Question

In: Computer Science

You are in networking at a large international company. Your company recently decided to implement a...

You are in networking at a large international company. Your company recently decided to implement a cross-training initiative and you have been selected to give a presentation to an audience of non-networking professionals working at various departments in your company.

Your presentation must be clear and concise enough to convey technical information to professionals who have a limited understanding of how networking actually works. However, it must also be accurate enough that your audience can understand how their company roles (such as scheduling resource-hogging reports, allowing contractors access to the system, and setting the hours international customers can place orders on your company’s system) can impact the company’s network, particularly in terms of security.

You decide to use the OSI model to explain the fundamental characteristics and components of networks because it is visual and presents the complexity of network communication in 7 layers.

Draft your speaker notes to hand off to an assistant who will turn your notes into a graphic-rich presentation. Each of your answers should be about 150-250 words long.

Note: Your assignment is to draft speaker notes. Do not create a presentation and do not write a paper.

1. Overview of Networking and Security

You decide to begin your presentation by providing your audience an overview of networking, with an emphasis on security and why it is important for all company roles to assist in securing the company’s network.

Discuss the potential security risks for each layer of the OSI model and the risks in each of the following:

  • Distributed vs. centralized computer systems and why your department chose to be distributed/centralized
  • Different network topologies and why your department chose the topology it did
  • Why standards bodies are essential in networking and how your department complies with standards
  • The importance of communication protocols and which one(s) your department chose
  • The differences between LAN, WAN, and wireless technologies, and how your department incorporated each
  • The responsibilities associated with providing telecommunications services such as security, privacy, reliability, and performance

2. Routing and Switching

Describe basic routing and switching in the context of the OSI model (i.e., in which layer routing, switching, and cabling occur). To underscore your department’s commitment to achieving 24/7 availability, describe 3 strategies your department uses to ensure the availability of network access in switched and routed networks.

3. Effective Security Policy

Describe at least 3 characteristics of an effective security policy, emphasizing the ways in which all departments in the company are responsible for helping secure the company network.

4. Security Strategies

Explain strategies your department used to build security directly into the design of your company network.

5. Malware

Define malware in layperson-friendly language and identify at least 2 strategies your department has put into place to protect your company’s network against malware.

6. Closing

Summarize your presentation.

Solutions

Expert Solution

Dear Student, I have spent lot of time to make short and clear notes for you, so you got something from it, give it an upvote. Thank you.

What is Computer Networks
The technology that connects computers to each other via the communication line is called networking.

In Deep: Connection of two computers allows the sharing of data. In a network, one computer drives the data, and the second receives the data. The computer that sends the data is the transmitter and the other second called a receiver. Data is transferred from the end to another end by the communication line.

What is Computer Networks Security and Why?
Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks.

So what it provides?
Answer: network security consists of:
Protection: You should configure your systems and networks as correctly as possible
Detection: You must be able to identify when the configuration has changed or when some network traffic indicates a problem
Reaction: After identifying problems quickly, you must respond to them and return to a safe state as rapidly as possible

To avoid the threats in the network various network security measures are given below:
(1) Firewalls
(2) Antivirus Software
(3) Passwords
(4) Cryptography
(5) Algorithms etc.

Q) What's the need for Networking?
Answer: Some information centers store large informative data that is well organized. User may recover the information or data from his/her place. But it is required to connect the computer with communication centers. This means the important use of networking is to share files or data and to increase the processing speed.

Network Topology
The physical arrangement of the cables, computers, and other peripheral devices to form a network is known as a topology. It is the shared communication medium that makes the backbone of the system.
Star Topology: It is the most common topology used. In this all the workstations are connected to a central connection point called a hub.

Types of Computer Networks
LAN(Local Area Network): small geographical area like an office, building or campus
MAN(Metropolitan Area Network) it covers a metro or a city.
WAN (Wide Area Network) : This type of network covers a very large geographical
area, across the country or continent.


Routing and switching in the OSI model-

Switching: Switching means the transmission of the data packets in the same network that is LAN. Switching is performed in the following two-layer of OSI-

  • DLL
  • Network layer

Switching at DLL is performed using physical addresses of devices that are MAC addresses.
Switching at the network layer is like routing, it is performed using the logical address of the devices. Switching at layer-3 uses IP addresses of source and destination.


Routing: Routing is the core function of the network layer. Routing is done by network layer when it determines from which route the data packet is to be sent from the source network to the destination network.

Strategies to be used to provide 24/7 availability in switched and routed network-

To provide HA (High Availability), I would recommend the following 2 strategies-

Redundant connections to manage device failure
Use EtherChannel between the router and switches..

Security Policy characteristics are:
1. Reflect the reality on the ground
2. simple to understand
3. flexible
4. measurable.

Security Strategies that must be followed:
1. Install Anti-Malware and Anti-Virus Solutions
2. Educate Employees Across the Organization
3. Establish and enforce a proven password strategy
4. Use a secure backup plan

Brief details of recommended strategies-

1. Redundant connections to manage device failure- The network should have a redundant connection. Redundant connections assure the high availability of the network. The redundant connection is useful whatever one of the devices will fail. The failure will not affect the network's performance. For example, R1 and R2 are the 2 routers on the network. if R1 will fail due to some hardware configuration or some other reason, then R2 will be available to serve the network. The Router interface should be configured with sub-interfaces to ensure high availability of the network

2. Use EtherChannel between the router and switches- There must be more than 1 physical link between routers and switches. In such cases, the failure of one physical link will not affect the transmission process. The availability of multiple physical interfaces assures high availability.

Q) What is Malware?
Malware is software that is intended to damage or disable computers and computer systems without the owner’s knowledge.

Protecting your customers’ networks and computers from attacks requires a multi-pronged approach that stops attackers at every angle.
here are some steps to protect our system from Malware:
1. Encrypt and back up data(Back up data regularly)
2.Put firewalls into effect(Install Firewall)
3. Don’t click on suspicious links or download attachments from unknown sources
4. Encrypt critical files and folders


So lastly, the computer network is an important part of the internet and for communicating in the world over compute. so understanding computer network and its mechanism is very important for all especially for the people who works around it. Also, the knowledge of network can be a great asset for understanding hacking and how to defend ourselves from it.


Related Solutions

You are the networking expert for a large company. First, your company has one small branch...
You are the networking expert for a large company. First, your company has one small branch office that is connected to an Internet Service Provider via one router. This branch office is not expected to grow or change in the next three years. Second, your company has a larger office building with three routers to interconnect within the building and also to connect to an Internet Service Provider. This larger office building is not expected to change in the next...
You have recently joined the international audit team at a large company responsible for janitorial work...
You have recently joined the international audit team at a large company responsible for janitorial work at many different local businesses. Because of the significant number of consumables used in janitorial work, your company has a large purchasing department. You have been asked to analyze the purchases data set for potential frauds. Steps/Questions 6. Analyze the Product Price column from each company using Benford’s Law. Analyze only the first digit of the column. On average, do nay of the vendors...
You have recently joined the international audit team at a large company responsible for janitorial work...
You have recently joined the international audit team at a large company responsible for janitorial work at many different local businesses. Because of the significant number of consumables used in janitorial work, your company has a large purchasing department. You have been asked to analyze the purchases data set for potential frauds. Steps/Questions 5. Verify the values in the Quantity and Total columns. Are any missing or abnormal values present?
Your Division at Nashika Limited, a large networking company, has put together a project proposal to...
Your Division at Nashika Limited, a large networking company, has put together a project proposal to develop a new home networking router. The expected Net Present Value (NPV) of the project is K17.7 million, and the project will require 50 software engineers. Nashika has a total of 190 engineers available and the router project must compete with the following other projects for these engineers: Project NPV (K million) Engineering Headcount Router 17.7 50 Project A 22.7 47 Project B 8.1...
You have recently been asked to leave your current job with a large company so you...
You have recently been asked to leave your current job with a large company so you can run your family business. Many members of your family will rely on that business to pay their bills for the next few years. The company has grown over the past decade and has taken on a significant amount of short-term debt. Your banker paid you a visit to discuss her calculations of various ratios for your business. The banker’s primary concern is whether...
Your organization has decided to implement the EHR system, and you have been appointed as a...
Your organization has decided to implement the EHR system, and you have been appointed as a member of the steering committee. Discuss the role of the steering committee in EHR implementation. note: Please write by computer form.
Your organization has decided to implement the EHR system, and you have been appointed as a...
Your organization has decided to implement the EHR system, and you have been appointed as a member of steering committee. Discuss the role of the steering committee in EHR implementation
Your organization has decided to implement the EHR system, and you have been appointed as a...
Your organization has decided to implement the EHR system, and you have been appointed as a member of a steering committee. Discuss the role of the steering committee in EHR implementation.
Your organization has decided to implement the EHR system, and you have been appointed as a...
Your organization has decided to implement the EHR system, and you have been appointed as a member of the steering committee. Discuss the role of the steering committee in EHR implementation. note: Please write by computer form.
you are the senior on an audit of Teleko, a large public company. the company recently...
you are the senior on an audit of Teleko, a large public company. the company recently completed an acquisition of its fifth largest competitor. the competitor is known for historical accounting manipulations related to purchasing such as under- or over-statement of liabilities and expenses. list at least 6 most relevant analytical procedures that can be used to test purchasing-related accounts. what potential misstatements are indicated by each of these analytical procedures?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT