Analyze and explain foot printing in network security

Assignment Help Other Subject
Reference no: EM132296928

Scenario

TIA Software company is global IT company that provides all IT relate services across the globe. TIA is expanding its business and as a consequence, they want to establish a new office at Auckland for their business needs in the Trans-Tasman region.

As the business is growing management has decided to upgrade the peer to peer networks using the internet with their global branches. In the Auckland branch office there are three floors which are connected to the main chassis switch. There is an email and file server which are directly connected to chassis switch in Auckland office, all the computers working fine locally but there is a requirement to connect the local office network to the existing global TIA software branch offices.

As a network administrator, your role is to connect the local Auckland network to the global TIA network using the internet. Assume that your Auckland local network is using 192.168.10.0/24 IP address block. After interconnecting local Auckland network with global branches, TIA Software Company is facing following problems.

a) The server is not responding very often.

b) Some files from share resources are corrupted.

c) Email services, as well as network resources, are running on the server with limited access

Being a network administrator you have to identify the problems and provide necessary solutions/recommendations for various issues by performing the following tasks:

Note: You have to write down the appropriate report after performing each task.

Question -01:
Install and configure the network vulnerability scanning tools (Nmap) in your network and check the vulnerabilities in your network against hackers. Use a network where the vulnerabilities are prominent.

Question-02:
As a network administrator, you have to protect network users and computers. Demonstrate how you would protect your network with the following tasks.
a) Block all the computers from the web access.
b) Create the web access security policy for the network only allowing a single host having IP address (192.168.10.101) and blocking all network hosts to access the internet from port 80 and /or 8080.
c) Apply rules for Windows services and applications.
d) Apply important program with conditions.
e) Block all the remote users to access the internal networks.

Question-03
Analyse the scenario of TIA Software company and create your own network security policies to protect network users and computers from hackers.

Question-04
Evaluate the network vulnerability concerns and weakness in your network (used in Question-01) after generation of vulnerability report of software by using NMAP and provide the counter measures for identified vulnerabilities.

Question-05
Perform the following activities at NMAP using command line tools:
a) Scan open ports.
b) Perform OS fingerprinting.
c) Ping Scan.
d) TCP ports scan.
e) UDP ports scan.

Question-06
Identify and analyse network vulnerabilities by using NESSUS scanner tools.
Your reports should include following analysis:
a) Basic Network scanning.
b) Ntstat port scanning.
c) Vulnerability mapping.
d) Plugins.
e) Policies.

Question-07
a) Analyze how intruder detection system(IDS) can resolve security issues in a computer network. different kinds of scams and frauds on online transaction over network or on Internet. Provide suitable solutions for each of these attacks to protect your system.
b) Install and configure the intruder detection system(IDS), SNORT in your network for ensuring network protection from hackers. Explain different configuration modes of SNORT in details.

Question-08
a) Analyze and explain foot printing in network security.
b) Evaluate hacker's foot print and their presence into network by using network vulnerability tools.

Question-09
a) Explain the main functions of firewall in network security. Analyze different kinds of firewall in brief.
b) Evaluate and explain the selection criteria of a next generation firewall in details.

Question-10
a) Evaluate the common network security problems and their solutions
b) Analyze and explain why network security is crucial for any business organization.

Reference no: EM132296928

Questions Cloud

Process of the strategic plan and the operational plan : Who is responsible for the evaluating the process of the strategic plan and the operational plan? Give references
How the global health issue you selected is approached : Reflect on how the global health issue you selected is approached in the U.S. and in the additional country you selected. Review and download the Global Health.
What would be the customer time in the system : What would be the customer time in the system if a second window was opened with each server doing all three tasks?
What is the present value of this infinite sequence : Beginning in 2016, you will receive $10,000 on the first day of every year. What is the present value of this infinite sequence of cash flows
Analyze and explain foot printing in network security : Analyze and explain foot printing in network security - Evaluate hacker's foot print and their presence into network by using network vulnerability tools
Write brief description of the curriculum components : Please address the mission, values, philosophy and alignment and vision toward a nursing curriculum at Seton Hall University. Brief description of the.
How much will the warehouse pay in total annual holding cost : How much will the warehouse pay in total annual holding costs for these items?
How many people reached by the program or policy selected : Review the Healthcare Program/Policy Evaluation Analysis Template provided in the Resources. Select an existing healthcare program or policy evaluation.
Business producing and marketing holiday decorations : You are wanting to go into business producing and marketing holiday decorations, including some you will make to order.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd