This website uses cookies to ensure you have the best experience. Learn more

Firewall N Vpn Essay

999 words - 4 pages

Stephy Stitt
Project 1
August 24, 2014

There are a number of risks on our network. Those risks are data confidentiality, data access and network issues. Our network has a router/firewall configuration. All files are kept on the network. The network can be accessed from home. The computers in the lab have direct access to the internet. All of these can invite potential threats at any time.
The network allows potential threats through a router/firewalled device. I am assuming that the firewall has been configured by a default means. This will give hackers the ability to exploit any open ports left open. There will also be the security hole of the router itself if the ...view middle of the document...

The router will be configured for only the devices that are used on the network. No personal devices or unauthorized devices will be allowed access.
Second, I would start utilizing servers to store all of the data. Having data all over the network is dangerous. If a device fails and there is no redundancy then that data is lost. I would have at least two servers in place for this. The second server would be for backup and both will not be on the DMZ. The servers will both have firewalls and be placed behind the router. The router will be placed behind the firewall.
Third, after correcting the network, I would deploy a SSL VPN server. All direct access will be revoked. Users using their personal devices to access will also be revoked. The users will be issued a personal laptop or company device to gain access to the network. They will have to acquire permissions to access the VPN. The company laptops will also have to be provisioned for VPN access. The VPN server will be placed before the firewall and after the router. The VPN will be responsible for allowing users past the router. I would also set up times and specific permissions to access data and files on the network.
There are a number of other devices I would have added. I would add a sniffer and secondary firewall instead of using software firewalls on the devices. I would also add token VPN. This would require another gateway server to allow access. The SSL VPN server will suffice as it provides the same security to the network. The token only secures someone’s password with an algorithm. There would be a secondary router and a switch to control traffic. I thought about deploying a proxy server to control what is accessed on the internet. Most of these devices and software have high costs. I did not include them in this report.

The enhancements I...

Other Essays Like Firewall N Vpn

Strategy and Planning Essay

1315 words - 6 pages backup systems and sites to ensure continuous operations. The implementation of security domains, perimeters, and control procedures protects data and software. Examples includes 1) determining firewall types, such as application gateways, circuit gateways, and MAC layer firewalls; 2) designing filters for firewalls; designing VPN as either transport mode or tunnel mode; and 3) designing intrusion detection systems as either application, network

Information System Controls for Systems Reliability

5139 words - 21 pages This provides a means to monitor the number of attempted intrusions successfully blocked by the firewall, and can provide early warning signals that the organization is being targeted. 5. A virtual private network (VPN) is a network that controls access to a company’s extranet by using encryption, identification, and authentication tools and techniques. (Definition from the text’s glossary, p.794, 10th ed.) Additional facts: A virtual

A+ Super a+

4668 words - 19 pages encryption types.  Standards o 802.11 a/b/g/n o Speeds, distances and frequencies  Encryption types o WEP, WPA, WPA2, TKIP, AES 2.6 Install, configure, and deploy a SOHO wireless/wired router using appropriate settings.  MAC filtering  Channels (1 – 11)  Port forwarding, port triggering  SSID broadcast (on/off)  Wireless encryption CompTIA A+ 220-801 Certification Exam Objectives Copyright © 2011 by the Computing Technology Industry

Somery of the Fall

4490 words - 18 pages - Ethernet - Wireless - Bluetooth - 802.11 (a/b/g/n/ac) - Infrastructure vs. ad hoc - Integrated print server (hardware) - Cloud printing/remote printing • Thermal - Feed assembly, heating element - Special thermal paper • Impact - Print head, ribbon, tractor feed - Impact paper • Virtual - Print to file - Print to PDF - Print to XPS - Print to image Given a scenario, perform appropriate

Linux As A Personal Desktop Operating System

5191 words - 21 pages Loader ..................................................................................................................25 Setting the Network Parameters.....................................................................................................26 Setting up the Firewall...................................................................................................................28 Setting Additional Language Support

