Analyze and explain foot printing in network security

Assignment Help Other Subject
Reference no: EM132296928

Scenario

TIA Software company is global IT company that provides all IT relate services across the globe. TIA is expanding its business and as a consequence, they want to establish a new office at Auckland for their business needs in the Trans-Tasman region.

As the business is growing management has decided to upgrade the peer to peer networks using the internet with their global branches. In the Auckland branch office there are three floors which are connected to the main chassis switch. There is an email and file server which are directly connected to chassis switch in Auckland office, all the computers working fine locally but there is a requirement to connect the local office network to the existing global TIA software branch offices.

As a network administrator, your role is to connect the local Auckland network to the global TIA network using the internet. Assume that your Auckland local network is using 192.168.10.0/24 IP address block. After interconnecting local Auckland network with global branches, TIA Software Company is facing following problems.

a) The server is not responding very often.

b) Some files from share resources are corrupted.

c) Email services, as well as network resources, are running on the server with limited access

Being a network administrator you have to identify the problems and provide necessary solutions/recommendations for various issues by performing the following tasks:

Note: You have to write down the appropriate report after performing each task.

Question -01:
Install and configure the network vulnerability scanning tools (Nmap) in your network and check the vulnerabilities in your network against hackers. Use a network where the vulnerabilities are prominent.

Question-02:
As a network administrator, you have to protect network users and computers. Demonstrate how you would protect your network with the following tasks.
a) Block all the computers from the web access.
b) Create the web access security policy for the network only allowing a single host having IP address (192.168.10.101) and blocking all network hosts to access the internet from port 80 and /or 8080.
c) Apply rules for Windows services and applications.
d) Apply important program with conditions.
e) Block all the remote users to access the internal networks.

Question-03
Analyse the scenario of TIA Software company and create your own network security policies to protect network users and computers from hackers.

Question-04
Evaluate the network vulnerability concerns and weakness in your network (used in Question-01) after generation of vulnerability report of software by using NMAP and provide the counter measures for identified vulnerabilities.

Question-05
Perform the following activities at NMAP using command line tools:
a) Scan open ports.
b) Perform OS fingerprinting.
c) Ping Scan.
d) TCP ports scan.
e) UDP ports scan.

Question-06
Identify and analyse network vulnerabilities by using NESSUS scanner tools.
Your reports should include following analysis:
a) Basic Network scanning.
b) Ntstat port scanning.
c) Vulnerability mapping.
d) Plugins.
e) Policies.

Question-07
a) Analyze how intruder detection system(IDS) can resolve security issues in a computer network. different kinds of scams and frauds on online transaction over network or on Internet. Provide suitable solutions for each of these attacks to protect your system.
b) Install and configure the intruder detection system(IDS), SNORT in your network for ensuring network protection from hackers. Explain different configuration modes of SNORT in details.

Question-08
a) Analyze and explain foot printing in network security.
b) Evaluate hacker's foot print and their presence into network by using network vulnerability tools.

Question-09
a) Explain the main functions of firewall in network security. Analyze different kinds of firewall in brief.
b) Evaluate and explain the selection criteria of a next generation firewall in details.

Question-10
a) Evaluate the common network security problems and their solutions
b) Analyze and explain why network security is crucial for any business organization.

Reference no: EM132296928

Questions Cloud

Process of the strategic plan and the operational plan : Who is responsible for the evaluating the process of the strategic plan and the operational plan? Give references
How the global health issue you selected is approached : Reflect on how the global health issue you selected is approached in the U.S. and in the additional country you selected. Review and download the Global Health.
What would be the customer time in the system : What would be the customer time in the system if a second window was opened with each server doing all three tasks?
What is the present value of this infinite sequence : Beginning in 2016, you will receive $10,000 on the first day of every year. What is the present value of this infinite sequence of cash flows
Analyze and explain foot printing in network security : Analyze and explain foot printing in network security - Evaluate hacker's foot print and their presence into network by using network vulnerability tools
Write brief description of the curriculum components : Please address the mission, values, philosophy and alignment and vision toward a nursing curriculum at Seton Hall University. Brief description of the.
How much will the warehouse pay in total annual holding cost : How much will the warehouse pay in total annual holding costs for these items?
How many people reached by the program or policy selected : Review the Healthcare Program/Policy Evaluation Analysis Template provided in the Resources. Select an existing healthcare program or policy evaluation.
Business producing and marketing holiday decorations : You are wanting to go into business producing and marketing holiday decorations, including some you will make to order.

Reviews

Write a Review

Other Subject Questions & Answers

  How the implementation and use of cac will impact

you are the Coding Supervisor at Rasmussen Hospital and Clinics. Your staff consists of five coders who code inpatient, outpatient, and the professional fees

  Lenin changed the history of russia

Of course Lenin changed the history of Russia through his own personality and organisation - political reform introduced.

  Describe the pathophysiological mechanisms of chronic asthma

Describe the pathophysiological mechanisms of chronic asthma

  Review the development and implementation of the policy

Review the development and implementation of the policy (what was the policymaking process?/policy formulation, policy legitimation, policy implementation, policy evaluation, and policy change).

  Specifying the leadership abilities

Describe a project that you were involved with, or are familiar with, that either succeeded or failed. Discuss how project leadership played a role in its success or failure.

  Social change and modernization

Define social change. What are the key features of social change? Give four examples of social movements, current or past, and describe the key features of each movement.

  Develop goals and objectives for the practicum experience

Develop goals and objectives for the Practicum Experience in this course. Create a proposed timeline of practicum activities based on practicum requirements.

  What steps can you take to reduce your ecological footprint

What steps can you take to reduce your ecological footprint? What is your responsibility as a global citizen to protect the earth's resources?

  What are the key changes in it

It is national interest that traditionally drives security policy within a nation and how it is articulated to other nations in the international community (diplomacy). What are the key changes in it - be aware they probably won't jump out at you

  Develop a closure checklist that the project team will use

Closure checklist and project evaluation - Develop a closure checklist that the project team will use to ensure that the project has been closed properly

  Abstract expressionist

Who is best categorized as an “abstract expressionist” painter of the New  York school?

  Transitions to democracy

I cannot find the text by Robert Dahl 1990, "Transitions to Democracy" read at the symposium Voices of Democracy, March 16-17 at the University of Dayton. Where can I find it?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd