In: Computer Science
You are in networking at a large international company. Your company recently decided to implement a cross-training initiative and you have been selected to give a presentation to an audience of non-networking professionals working at various departments in your company.
Your presentation must be clear and concise enough to convey technical information to professionals who have a limited understanding of how networking actually works. However, it must also be accurate enough that your audience can understand how their company roles (such as scheduling resource-hogging reports, allowing contractors access to the system, and setting the hours international customers can place orders on your company’s system) can impact the company’s network, particularly in terms of security.
You decide to use the OSI model to explain the fundamental characteristics and components of networks because it is visual and presents the complexity of network communication in 7 layers.
Draft your speaker notes to hand off to an assistant who will turn your notes into a graphic-rich presentation. Each of your answers should be about 150-250 words long.
Note: Your assignment is to draft speaker notes. Do not create a presentation and do not write a paper.
1. Overview of Networking and Security
You decide to begin your presentation by providing your audience an overview of networking, with an emphasis on security and why it is important for all company roles to assist in securing the company’s network.
Discuss the potential security risks for each layer of the OSI model and the risks in each of the following:
2. Routing and Switching
Describe basic routing and switching in the context of the OSI model (i.e., in which layer routing, switching, and cabling occur). To underscore your department’s commitment to achieving 24/7 availability, describe 3 strategies your department uses to ensure the availability of network access in switched and routed networks.
3. Effective Security Policy
Describe at least 3 characteristics of an effective security policy, emphasizing the ways in which all departments in the company are responsible for helping secure the company network.
4. Security Strategies
Explain strategies your department used to build security directly into the design of your company network.
5. Malware
Define malware in layperson-friendly language and identify at least 2 strategies your department has put into place to protect your company’s network against malware.
6. Closing
Summarize your presentation.
Dear Student, I have spent lot of time to make short and clear notes for you, so you got something from it, give it an upvote. Thank you.
What is Computer
Networks
The technology that connects computers to each other via the
communication line is called networking.
In Deep: Connection of two computers allows the sharing of data. In a network, one computer drives the data, and the second receives the data. The computer that sends the data is the transmitter and the other second called a receiver. Data is transferred from the end to another end by the communication line.
What is Computer Networks
Security and Why?
Network security is the practice of preventing and protecting
against unauthorized intrusion into corporate networks.
So what it provides?
Answer: network security consists of:
Protection: You should
configure your systems and networks as correctly as possible
Detection: You
must be able to identify when the configuration has changed or when
some network traffic indicates a problem
Reaction:
After identifying problems quickly, you must respond to them and
return to a safe state as rapidly as possible
To avoid the threats in the network various network security
measures are given below:
(1) Firewalls
(2) Antivirus Software
(3) Passwords
(4) Cryptography
(5) Algorithms etc.
Q) What's the need for
Networking?
Answer: Some information centers store large informative data that
is well organized. User may recover the information or data from
his/her place. But it is required to connect the computer with
communication centers. This means the important use of networking
is to share files or data and to increase the processing speed.
Network
Topology
The physical arrangement of the cables, computers, and other
peripheral devices to form a network is known as a topology. It is
the shared communication medium that makes the backbone of the
system.
Star Topology: It is the most common topology used. In this all the
workstations are connected to a central connection point called a
hub.
Types of Computer Networks
LAN(Local Area
Network): small geographical area like an office,
building or campus
MAN(Metropolitan
Area Network) it covers a metro or a city.
WAN (Wide Area
Network) : This type of network covers a very large
geographical
area, across the country or continent.
Routing and switching in the OSI model-
Switching: Switching means the transmission of the data packets in the same network that is LAN. Switching is performed in the following two-layer of OSI-
Switching at DLL is performed using physical addresses of
devices that are MAC addresses.
Switching at the network layer is like routing, it is performed
using the logical address of the devices. Switching at layer-3 uses
IP addresses of source and destination.
Routing:
Routing is the core function of the network layer. Routing is done
by network layer when it determines from which route the data
packet is to be sent from the source network to the destination
network.
Strategies to be used to provide 24/7 availability in switched and routed network-
To provide HA (High Availability), I would recommend the following 2 strategies-
Redundant connections to manage device failure
Use EtherChannel between the router and switches..
Security Policy
characteristics are:
1. Reflect the reality on the ground
2. simple to understand
3. flexible
4. measurable.
Security Strategies that
must be followed:
1. Install Anti-Malware and Anti-Virus Solutions
2. Educate Employees Across the Organization
3. Establish and enforce a proven password strategy
4. Use a secure backup plan
Brief details of recommended strategies-
1. Redundant connections to manage device failure- The network should have a redundant connection. Redundant connections assure the high availability of the network. The redundant connection is useful whatever one of the devices will fail. The failure will not affect the network's performance. For example, R1 and R2 are the 2 routers on the network. if R1 will fail due to some hardware configuration or some other reason, then R2 will be available to serve the network. The Router interface should be configured with sub-interfaces to ensure high availability of the network
2. Use EtherChannel between the router and switches- There must be more than 1 physical link between routers and switches. In such cases, the failure of one physical link will not affect the transmission process. The availability of multiple physical interfaces assures high availability.
Q) What is
Malware?
Malware is software that is intended to damage or disable computers
and computer systems without the owner’s knowledge.
Protecting your customers’ networks and computers from attacks
requires a multi-pronged approach that stops attackers at every
angle.
here are some steps to protect our system from Malware:
1. Encrypt and back up data(Back up data regularly)
2.Put firewalls into effect(Install Firewall)
3. Don’t click on suspicious links or download attachments from
unknown sources
4. Encrypt critical files and folders
So lastly, the computer network is an important
part of the internet and for communicating in the world over
compute. so understanding computer network and its mechanism is
very important for all especially for the people who works around
it. Also, the knowledge of network can be a great asset for
understanding hacking and how to defend ourselves from it.