Sunday, April 7, 2019

Integrative Network Design Essay Example for Free

Integrative interlock project EssayRiordan Manuf manageuring is a global plastics manufacturer. Their products take plastic beverage containers produced in Alb whatever, Georgia, custom plastic part produced in Pontiac, Michigan, and plastic fan parts produced in Hang Zhou, China (UOPX, 2013, p. 1). Riordans research and phylogeny is in San Jose, California (Corporate Headquarters). Riordans main customers ar automotive parts manufacturers, aircraft manufacturers, the Department of Defense, beverage makers and bottlers, and appliance manufacturers (UOPX, 2013, p. 1).team B and associates were task by Riordan to analysis Riordans WAN and add a radio receiver net to Riordan Manufacturing, similarly to analyze and update Riordans cyberspace credential in each of the locations and provide credentials for security measure policies and procedures. What is a radio mesh and what atomic number 18 the gets of leaving radio receiver. With the current wireless engine room, Wi-Fi is e precisewhere unmatched stack connect to the Internet by going to coffee ho manipulations, airports, hospitals, hotels, and homes. Businesses rear stay connected to their coworkers and customers without cosmos tied to their office desk by using wireless lucres and Wi-Fi hotspots.Wireless local- sector profits (Wlocal atomic number 18a ne dickensrk) exclusivelyows personnel to connect to their computers without wires or cables. A wireless network uses radio waves to connect and communicate at bottom a certain area to mobile devices. If close toone involves a document while attending a meeting in the conference room or one ineluctably to get to the inventory list from the ware hold. A wireless network each(prenominal)ows one to access the keep guilds Internet and retrieve documents on their mobile devises without leaving the meeting or going back to their office. Benefits of Wireless NetworkingThe benefits of orders going wireless include convenience, mob ility productivity, and ease of heap up, scalability, security, and cost. Mobile devices in todays society are equipped with Wi-Fi technology and able to connect to a WLAN. Convenience employees bath access securely to their companys network resources from any location within their c every prescribeage area. The c only overage area normally is the office building only when is able to set forth to different company facilities. Mobility employees are connected to the network when they are not at their office desk. People in meetings can access documents and applications with their mobile devices.Salespeople can access the companys network from any location. Productivity employees accessing their documents and applications are the key to get the subscriber line done, and it encourages teamwork. Customers alike prepare access to the companys Internet using a secure guest access to view their line of merchandise selective teaching. Ease of setup business do not earn to run cables through with(predicate) the facilities, installation is mobile and cost-effective. WLANs make it easier to for hard to reach locations to have connectivity to the network. Scalability with businesses expand, companys need to expand quickly along with their network.Wireless network expands with the current existing equipment. gage the success in authoritative and managing secure access to a businesss wireless network is very important. auspices managers moldiness be pick outledgeable with the advanced Wi-Fi technology and needs to provide vigorous security protections to protect their entropy, but only giving permission to who need access. Cost businesses that see to it with and WLAN, tailors wiring costs during office upgrades. How Riordan Manufacturing can use a wireless Networking Companys using a wireless networks are boosting productivity and encourage data selective information sharing.Employees can wander throughout the building using mobile devices and bla nd have constant access to documents, e-mails, applications, and other network resources need to do their jobs. Employees using wireless LAN can travel throughout the office building without losing Internet connectivity. Employees having a team meeting or in conference can have the most updated communications, including all documents and applications on the network. Voice over mesh protocol (VOIP) technology also have roaming capabilities in their voice communications. Im turn offd responsiveness Customers require quick replies to questions and concerns.A WLAN improves customer service or relationships by connecting employees to the data information. Better access to information WLANs allow businesss access to all areas in the building without any connectivity issues. WLANs are very effective in warehouses, manufacturing plants, and distribution centers. Employees can access inventories and providing correct figures in real time to management. Easier network expansion Businesses expanding and hiring bare-ass employees are easily added the network by the network administrator. Office furniture is easily moved and employees are added or removed to/from the network without issues. raise guest access WLANs allow businesses to provide secure wireless access to the Internet for guests or visitors. Hospitals, restaurants, hotels, coffee shops, and other public businesses provide WI-FI to all mobile devices. The IT administrator volition need to verify that all the desktop PCs already have the integrated Wi-Fi hardware installed or the PCs impart need to upgraded. Switching to a WLAN does not mean switching changing from ones existing wired network. It is common for businesses to have a wired-wireless network that provides wireless capabilities to conference rooms or in new expanded office spaces.WLANs also supports VOIP for the conference rooms. IT managers should be aware of few of the technical aspects of WLANs. The WLAN network covers approximately about 3 ,000 square feet. The range of a wireless router could be affected by walls and cubicles, and the signals are hard to be received in elevators. Other issues IT managers should be do aware of include Wireless router is shared amongst 15-20 users per each access point for data, 8-12 for VOIP VOIP quality, wireless routers need to be installed closer unitedly Routers have enhanced coverage when they are installed on the ceiling.Security policies and procedures in a WLAN are very important to consider when establishing a wireless network. Security policies that need to be considered Data encryption User au whereforetication Secure access for visitors Control agreements. To prove that the design meets the data rate requirements, you need to calculate the required data canalize rate for all your networks. Backups over the network must move the data from all your clients, to your media servers fast enough to finish disdains within your backup window.To calculate the data reassign ra te, use this formula Required network data enthrallral rate = (amount of data to back up) / (backup window) the chart below shows the typical transfer rates of some of the to a greater extent resent network technologies. Table Network data transfer rates (PowerTech. com, 2010, p. 1) Network TechnologyTheoretical gigabytes per hourTypical gigabytes per hour 100BaseT (switched)3625 1000BaseT (switched)360250 10000BaseT (switched)360025 here(predicate) is an example of how to calculate the required data transfer rate for your network (Symantec Corp, 2013, p. 1) Use the following assumptions tote up of data to back up = 500 gigabytes Backup window = 8 hours Required network transfer rate = 500 gigabytes/8hr = 62. 5 gigabytes per hour Solution 1 Network Technology = 100BaseT (switched) Typical transfer rate = 25 gigabytes per hour A single 100BaseT network has a transfer rate of 25 gigabytes per hour. This network cannot handle your required data transfer rate of 62. 5 gigabytes per h our. In this case, you would have to seek other options, such as the following backing up your data over a express network (1000BaseT), spacious servers to dedicated show drives (SAN media servers), SAN connections by means of SAN knob.Performing off-host backups using Snapshot Client to present a snapshot at once to a media server that backups during a longer time window, performs your backups over faster dedicated networks such as solution 2 Network Technology = 1000BaseT (switched) and Typical transfer rate = 250 gigabytes per hour Based on the above network table a single 1000BaseT network has a transfer rate of 250 gigabytes per hour. This network has much to a greater extent capacity to handle the backups for this system. To build a backup system for you network you complete the following.The data transfer rates for your networks must be calculated in order to spot your various problems and potential bottlenecks. (The latest breaking technological solutions for dealing with duple networks problems and potential bottlenecks are readily available for installation. ) Once the data transfer rates required for your backups are calculated, the rate of transfer must be able to achieve a complete backup of all your data within the allotted time. Then you must determine the most efficient type of tape or disk technology is available to meet your companys particularised needs.Determine the specific number of tape drives needed and the required data transfer rate is going to be for your network. To set the backups needed for your network, (as before) you must move the data from all your clients, to your media servers fast enough to finish backups within your backup window. Then determine the size of your systems Netback up image database, exactly how much disk space go a way be needed to store your entire Netback up image database, the size of the Netback up relational database (NBDB), and the required space that will be needed to handle the NBDB.Then cal culate how much media will be needed to handle both full and incremental backups, plus you must determine how many tapes will be needed not only to store, but also to be able to retrieve and victuals your backups. The next step will be to estimate the size of the tape library your network needs to store your backups and if you need to use robotic library tape slots in order to store your backups. full general Threats to Network and knowledge Security is the primary concern in e-business. The assets of the e-business go and other electronic run should be protected in order to preserve theauthenticity, confidentiality, integrity and availability of the service. Administrators normally find that put together a security policy that restricts both users and attacks is time consuming and costly. Many users in companies also perform disgruntled at the heavy security policies qualification their work difficult for no obvious reason, make bad politics within the company. A common a ttitude among users is that if no secret is organism performed, and then why bother implementing security.Malicious assaulters can gain access or deny services in numerous ways, for example with Viruses, Trojan horses, worms, password cracking, denial of service attacks, E- mail hacking, impersonation, Eavesdropping, Packet play back, piece of land modification, social engineering, intrusion attacks, and Network spoofing. Attackers are not the only ones who can harm an organization. The primary nemesis to data integrity comes from authorized users who are not aware of the actions they are performing. Errors and omissions can lose, damage, or wangle rich data.Users, data entry clerks, system operators, and programmers frequently make unintentional errors that contribute to security problems, directly and indirectly. somemultiplication the error is the threat, such as a data entry error or a programing error that crashes a system. In other cases, errors create vulnerabilities. Errors can occur in all phases of the system life cycle. Programming and development errors, often called bugs, range in severity from irritating to catastrophic. better software system quality has reduced but not eliminated this threat.Installation and maintenance errors also cause security problems. at that place are ways to keeping Riordan Manufacturing safe from all these problems. One way to protect the company is by having Common Access Cards for all employees. With these cards it will have all the employees ain Information and will also protect the employee from identity theft of employees private information. By having these cards the IT personal will know exactly who the one that used certain computer was and be able to know when they did it.By keeping track of when and where every employee logs in. It is known for human errors to be number one jeopardy for security side. nearly of the hacking done by people has to do also because of a mistake of a worker. To reduce all of these things Training will have to be programmed to reduce human mistakes will on the job and after the job. Mobile phones are another threat to Riordan Manufacturing, because there are people that log on to the companies using their phones and many times they forget to close the account.By leaving this account open the company is vulnerable to hackers getting to the companies account and doing a great deal of damage. To save these types of things these part will have to be covered in Training through the company and the company will have to have all of their employees with a certain access to have a company phone and have them use only that phone to access the account if necessary. The phones will be protected at all times to make sure that no hacker is getting in to the account through these phones.to a fault if for some reason the employee commands to take action against the company and give secret information through the phone this should also be known through the compa ny. A replay attack occurs when a valid media transmission between two parties is intercepted and retransmitted for malicious purposes. SRTP used in connection with a secure signaling protocol protects transmissions from replay attacks by enabling the receiver to maintain an index of already received RTP tracts and compare each new packet with those already listed in the index.Many hackers like to do Spoofing, and this occurs when the attacker determines and uses an IP address of a network, computer, or network component when not authorized to do so. A successful attack allows the attacker to operate as if the attacker is the entity normally identified by the IP address. The largest threat in the Promises field of operations was undocumented or unsecured USB devices. About 13 percent of the surveyed endpoints had them. This isnt just a theoretical concern. A 2005 Yankee Group survey found that 37 percent of the companies surveyed believed USB devices were used to compromise corpor ate information.another(prenominal) way the company will be protected from is from unauthorized peer-to-peer (P2P) file-sharing programs that are often forbidden by company policy, 4 percent of the surveyed computers had such applications installed. This problem is getting worse. Not only are more peer-to-peer networks making their way onto corporate networks, but computer criminals have started using them to compromise and take over computers wholesale. Also cyber-attacks are costing the U. S. economy an estimated $8 billion a year.How much money is going from Riordan Manufacturing? This is a problem that has to be taken care of by reducing Human Errors since this is the largest threat to IT Security. Since Most breaches in critical corporate data are not the yield of malicious intent. They are the result of mistakes made in the way security is managed and configured across the business especially at the network level. exclusively of these problems are not only costing the compa ny also nearly nine cardinal U. S. residents are victims of identity theft each year.The SOX requires publicly traded companies to secure information systems to the extent necessary to promise the effectiveness of internal controls over financial reporting. (PowerTech. com, 2010, p. 1) Companies must now take into shape that IT well develop and educated security support teams must be brought into the process to provide protection any leaks or intrusion in order to meet the compliance deadlines. Section 404 of the Sarbanes-Oxley Act have had the highest impact on Information Technology and Security.The IT related issues that cause problems for SOX compliance in the context of Section 404 are broadly related to access control of system users. (PowerTech. com, 2010, p. 1) Without adequate access controls in place, users can perform functions/activities that are in conflict with their job responsibilities are to modify/corrupt financial data. Controls to initiate/record unauthori zed transactions commit fraud and cover their tracks. The Sarbanes-Oxley Act in some ways comes off very vague and open to interpretation leaving companies unsure how to handle compliance.The best way to start is to identify significant and potential high risk problems when going through the process, identifying specific systems, data processors, and control tie in whose integrity could be compromised. Once these problems within the network have been identified, effective controls must be implemented to address these deficiencies, to record their regularity and frequency, and to evaluate them to ensure that the proper set of controls is kept in place protecting system integrity. The Bill was introduced (and named for) sponsors Senator Paul Sarbanes (D-MD) and U. S. Representative Michael G.Oxley (R-OH), as a reaction to a large number of various scandals that had exposed excessive wrong doing in the corporate world, costing investors billions of dollars and many companies to collap se. The act contains 11 titles, or sections, ranging from additional corporate board responsibilities to criminal penalties, and requires the Securities and Exchange Commission (SEC) to implement rulings on requirements to comply with the law. (SOX-online, 2012, p. 1). The Constructing new data base network for Riordan Manufacturing will have to take all SOX rules, regulations and requirementsinto consideration at each step along the way in order to stay within the guidelines of the law. General Threats to Network and Information Security is the primary concern in e-business. The assets of the e-business services and other electronic services should be protected in order to preserve the authenticity, confidentiality, integrity and availability of the service. Administrators normally find that putting together a security policy that restricts both users and attacks is time consuming and costly.Many users in companies also become disgruntled at the heavy security policies making thei r work difficult for no discernible reason, causing bad politics within the company. A common attitude among users is that if no secret is being performed, and then why bother implementing security. Malicious attackers can gain access or deny services in numerous ways, for example with Viruses, Trojan horses, worms, password cracking, denial of service attacks, E- mail hacking, impersonation, Eavesdropping, Packet replay, packet modification, social engineering, intrusion attacks, and Network spoofing.Attackers are not the only ones who can harm an organization. The primary threat to data integrity comes from authorized users who are not aware of the actions they are performing. Errors and omissions can lose, damage, or alter valuable data. Users, data entry clerks, system operators, and programmers frequently make unintentional errors that contribute to security problems, directly and indirectly. Sometimes the error is the threat, such as a data entry error or a programming error t hat crashes a system.In other cases, errors create vulnerabilities. Errors can occur in all phases of the system life cycle. Programming and development errors, often called bugs, range in severity from irritating to catastrophic. Improved software quality has reduced but not eliminated this threat. Installation and maintenance errors also cause security problems. There are ways to keeping Riordan Manufacturing safe from all these problems. One way to protect the company is by having Common Access Cards for all employees.With these cards it will have all the employees personal Information and will also protect the employee from identity theft of employees personal information. By having these cards the IT personal will know exactly who the one that used certain computer was and be able to know when they did it. By keeping track of when and where every employee logs in. It is known for human errors to be number one risk for security side. Most of the hacking done by people has to do also because of a mistake of a worker.To reduce all of these things Training will have to be programmed to reduce human mistakes will on the job and after the job. A replay attack occurs when a valid media transmission between two parties is intercepted and retransmitted for malicious purposes. SRTP used in connection with a secure signaling protocol protects transmissions from replay attacks by enabling the receiver to maintain an index of already received RTP packets and compare each new packet with those already listed in the index.Many hackers like to do Spoofing, and this occurs when the attacker determines and uses an IP address of a network, computer, or network component when not authorized to do so. A successful attack allows the attacker to operate as if the attacker is the entity normally identified by the IP address. The largest threat in the Promises study was undocumented or unsecured USB devices. About 13 percent of the surveyed endpoints had them. This isnt just a th eoretical concern. A 2005 Yankee Group survey found that 37 percent of the companies surveyed believed USB devices were used to compromise corporate information.Another way the company will be protected from is from unauthorized peer-to-peer (P2P) file-sharing programs that are often forbidden by company policy, 4 percent of the surveyed computers had such applications installed. This problem is getting worse. Not only are more peer-to-peer networks making their way onto corporate networks, but computer criminals have started using them to compromise and take over computers wholesale. Also cyber-attacks are costing the U. S. economy an estimated $8 billion a year. How much money is going from Riordan Manufacturing?This is a problem that has to be taken care of by reducing Human Errors since this is the largest threat to IT Security. Since Most breaches in critical corporate data are not the result of malicious intent. They are the result of mistakes made in the way security is manag ed and configured across the business especially at the network level. in all of these problems are not only costing the company also nearly nine million U. S. residents are victims of identity theft each year. The importance of explicit enterprise security policies and proceduresare necessary in a structured network as we currently have in Riordan Manufacturing Inc. and in any other establishment whereas you depend on sending and receiving data over the internet. If no security policy boundaries would be taken seriously, each and one of us would be leaving ourselves vulnerable to malicious computer hackers, weakened information sent on emails such as Trojan horses, viruses etc.. As a growing company, we want to protect and ensure that personal information is not compromised and that company policy security awareness procedures are taken.Once a year all employees at Riordan will be required to complete an online judging of standard procedures for computer use at the facility. If there are any suspicious cyber crime activities occurring, it shall unceasingly be reported immediately to the corresponded employees supervisor. Mobile work stations have been limited to company issued wireless devices inside the premises, excluding personal cell phones, smart phones, Mp3 players, portable media players, Laptops, tablets, USB drives or external hard drives.All data is classified and is set into four different categories restricted/proprietary, confidential, sensitive and public. Employees must act appropriately, to prevent unauthorized disclosure of information unless if you have been authorized to access it, if it is utilized as a true(a) business need or shared with other company employees, then it is considered acceptable to the Riordan security policy. Our proposition of upgrading the current switches to the 24 port Meraki Cisco switch and the addition of MR24 Cisco access points will benefit the security policy of networking operations.The Network Security options, Firewalls (2013) website, both pieces of hardwares have built in firewall management which will assist the network from intruders degrading our system. The purpose of a firewall is to secure the in house network and from non-trusted networks, by blocking content off the internet. Also knows as a choke point, a firewall provides a particular point of contact, enabling users to browse the internet from approved resources located internally or outside the network.It appears as a solitary address to the open public, providing the user access to the non-trusted network through SOCKS, proxy servers and from network address translation (NAT), while keeping the internal networks address private. This technique denigrates impersonating or cyber attack less likely because the firewall maintains the privacy of your internal networks (Network Security Options, Firewalls, 2013).Although firewalls can be limited to what it can protect, such as files that contain file transfer protocol ( FTP), telnet amongst the other possible ways of data corruption but it will not necessarily protect them depending on specific destination of the information being transmitted and if the user decides to encrypt the data. When using wireless technology, this can bring several risks to the Network, because hackers can access any unencrypted wireless devices or access points. Having a Wi-Fi protected network will minimize the chances of anyone breaking into the system.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.