system more vulnerable to future entry or simply destroy programs or data on the hard disk. A Trojan horse is similar to a virus, except that it does not replicate itself. It stays in the computer doing its damage or allowing somebody from a remote site to take control of the computer. Trojans often sneak in attached to a free game or other utility.

  • Keeping up-to-date on security-related patches

  • Using hardware to get in the way of the attack

Don’t send programs to your friends simply because they are amusing – they may contain e-mail borne viruses or malicious code.

Packet Sniffing

Word count: 1500

Copyright © 2009-2023 UrgentHomework.com, All right reserved.