HANDS-ON NETWORKING FUNDAMENTALS By PALMER EDITION: 2ND 13 PUBLISHER: CENGAGE IS
ID: 3772585 • Letter: H
Question
HANDS-ON NETWORKING FUNDAMENTALS By PALMER EDITION: 2ND 13 PUBLISHER: CENGAGE ISBN: 9781111306748 Case Project 11-1: pg521 The Maple County court is redesigning its network to ensure more security. The court has four Linux servers and three Windows Server systems. One of the Windows Server systems is connected to a DSL line and shares network connectivity with other computers on the court’s network. The same server also has e-mail and SMTP services for handling e-mail. All of the users on the court’s network have computers running Windows 7 or Mac OS X Snow Leopard and Lion. The court has an Optical Ethernet WAN connection to the Sheriff’s Department and to the Maple City Police Department. There is also an Optical Ethernet WAN connection to the Maple City and County Building. The county judges are concerned about security on the Maple County court network and hire you via Network Design Consultants to assess their security needs.
Case Project 11-1: Border Locations Create a document that explains network borders to the judges and the border points you plan to examine for security.
Case Project 11-2: Preparing a Seminar About Attacks The judges ask you to give all court employees a short seminar about malicious attacks on computers and networks. Prepare some notes you can use in your presentation.
Case Project 11-3: Security for a Server When you examine the DSL connection to the Windows server you realize there is no particular security on the server other than file and folder permissions. What security improvements do you recommend to the judges?
Case Project 11-4: Locating a New Web server The clerk of the court wants to add a Web server to the network for public access to general information about the court system and its judges. Where would you place the Web server?
Case Project 11-5: Spam Problem The court has always had an annoying and time-wasting problem with spam. What steps do you recommend for the court to address this problem?
Explanation / Answer
Case Project 11-1:
Answer:
The border security is only as good as the weakest point. It suggests that establishing firewalls at all connection points between the firm’s internal network and the points of connection to each public telecommunications network. Any connection that is not covered offers a way into the network for an attacker. Further, in the reports it should discuss using the same security policies on every firewall.
Case Project 11-2:
Answer:Share some examples of cyber-attacks and their effects on organizations
How can we be safe?
-Methods of protection
--Strong Passwords, Anti-virus, Anti-Malware/Spyware, Firewalls, H/NIDS,H/NIPS, DMZ
-Examples to look for?
--Phishing emails, Eavesdropping, Secure ID Cards, Shoulder Surfing
-What to do when an attack is suspected?
--Do not forward suspect emails, Disconnect from Network, Notify System Admin
Case Project 11-3:
Answer:
Install a Packet-Filtering Firewall and HIDS. Also ensure that server is placed in a DMZ. Since server is in a courthouse, ensure that the physical security of the server’s location is acceptable as well to prevent unauthorized access. Implement a two factor authentication. If there are any VPN connections setup on the server, ensure they are secure as well.
Case Project 11-4:
Answer:
In the DMZ to allow public access to the server but not access to the private network
Case Project 11-5:
Answer:
Recommend training employees on internet security and not releasing their emails or Personally Identifiable Information. Also, install a spam filtering program on the mail server. If there is no mail server, then I would recommend installing one so the users have an official email address of “first.last@maplecountycourt.gov”
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.