Critical Assignment 2 – Learning Outcomes
1. As a result of Co-op, I will be able to design and implement Security & Safe keeping Mechanisms for the devices & tools which I develop.
Providing safety & security for the device from MAC flooding and Network spoofing by designing and implementing security & safety mechanisms which are essential for Network design.
This will benefit me while generating a security strategy for the Network and its hardware.
This will be helpful for me in planning projects with integrated safety.
2. As a result of Co-op, I will be able to do troubleshooting and scrutinizing the problems in the Network.
It is important to recognize irregularities which appear in the Network & Network devices. And I will be
Networking is part of our everyday lives now. Weather is us using our phones, computer, using GPS for directions, watching 3D movies and TV’s or in our work environments. Network Security has become search a big issue since our day to day live started to be more involve with us. These problems involve in all type of shapes and forms where some of these issues are cyber attacks, physical attacks, or abuse of policies. People are really exposed due to the amount of internet activities we have going on in most of our networks. There are two fundamentally different when it comes to networking, the data networks and the synchronous network comprised of switches. With that being said there are also
Identify hardware and software needed to secure your choice of networks against all electronic threats.
5. What are the three primary methods for implementing security on this network, as well as the advantages and disadvantages each?
Teamwork is one of the greatest skills I’ve learned here at WWTC, I have learned to trust others as well as myself, I have learned to depend on others as well as allow others to depend on me.
Then, with your own understanding of what cooperation and support you need from others involved, what do you need from others in their roles to accomplish your own work successfully?
I am excited to experience the bond that will grow between me and my fellow co-workers. After talking to multiple workers in the field, I have come to the conclusion that it is not just working with people; it is a brotherhood. I am willing to put in as well as give the trust necessary to my team in order to complete the job right.
Promoting teamwork is one of the core values of the M-STEM Academy. Additionally, working with other people is a requirement for almost every job, so it is important to realize how to utilize its benefits as well as understanding how to work better together. The Crossing the Boundary activity challenged each team and the class overall to list all of the different systems that would be needed for the CYGNSS Project. The activity allowed each group to brainstorm ideas as a group of different elements of this project that were all needed for CYGNSS to work correctly. Sharing the ideas with the entire class brought more ideas together and learn from the perspectives of the entire class as opposed to a small group. Cooperating as a team to come
While analyzing the network for vulnerabilities, risks, threats and ways to secure the network, the below information are my findings.
Miller, F. A., & Katz, J. H. (2014). 4 Keys to Accelerating Collaboration. OD Practitioner,46(1), 6-11.
I am the second team member. On my part, I am a senior instructor analyst with
Hardening the network by conducting updating software and hardware to ensure the security of the system is an important part of network. Hardening involves an ongoing process of ensuring that all networking software together with the routers are password protected. These routers are updated with the latest vendor supplied patches and fixes. Since most routers and wireless access points provide a remote management interface which can be accessed over the network, it is essential that such devices are protected with strong passwords. There is also a need for a security plan that will ensure that the planned security controls are fully documented. It is the configuration management plan, contingency plan and the incident response plan, Security awareness, a training plan and the regulatory compliance.
Some users try and eventually get used the practice that is protecting their endpoint devices but with the up rise of the different forms of communication the very backbone of the wired and wireless networks can come under attack without any warning,
It has been demonstrated that a number of interoperable systems must be implemented to fully protect a network; a strategy known as Defense in Depth. Due to the multitude of security devices and device categories available, it can be very difficult to identify the correct tools for meeting security
The security of networks and computers are very important due to the following reasons[4] :
We use Networks for file sharing, printer or peripheral sharing, Internet telephone service, multi-player games and many more. But, Normal networks are more complex. Configuring network devices requires a lot of effort and generally has to be done manually by devoted admin. If a network file server promotes a fault, then many users may not be able to run application programs and get entry to shared data [2]. Users can lose data because of a fault on the network. It is hard to make the system secure from hackers, fresher or industrial spying. The larger the network, the more difficult it is to manage.