Ethical Hacking

5637 words - 23 pages in ASA, you use the same command as on a Cisco router: configure terminal or configure t. Next, look at how the firewall uses access lists to filter traffic. The following access list named PERMITTED_TRAFFIC shows the specific VPN connections to several wiring closets: ciscoasa(config)# show run access-list access-list PERMITTED_TRAFFIC remark VPN-CONC1 TO TERMINAL CLOSET1B access-list PERMITTED_TRAFFIC extended permit ip host host

The Separation Of Capital Ownership And Control

1577 words - 7 pages The argument of whether the separation of capital ownership and control is an efficient form of organization has constantly been a controversial issue. The criticism whether the controllers’ act is in the best interest of the owners’ wills never end as long as hired managers operate management. As the number of public companies has been increasing over the course of this century, meanwhile the American style of contact based corporation has

The Versatility And Flexibility Of OLED's

1014 words - 5 pages a much more efficient form of technology. Police/security could be outfitted with small OLEDs to detect for gun or explosive residue. Although they cannot be used for finding everything there is to know about a sample, the detection properties of OLEDs would make lab result conformation, or even safety, much easier. Works Cited Aylott, Johnathan W., Zoey Chen-Esterlit, Jon H. Friedl, Raoul Kopelman, Vadim N. Savvateev, and Joesph

Comparing The Moral Virtues Of Antony And Julian The Apostate

1103 words - 5 pages Roman emperor Julian the Apostate and Christian leader Antony both exhibited many qualities of character during their existence. Both of them led very distinctive lives although shared several ethical values. Book 25 of “The Later Roman Empire” and the book “Early Christian Lives” show concrete evidence of this. In the following essay, I will argue how both leaders’ lives were devoted to their religious beliefs and their mutual cardinal virtues

Living In A Cashless Society

1637 words - 7 pages Money in a traditional sense no longer exists. Money is becoming much of a concept than a physical material, and most ordinary bitter have not see the reality of the switch. People today are using credit and debit cards on a regular basis and in everyday situations such as meal purchased at fast food, highway tolls, clothing, groceries, gas stations, etc. all of these means of systems could be regarded as a cashless society or world. The question

The French And Indian War: The "Real" First World War

1955 words - 8 pages The Seven Years War, or more commonly referred to as “The French and Indian War”, has been called the true First World War. In this book The French and Indian War: Deciding the Fate of North America, the author and historian Walter R. Borneman paints a detailed and elaborate picture that justifies the claim of it being the first true war of global proportions. If ever there truly was a climax to the never ending feud of the European powers

Related Papers

Net Security Notes Essay

5263 words - 22 pages firewall. Bob can establish a VPN from his office computer to his home computer. Since the packets are encrypted, the firewall is not able to inspect its contents even using the deep packet inspection method. Bob can run a proxy server on his home computer and he can configure his office’s computer as well as the web browser on his computer to use the VPN and the proxy server to connect to the blocked website. For example, Bob can run a SSH

Widgets International Essay

1928 words - 8 pages evolve and new threats are introduced (Sabnis, Verbruggen, Hickey, & McBride, 2012). I would recommend the vCloud Networking and Security Services package from VMware as the software security for WInt. The VMware package includes a firewall and VPN, it reduces the need for some hardware, it gives managers access to a virtual data center, it offers data security that is compatible with Windows, and it allows other software packages to integrate easily

Network Design Project Essay

809 words - 4 pages trusted HP I configured two (2) systems. Cost and Decision Making Comcast Business Class2 Internet service bundles starter package with one (1) phone line is $99.00 a month and premium package with two (2) phones lines is $159.00 a month, it comes with Norton Business Suite, which includes the following: Firewall Protection, email security, virus scan, back-up utility. Also with this package Supports multiple computers and VPN connections

Csit 161 Lab1 Essay

688 words - 3 pages operations. K. Encrypt all confidential data in the database or hard drive. L. Use workstation antivirus and malicious code policies, standards, procedures, and guidelines. Enable an automated antivirus protection solution that scans and updates individual workstations with proper protection. M. Use encryption and virtual private network (VPN) tunneling for secure IP communications. N. Make sure wiring closets, data centers, and computer rooms are