Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

What is a network baseline, and when is it established? What is the turnpike eff

ID: 3692002 • Letter: W

Question

What is a network baseline, and when is it established? What is the turnpike effect, and why is it important in network design? What are the seven network architecture components? What are the four possible risk control strategies? How do we pick which one to use? What is sniffer? What is social engineering? Why does it work so well? What is firefighting? Several important statistics related to network uptime and downtime are discussed in this chapter. What are they, and why are they important? How is network availability calculated? Why is the TCO so high?

Explanation / Answer

what is a network baseline and when is it established

A)Most network design projects today are network upgrades, rather than the design of entirely new networks. In this case, there is already a fairly good understanding of the existing traffic in the

network, and most importantly, the rate of growth of network traffic. In this case, it is important to gain an understanding of the current operations (application systems and messages). The needs analysis step provides a network baseline against which future design requirements can be gauged. It should provide a clear picture of the present sequence of operations, processing times, work volumes, current communication network (if one exists), existing costs, and user/management needs. Whether the network is a new network or a network upgrade, the primary objective of this stage is to define the geographic scope of the network and the users and applications that will use the network.

What is the turnpike effect, and why is it important in network design?

The turnpike effect results when the network is used to a greater extent than was anticipated because it is available, is very efficient, and provides new services. The growth factor for network use may vary from 5 to 50 percent and, in some cases, exceed 100 percent for high growth organizations. It is important in network design not only because usage is higher than anticipated, which slows response time, but also because the types of messages may be different than those for which the network was originally designed.

What are the seven network architecture components?

The seven network architecture components are LANs, building backbones, campus backbones, WANs, Internet access, e-commerce edge and data centers.

What are the four possible risk control strategies?how do we pick which one to use?

Risk Control Strategies

An organization must choose one of four basic strategies to control risks:

Avoidance

Avoidance is the risk control strategy that attempts to prevent the exploitation of the vulnerability.

Avoidance is accomplished through:

·         Application of policy

·         Application of training and education

·         Countering threats

·         Implementation of technical security controls and safeguards

Transference

Transference is the control approach that attempts to shift the risk to other assets, other processes, or other organizations.

This may be accomplished by rethinking how services are offered, revising deployment models,

outsourcing to other organizations, purchasing insurance, or by implementing service contracts with providers.

Mitigation

Mitigation is the control approach that attempts to reduce, by means of planning and preparation, the damage caused by the exploitation of vulnerability.

This approach includes three types of plans:

·         the disaster recovery plan (DRP),

·         incident response plan (IRP), and

·         business continuity plan (BCP).

Mitigation depends upon the ability to detect and respond to an attack as quickly as possible.

What is a sniffer?

A sniffer is a program that monitors and analyzes network traffic,detecting bottlenecks and problems.Using this information a network manager can keep traffic flowing efficiently.

A sniffer can also be used legitimately to capture data being transmitted on a network.A network outer reads every packet of data passed to it,determining whether it is intended for a destination within the routers own network or whether it should be passed further along the internet.A router with a sniffer ,however may be able to read the data in the packet as well as the source and destination addresses.Sniffers are often used on academic networks to prevent traffic bottlenecks caused by file-sharing applications.

What is social engineering?why does it work so well?

Social engineering: the hack that requires no knowledge of code. Despite its relative simplicity, the risks associated with social engineering are just as serious as the numerous hacks that have populated recent headlines. For everyday citizens, awareness of social engineering scams and the methods they use that prey on weaknesses in human behaviour should be at an all-time high. Everyone is a target and you should be keenly aware of anyone asking for personal or private information.

Social engineering is the hardest form of attack to defend against because it cannot be defended with hardware or software alone. A successful defense will require an effective information security architecture starting with policies and standards and following through with a vulnerability assessment process.

some of the offline activities that criminals use to perpetrate social engineering are as folloes

Here are some of the ways hackers perform social engineering methods online.

What is firefighting?

Firefighting, in computing, refers to the emergency allocation of resources that are necessary to handle an unexpected problem. The term implies that the effort goes into chasing bugs rather than integrating new features.

For example, in software development, firefighting may involve the assigning of additional programmers to fix coding bugs that are identified in close proximity to a product's release date. In the context of security, firefighting may involve the allocation of resources to take care of an information system breach or a computer virus outbreak. In the individual user level, firefighting may involve the handling of software or hardware issues that might have been avoided through standard computer maintenance techniques. Many organizations are well prepared to handle a fire-fighting situation; however, a frequently repeating emergency situation reflects poor planning, or a lack of efficiency, and will result in the wastage of resources that are actually required somewhere else. To maintain firefighting to a minimal level, in-depth disaster recovery planning (DRP) is required, which anticipates and hopefully prevents such emergencies.

How is network availability calculated?

The definition of availability, or reliability, is the probability that a device will perform a required function without failure under defined conditions for a defined period of time. There are two main factors that are involved in the calculation of availability: Mean Time Between Failures (MTBF) and Mean Time To Repair (MTTR but this acronym may have other meanings). The calculation for availability is shown here. MTBF is simply the average time between failure of a device assuming the device is fixed and put back into service. MTTR is the average time to fix and restore the device in order to be put back into service. For example, a router may have a MTBF of 100,000 hours and an MTTR of 1 hour.

                                       A= MTBF/(MTBF+MTTR)

Why is the TCO so high?

Total cost of ownership for an enterprise application server includes cost factors that both directly and indirectly affect the bottom line. A realistic assessment of the actual expenses involved in purchasing, deploying, maintaining, and upgrading the hardware and software required for a server platform should encompass these factors:

Determining the total cost of ownership for an enterprise-capable server involves calculating both the tangible costs and the intangible costs of ownership. Tangible costs such as the following translate easily into hard figures:

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote