Describe peer-to-peer networking, Computer Networking

Assignment Help:

You are requested to design a secure home or small scale network (Fig. 1) to satisfy the key concepts underlying computer and network security: confidentiality, integrity, availability, accountability and non-repudiation.

A small home network comprising: two personal computers (PC1 and PC2), a laptop and an ADSL Modem with wireless G Router. PC1 is directly wired to the Router using an RJ45 connections crossover cable, while PC2 and the laptop are connected by wireless adapters to the router. A mobile phone, iPhone 4S, can also connect to the internet using wireless technology. The technical specifications of the devices and the details of the operating systems are given in Table 1.

The network is peer-to-peer networking to allow the users to share files and printing and scanning facilities attached to PC1.

1. Identify possible weaknesses in the network infrastructure that may make it vulnerable to attacks, accidental and intentional misuses. Assess the assets, vulnerabilities and threats to the network. Carry out a risk analysis for the data asset.

2. What are the reasonable precautions, countermeasures and risk mitigation to provide/install in order to secure the network?

3. Visiting guests need to access and connect to the internet, using their private laptops, how would you devise/design procedures to protect the network and the information contained in the devices?

4. The network owner would like to convert PC1 to a file server and would like secure access to his files from outside the network using the internet, how would you change/design the network to satisfy this requirement?


Related Discussions:- Describe peer-to-peer networking

Message passing programme development environment, Message Passing Programm...

Message Passing Programme Development Environment In a multicomputer system, the computational load among various processors must be balanced. To pass information among variou

Show the crc-performance, Q. Show the CRC-Performance ? CRC-Performanc...

Q. Show the CRC-Performance ? CRC-Performance CRC is able to detect all burst errors that affect an odd number of bits CRC is able to detect all burst errors of

What is 100base-fx, 100Base-FX Utilizes two identical optical fiber...

100Base-FX Utilizes two identical optical fibers in star topology One fiber holds frames from the station to hub one from hub to station Encoding is 4B/5B Si

Show the properties of microwaves, Q. Show the properties of Microwaves? ...

Q. Show the properties of Microwaves? Microwaves - Frequencies among 1 and 300 GHz - Unidirectional - Narrow focus requires sending as well as receiving antennas to

Plot way forms for the modulation schemes, Plot way forms for the following...

Plot way forms for the following modulation schemes using Mathlab: a) 2 ASK   4 ASK                       b)  BFSK     4 FSK                             c) BPSK 4

Difference between unicast and anycast, Difference between Unicast and Anyc...

Difference between Unicast and Anycast Unicast: An identifier for a single interface. A packet sent to a unicast address is delivered to the interface identified by that addres

Building routing tables, There are basically two functions for creating rou...

There are basically two functions for creating routing tables, which are as given: Manual entry Software Further there are two types for computing routing table inf

Explain the architecture and usage of isdn, Computer Networks 1. Write ...

Computer Networks 1. Write about different network structures in use. 2. Explain the architecture and usage of ISDN. 3. Describe the concept of framing in Data Link Layer

Use of a distance vector routing algorithm, Question: (a) The diagram ...

Question: (a) The diagram below shows a configuration of Internet routers (A-F) which achieve dynamic routing through the use of a Distance Vector routing algorithm. The metr

Building a defense in networking, Q. Building a Defense in networking? ...

Q. Building a Defense in networking? When building a defense you must use a layered approach that includes securing - The network infrastructure the communications protocol

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd