Nobody downloaded yet

Hardening Computer Networks - Essay Example

Comments (0) Cite this document
Summary
At the present, the majority of organizations carry out their business activities using computers and when the number of computers increases they need to form a computer network. A computer network allows a number of employees to access and process data simultaneously. In view…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
Hardening Computer Networks
Read TextPreview

Extract of sample "Hardening Computer Networks"

Download file to see previous pages However, an organization can deal with these security threats by adopting an appropriate security procedure. In fact, there are numerous guidelines and security measures that can be adopted by organizations in order to secure their computer networks (Nash, 1999; Shelly, Cashman, & Vermaat, 2005; Singhal, 2013). In this scenario, the National Institute of Standards and Technology (NIST) is a well-known organization that establishes and provides effective guidelines for promoting information technology (IT) security. In addition, NIST has established a wide variety of standards for securing all kinds of IT resources such as networks, computers, and equipment and so on (Scarfone & Souppaya, 2009). This paper discusses a standard operating procedure on how to properly secure an enterprise computer network using NIST standards. This paper discusses a variety of mechanisms that organizations can adopt in order to secure their networks.
It is believed that the majority of people don’t change their default SSIDs. Normally, manufacturers offer access points with a standard network name like that, default, tsunami, etc. In addition, this SSID is distributed users to let them known about the availability of the access point. This default SSID must be changed upon installation to something that does not directly relate to an organization. It is suggested that an organization should not rename its SSIDs to company name, brand name, company phone number or something else for which company is famous for. So that a hacker cannot guess it easily (Airtight Networks, 2014).
Passwords are the most common type of security measures used to protect data, system and networks from un-authorized access. In fact, passwords are used all the way through the organization to access different services and data. In addition, company’s employees need passwords to use their computer or access a network. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Hardening Computer Networks Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Hardening Computer Networks Essay Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/information-technology/1649613-hardening-computer-networks
(Hardening Computer Networks Essay Example | Topics and Well Written Essays - 1250 Words)
Hardening Computer Networks Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1649613-hardening-computer-networks.
“Hardening Computer Networks Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1649613-hardening-computer-networks.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Hardening Computer Networks

Computer Communications & Networks

...? Computer Communications & Networks Table OF Contents Introduction ………………………………………... Page 3 X-Stream Server ………………………………………… Page 4 Routing ………………………………………… Page 7 Conclusion …………………………………………… Page 8 References ……………………………………………. Page 10 Introduction Today, the Internet provides numerous opportunities for humans to communicate and exchange information. Apart from various advancements such as web2.0, the semantic web and virtual and augmented reality, fundamental concepts and protocols that are used to transfer and deliver a data packet is the same. However, in order to examine the processes, methods and techniques, we must first understand the TCP/IP protocol suite itself. Considering Internet Protocol...
8 Pages(2000 words)Essay

Computer Communications & Networks

...layer. TCP/IP model is illustrated in Exhibit 1.1 below. Exhibit 1.1 TCP/IP Model Image retrieved from (Network Communication Architecture and Protocols: TCP/IP Four Layers Architecture Model. 2007. Javvin Technologies, Inc, pp. 4-4.) The application layer incorporates protocols including FTP, SMTP, Telnet etc. These application layer protocols send data to the next layer i.e. transport layer. The transport layer than constructs the header and data to send it via Transmission control Protocol (TCP) or User Data gram Protocol (UDP). Likewise, the network layer assigns the IP address and delivers the packet to the required Ethernet present at the network access layer. An example of data...
10 Pages(2500 words)Lab Report

Computer Communications & Networks

...Network and Protocol Processes In accessing X-Stream’s website from the home computers, instructions must be given to the home computer on what to do; these instructions must be understandable to the sender to be able to send them. The computer must convert these instructions that we will refer to as data into a language it understands. The machine language instructions are relayed via a medium from where the data is guided to access the X-Stream website. Various complex and simple processes take place during this data transmission and involves many devices (Shuler). The devices are called end devices or more correctly hosts; which are either the destinations or sources...
8 Pages(2000 words)Lab Report

Computer networks

...?Local Area Network Information and communication technology ICT has facilitated us with endless communication interfaces and opportunities. Likewise, a skeleton for transfer and exchanging blood within different parts of the body is considered veins. Similarly, for exchanging and communicating data within different computers and applications, computer network is an essential component. There are various types of computer networks such as Local Area Network, Wide Area Network and Metropolitan Area Network. These networks operates on different topologies, however, star...
14 Pages(3500 words)Essay

Computer networks

...Interconnection (OSI) model. Likewise, network layer incorporates addressing information and control information that enables data packets to be routed within the computer network ("Internet Protocol Version 6." 255-255). Moreover, IP version 6 is also considered or called as the next generation IP, as specified by the IEFT: RFC 2460 ("Internet Protocol Version 6." 255-255). However, the primary reason for upgrading the IP version 4 to IP version 6 is address space limitations. Moreover, other issues such as performance, security and auto configuration are considered secondary (Loshin 305). Likewise, address space limitations are linked with the IP address space crisis that is debatable...
14 Pages(3500 words)Essay

Computers and Computer Networks

..., proving specific names to the folders may help things to become easier. For creating a nested folder in ‘My Documents’, Charlie will navigate via these folders: Double click My Computer ? Double click C: ?Double Click ‘Document and Settings’ ?Double Click ? ‘Charlie’? Double Click ‘My Documents’ Sharing Files Securely Charlie needs to configure the same workgroup name for both the workstations. The difference between the computer names will not affect the sharing procedure. Two services are mandatory to transfer files i.e. ‘File and Print Sharing for Microsoft Networks’ and ‘Client for Microsoft networks’. Both the users must log in, for creating a sharing session....
8 Pages(2000 words)Essay

Computer Communications & Networks

...? [Computer Communication & Networks] Communication of home computer with the X stream In this report, we will discuss the communication of networks in each layer of the TCP/IP model. Likewise, we will also address the Open System Interconnection (OSI) model where relevant. Each layer will demonstrate the methods, processes and technologies that are associated with accessing the X stream server from a home computer. Moreover, in this scenario, we have assumed that the home computer is connected with an ADSL connection from an ISP with a Client premises equipment (CPE) named as ADSL router. What is a TCP/IP Model? Before discussing the...
7 Pages(1750 words)Lab Report

Computer Networks

...Computer Networks Introduction In order to have a network of computers working and serving the required purpose of data storage and retrieval, several computers need to be connected to each other in a specific format so as to have a network of computer. Specifically designed norms have be laid down in the form of layered architecture with the description of the devices used for connectivity at each and every layer in order for the system to work efficiently and without any difficulty. 1. CASE STUDY Local area networks are very essential to let the work going for any kind of organization, then may it be a...
9 Pages(2250 words)Essay

Computer networks

...that was received. This is the same situation that happens in a basic acknowledgement. In this mode, the acknowledgement specifies the SACK blocks and they are then conveyed through starting and ending sequence numbers. Question 2 In trying to locate a certain server on the internet, a computer communicates to a series of DNS servers around the internet. The process involves the domain resolver determining the most appropriate domain name through queries that start with the top level label of the domain. The process entails some steps as follows; - On sending the message after the composition, the email client connects to the domains SMTP server The senders email communicates SMTP with email address of the...
4 Pages(1000 words)Essay

Computer Networks

Q4. This size of network design is because the network is suitable for a medium organization. This makes the size economical as a single router is capable of supporting several hosts (Tanenbaum, Andrew, 93). Communication in this size of a network is faster as the failure of one device does not affect the system. The system also makes it possible to use other connected devices such as printers. Q5. The TPC is the personification of a transmission channel that is very reliable. It is used in the end to end transmission purpose in the general internet architect. All the functionality of a network is required to take a sample of IP datagram release and major upon this control mode which helps in implementing flow control, reliability...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Hardening Computer Networks for FREE!

Contact Us