Question

In: Computer Science

You are a network administrator for your organization and arerequired to plan and deploy a...

You are a network administrator for your organization and are required to plan and deploy a new file and print server that will service Windows, Linux, and Macintosh client computers. In addition, the server will provide DHCP services on the network and host a small Web site listing company information. In a brief document, draft the services that you plan to implement for this server and the methods that you will use to maximize the security of the system.

Solutions

Expert Solution

Service For Server to Maximize Security:

The servers are the foremost and the most important thing in a network if you are going to need to provide services to your consumer with the best security and setup required..The most useful services are as follows:

  • SSH Keys:​​
    • They are the pair of cryptographic keys that are used in authenticating to an SSH server as an alternative to password logins.
    • There is a step in which private as well as the public keys are developed prior to the authentication.
    • These keys are kept secured by the uer while the public key can be shared by anyone;
  • Firewalls:
    • They are an most important part of any server configurations.
    • They restrict the access to everything expect the specific services that you need to remain open for.
    • Exposing only a few pieces of the software helps in reducing the attacks on the server which is regarded to as limiting the components that are vulnerable to the exploitatins.
  • VPN's & Private Networking:
    • The private networks are the networks that are only available to the certain servers or users. They enhance the security by providing us with a private connection which is preferably more over the public networking.
    • A way to map out a private network that will only lead your servers to pave a way to be fully private and secure.
    • It is easy to implement as an interface during the time when your servers creation and configuring your applications and mostly the firewalls to use them as a private network.
  • SSL/TLS Encryption:
    • These are for the certificate based authentication. They are used to authenticate the different entities to one another. They are also used for the encryption of the data that is been exchanged with the server by the user.
    • It requires a bit on initial effort to setup the SSL/TLS Encryption and making the keys infrastructure a bit of functional.
    • It also requires VPN tunnel to operate with on a key note.

Hence, these are all the services that we must implement on the server and the methods that you will use the security of the system to enhance the network security.


Related Solutions

(b) You have been employed as a network administrator in an organization. If you have to...
(b) You have been employed as a network administrator in an organization. If you have to send the data of your organization through the internet (there might be very untrusty network nodes), what kind of encryption will you use? Further, sometimes attackers exploit a special feature of the transport layer (segmentation and reassembly) to launch an attack. What attack is this? (c) Of the various firewall types available for use in a business network, which type collects network connection information...
NETWORKING INTRODUCTION QUESTIONS. 1. You are the network administrator for an organization. You boot up a...
NETWORKING INTRODUCTION QUESTIONS. 1. You are the network administrator for an organization. You boot up a router, log into it, and issue a series of commands that changes the IP address of one of the interfaces. Which of the following statements is true? (Choose 2) a. The running config file and startup config file are no longer identical. b. The iOS image has been altered. c. The changes to the configuration are automatically saved to NVRAM. d. The startup config...
Assume you are the network administrator for a mid-sized organization. Recently, management has given permission for...
Assume you are the network administrator for a mid-sized organization. Recently, management has given permission for several employees to work remotely. Your organization has used VPN access in the past for short-term traveling assignments. Discuss the pros and cons of implementing DirectAccess, and always on VPN vs normal VPN solutions. Your post should be 250-500 words.
You are converting your network to an IP addressing scheme. You assign a junior administrator the...
You are converting your network to an IP addressing scheme. You assign a junior administrator the task of assigning addresses to your network hosts from the IP address range 202.17.68.0-202.17.68.255. He states that he used every one of the 256 addresses in the range. Which devices on the network will be unable to communicate with other network devices? Routers are protocol dependent at which OSI model layer? You are the network administrator for a large, global internetwork. You must update...
After you have selected a company or organization for your assignment, you will begin writing your Network Security Plan. The first part of your plan should include the following:
After you have selected a company or organization for your assignment, you will begin writing your Network Security Plan. The first part of your plan should include the following:A Table of Contents with the major sections of the documentNetwork Model: Describe the architecture of the network, including the major components of the network. A simple network diagram would be useful.Security Risk Analysis: Identify the major areas of potential risk in the network. The type of risk should be included as...
As the network administrator for a growing ISP, you want to make efficient use of your...
As the network administrator for a growing ISP, you want to make efficient use of your network addresses. One of the networks addresses IANA assigned to you is a Class C network of 192.168.88.0. You have decided to use the addresses in this Class C network to satisfy the IP address requirements of 18 corporate customers who need between 20 and 24 addresses each. calculate a subnet mask that meets their needs. List the subnet mask and the first four...
As the network administrator for a growing ISP, you want to make efficient use of your...
As the network administrator for a growing ISP, you want to make efficient use of your network addresses. One of the networks addresses IANA assigned to you is a Class C network of 192.168.88.0. You have decided to use the addresses in this Class C network to satisfy the IP address requirements of 18 corporate customers who need between 20 and 24 addresses each. calculate a subnet mask that meets their needs. List the subnet mask and the first four...
As the network administrator for a growing ISP, you want to make efficient use of your...
As the network administrator for a growing ISP, you want to make efficient use of your network addresses. One of the networks addresses IANA assigned to you is a Class C network of 192.168.88.0. You have decided to use the addresses in this Class C network to satisfy the IP address requirements of 18 corporate customers who need between 20 and 24 addresses each. calculate a subnet mask that meets their needs. List the subnet mask and the first four...
As the network administrator for a growing ISP, you want to make efficient use of your...
As the network administrator for a growing ISP, you want to make efficient use of your network addresses. One of the networks addresses IANA assigned to you is a Class C network of 192.168.88.0. You have decided to use the addresses in this Class C network to satisfy the IP address requirements of 18 corporate customers who need between 20 and 24 addresses each. calculate a subnet mask that meets their needs. List the subnet mask and the first four...
You have been named the network administrator for a large insurance firm. Your responsibility is to...
You have been named the network administrator for a large insurance firm. Your responsibility is to come up with a plan for the network infrastructure, which includes number of servers, network security devices, desktops, laptops and handheld devices. The plan should be carefully crafted to show all the necessary details in deploying the infrastructure (LANs, firewalls, routers, switches, IDS and sensors, servers, database servers, and addressing scheme) including specifics about the configurations. An understanding of the security issues the company...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT