Saturday, March 9, 2019
Ing Life
ING Life Bo Sun CIS 505 Communication Technologies strayer University DarcelFord, Ph. D. February 11, 2013 Difficulties and Risks Associated with earnings Originally, Internet was designed for absolute security environment. Therefore, the protocols which are consisting of the pedestal of Internet have no security concerns. This means Internet is good to be vulnerable. Although major part of security issues are from inside, Internet does invade external threats. When users connect the Internet, the web browsers might contain breaches that permit scripts to admission fee the system and may cause damages potentially.In addition, when randomness is transmitting through with(predicate) the public network, the transmission might be captured by someone else. This is know as man-in-the middle attack. (Dean, 2009) Another potential common risk associated with Internet is called reconnaissance threats. Attackers could detect the reachable networks, devices and services through the Int ernet contact, or even draw an entire network map. Furthermore, DoS attack is some other risk users could encounter when using Internet. Hackers attempts to over-whelm the system in order to substantiate it shut down. Oppenheimer, 2011) Analyze INGs Solution The security machine live in the current INGs network is implemented a bring up between the external brokers and the internal servers. Basically, this is not enough to protect the network, especially, the information of ING involves private personal information. The information should be protected carefully. Securing Internet fellowship a variety of overlapping security mechanisms will be fit out to guarantee the security of the Internet connection.Common mechanisms include firewalls, parcel of land filters, physical security, scrutinise logs, authentication and authorization. At the same time, technicians also need to implement packet filters to prevent the Internet routers from the DoS attacks. DoS attacks have great determent to public servers. In this condition, reliable operating system and applications are scathing to solve the potential attacks. CGI and other types of scripts also could take care of the servers. Finally, firewall mechanism is efficient when facing Dos attacks.Firewall technologies, physical security, authentication and authorization mechanisms, auditing, and by chance encryption consist of the security mechanisms utilized on remote approach (Oppenheimer, 2011). Besides these normal network security mechanisms, a proper routing protocol is also important to Internet connection. The selected protocol should support route authentication. And noneffervescent and default routing is an issue need to be concerned because of potential compromised routing updates. Finally, wee police and comprehensive training for the employee is significant.After all, most security issues are lead by human errors. Critique the Extranet Solution To support extranet connection for brokers is a n small decision. It is simply for users to get access to the information which they needed. On the other hand, extranet is slow to be managed from the security aspect. Administrators could implement security mechanisms simply. Remote-access VPN is another way could be Implemented to connect the brokers. According to Oppenheimer, Reomte-access VPNs permit on-demond access to an organizations internetwork, via secure, encrypted connections. (Oppenheimer, 2011) This function is suitable for the remote uses which dont need everlastingly connection. Users connect the corporates network through service providers network, this could decrease the budget of connection and the the work of network administritors. constitute redundent mechanism could imprive brokers service. When primary database shut down, the backup devices could guarantee the network connection work normally. References Dean, T. (2009). network+ guide to networks. Mason Cengage Learning. Oppenheimer, P. (2011). Top-down Network Design. capital of Massachusetts Pearson Learning Solutions.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment