This website uses cookies to ensure you have the best experience. Learn more

Project 1 Essay

1483 words - 6 pages

Project Part 1:
Multi-Layered Security Plan

Loren Miller
NT2580
Monday PM
Introduction: Describe each layer of the Open System Interconnection (OSI) Model. List a security feature of each layer if it applies. List the protocol of each layer if it applies. List types of attacks that are you protecting against in each layer. Your goal is to be able to protect a web hosting company that has a global presence. This web hosting company supports customers in the following industries: Medical, Financial, and Governmental.

Physical Layer: The Physical Layer defines the physical properties of the network, such as voltage levels, cable types, and interface pins (Baker). Any attack on the ...view middle of the document...

One can imagine the last thing in the minds of the designers was that someone would one day exploit this technology. In today’s security climate it would make sense to have exploits as a consideration. The primary protocol of this layer is the ARP, or Address Resolution Protocol. Network Interface Cards (NIC) exists to give computers the ability to talk to each other. To do this they need to be able to find each other. In order to do this they are assigned a single unique address – known as a MAC Address. Media Access Control (MAC) Addresses are used by ARP. RP is a protocol that allows a source computer to ask other computers if they know the MAC address of the machine it wants to speak with. The main attack for this layer is ARP Cashe Poisoning which can alter the ARP Cashe with invalid info causing the computer to send delicate info to the “attackers” computer. Proper protection against this form of attack is fairly simple. As an attacker would need physical access to your network, you simply need to know who is at your work stations and allow your employees to question the authority of any unknown individuals within your network areas.

Network Layer: This is the layer that routes data through various physical networks while traveling to a known host (Baker). IP addresses are assigned and utilized at this layer for unique identification. In order for a system to communicate with the Internet, it must have an associated public IP address. This address allows a system to contact the outside world and allows the outside world to contact the host. This border to our system is a vulnerable opening to the outside world. Routers are simple machines that decide how to send information from one logical network to another based on Internet Protocol (IP) and all its routing decisions on that information. The best defense on this layer is the comprehensive use of either NAT or PAT as well as up to date software on your routers. Network Address Translation (NAT) is a service that temporarily assigns a private IP address to a public IP address. In this sense, for a time, there is a one-to-one relationship between a private and a public address. It is necessary to lease a pool of public IP address for NAT to work. Port Address Translations (PAT), on the other hand, allows a single public IP address to be bound to multiple virtual ports. In this way, multiple networked hosts can share a single public identity on the Internet, providing a more cost effective and secure solution. In either event, the internal IP address is hidden to the outside world, providing us with some anonymity.

The Transport Layer: This layer ensures the reliable arrival of messages and provides error checking mechanisms and data flow controls and provides services for both "connection-mode" transmissions and for "connectionless-mode" transmissions (Baker). Primary Protocols for this layer are Transport Control Protocol (TCP) and User Datagram Protocol (UDP). Most attacks to...

Other Essays Like Project 1

Assignment 1: Excel Project

1067 words - 5 pages Assignment 1: Excel Project Micro Apps for Accounting: ACC115009VA016-1122-001 Strayer University January 22, 2012 Assignment 1: Excel Project In order to complete the Excel assignment, research had to be compiled in order to complete the task of monitoring and tracking five specific stocks for the 120-day period. After researching several options to collect data regarding SAP AG (SAP), Oracle (ORCL

Ccjs Project 1 Essay

1932 words - 8 pages Project #1 CCJS 321 4015 Digital Forensics in the Criminal Justice System (2158) Univerisity of Maryland University College Sunday, September 6, 2015 1. Can you or Mr. Yourprop’s supervisor search Yourprop’s personal vehicle currently parked in the Company parking lot for digital evidence?  In the case presented, a legal search of the employee’s vehicle while in the company spaces is permissible by law. The employer has a policy in

IS 3110 PROJECT PART 1

1827 words - 8 pages  Project part 1: Risk Management Plan IS 3110 MR. DURAZO James Johnson (17991808) 01/28/2016 Defense Logistics Information Service (DLIS) Outline I. Introduction a. Scope b. Assign to departments c. Risk Matrix d. Risk mitigation plan e. Impact Analysis II. (BIA) f. Departments g. Business Impact h. Costs Analysis III. Recommendations (BIA) i. Business Impact

Minitab Group Project Part 1

553 words - 3 pages QUAN 3610 Group Project Part I Observation | Position | Over 6' | Receptions | Receiving Yards | 1 | WR | No | 115 | 1,389 | 2 | WR | No | 111 | 1,355 | 3 | TE | Yes | 94 | 1,002 | 4 | WR | No | 93 | 1,115 | 5 | RB | No | 58 | 487 | 6 | RB | No | 59 | 520 | 7 | TE | Yes | 66 | 730 | 8 | WR | No | 86 | 848 | 9 | RB | No | 63 | 556 | 10 | TE | Yes | 58 | 700 | 11 | TE | Yes | 56 | 914 | 12 | WR | No | 79 | 820 | 13

Green Computing Research Project – Case Study 1

567 words - 3 pages Running head: PROJECT CHARTER Project Charter Name University Professor April 22, 2012 Project Title: Green Computing Research Project – Part 1: Project Integration Management Date of Authorization: April 23, 2012 Project Start Date: April 23, 2012 Project Finish Date: October 22, 2012 Project Manager: Name, (XXX) xxx-xxxx, email Summary Schedule: * Research possible applications of green computing to be

Econ Project 1

726 words - 3 pages Negative Externalities of the Paper-Making Industry The paper-making industry is an important part of society, for people have become accustomed to the use of paper for daily uses. Unfortunately, along with the production of paper, there are the productions of impacting negative externalities. The principal externality of paper making is the problem of global deforestation, and how the government is able to solve this problem. A

IS3445 Project Part 1

759 words - 4 pages ://searchsecurity.techtarget.com/answer/How-to-develop-an-effective-application-security-strategy George, R. (2013, May 1). Strategy: Strategies for Improving Web Application Security - InformationWeek Reports. Retrieved May 2, 2015, from http://reports.informationweek.com/abstract/21/10615/Security/Strategy:-Strategies-for-Improving-Web-Application-Security.html Harwood, M. (2011). Security Strategies in Web Applications and Social Networking. Retrieved May 2, 2015, from http://www.issaseries.com/product/web-security-strategies/

Project Part 1 Nt2580

1207 words - 5 pages Multi-Layered Security Plan The general IT Infrastructure has seven layers: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, WAN Domain, Remote Access Domain, and the System/Application Domain. All of the different layers are different aspects of your network that need to be protected against malicious attacks and vulnerabilities. In the following I have highlighted each domain and my best suggestions for security solutions

Course Project 1

545 words - 3 pages Task 2: Evaluating Competitor’s Stock AirJet Best Parts, Inc. is concerned regarding recent changes in its stock prices for the company and would like to determine the stock prices for key competitors. Key competitors include Raytheon, Boeing, Lockheed Martin, and the Northrop Grumman Corporation. 1. Using the dividend growth model and assuming a dividend growth rate of 5%, what is the rate of return for one of three key competitors? Use

Pm 592 Course Project 1

1408 words - 6 pages PM 592 COURSE PROJECT John Lawson, Mathew Freeman ENERGY EFFICIENCY INSTALLATION BUSINESS VENTURE PILOT PROJECT TABLE OF CONTENTS: Item | Page | 1.0 Executive Summary | 2 | 2.0 Project Description | 2 | 2.1 Major Activities | 3 | 2.2 Resources | 3 | 2.3 Project Milestone | 4 | 2.4 Assumptions | 4 | 2.5 Project Deliverables | 4 | 2.6 Constraints | 4 | 2.7 Risk Management | 5 | 3.0 Work

Case Study 1, Project 5, Fi 504

864 words - 4 pages 16 Question #6 Before we discuss the impact of hyperinflation on our economy, we must first discuss what this term means. Hyperinflation is an extremely high rate of inflation. This is a condition in which the prices increase rapidly as the currency losses its value. Most economists refer to an inflation rate above 100%. For example, let’s say you have $40.00 on February 1 and an inflation rate of 100% a month for the next three months. At the

Related Papers

Project 1 Essay

1308 words - 6 pages Project One Revised 1 December 2014 Articles to be added to Second Edition of The Ethical Citizen There it is. The four-hour flight is ready to emerge into the open air. Everything has gone smoothly, and then it comes around the corner slowly wobbling down the aisle. Eyes frantically look around to see if there is an open seat other then the one next to them. Panic sets in. The phrase, “please don’t sit by me.” is silently thought amongst

Case Project 8 1 Essay

987 words - 4 pages Margaret Nadeau Network Essentials Chapter 6 11/22/2014 Review Questions 1. D 2. B 3. A 4. D 5. C 6. A 7. C 8. B 9. B 10. D 11. A 12. C 13. C 14. C 15. C 16. D 17. D 18. B 19. C 20. D Case Project 6-1 A router forwards data packets by performing "traffic direction" functions between two more separate networks and/or between different computers on the same network. You can use the ipconfig command to get host computer

Individual Project 1 Essay

750 words - 3 pages Individual Project 1 Kevin Hensley AIU Online PHIL201 July 25, 2013 Earl Barnett Individual Project 1 Over the years, I have asked myself many questions about life, its meaning and where I will or want to go in life. Many I have answered, and many which I have no answers to just more questions. In this paper I will try to express the times I have asked questions and come to what I feel are reasonable answers. Metaphysics When I was young, my

Project 1 Econ 545 Essay

935 words - 4 pages BUSINESS ECONOMICS 545-PROJECT 1-MICROECONOMIC ANALYSIS KELLER GRADUATE SCHOOL OF MANAGEMENT Comments from Professor: Need more content next time. no Elasticity calculation, No profit maximization, minimal on determinants Abstract Cindy wants to invest in a new business that involves the installation of solar panels. In order to make an informed decision on this business venture, she will need to review potential profit/loss in the solar