Nt1310 Unit 3 Risk Management Research Paper

Improved Essays
Attackers exploiting default configurations to gain access to the network and to information stored on devices in the network are major threat to home gateway devices. In order to mitigate this threat there are many common default configurations a user should change.

When setting up a home network, a user should make sure to change the default passwords. They should set up a strong account password and wifi password using best practices.The user should use a strong security protocol such as WPA2 instead of the default WEP which is not secure. They should also disable wifi protected setup so users can’t bypass the network password by using an 8 digit pin printed on the router as it is easily brute forced.

In order to make it harder for attackers to know what type of router a person owns as they could try to exploit known vulnerabilities of that specific router type, the user should change the default name of the network (SSID). In order to find the router’s IP address and default gateway they could run ip route on Linux or ipconfig on Windows. A user should change the default IP address and subnet of the router as the default addresses could be targeted by attackers.
…show more content…
They should also disable remote administration and use private browsing when accessing admin interface so the URL is not saved in the browser history to further mitigate the risk of attackers to gaining admin access to the

Related Documents

  • Improved Essays

    Nt1310 Unit 4 Case Study

    • 424 Words
    • 2 Pages

    Utilizing the information from the table above the mean, median and standard deviation will be calculated. The mean equals the average of the sample by adding all the values of the samples and then dividing by the total number of items. The mean for the samples collected is 14.87 ounces which rounded up 14.9 ounces.…

    • 424 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    For the office users, the main form of connection will be via LAN wired connections connect directly to the Switches. The laptops PC's and tablets will connect via a secure wireless connection that will be provide using 2 Cisco Small Business WAP551 Wireless Access Point. The first location is the senior offices and second location the common office hosting most of the other employees. The router to used is a Cisco 2951 Integrated Services Router (ISR), this router delivers highly secure data, voice, video, and application. It has 3 integrated gigabit Ethernet ports that are enough to serve the office.…

    • 216 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 9 Case Study

    • 1143 Words
    • 5 Pages

    I would install the Star topology which is the most common type of network topology that is used in offices. Star topology is the best since each node is connected by more than one link basically two connection to reach a node. The speed of most star configurations is hundred megabits of data per second with gigabit hub or switches and NIC cards speeds can be at one thousand megabits per second. In a star topology is possible to have all the important data back ups on the hub in a private folder so if the computers fails, the employees can still use the data using the next computer in the network and accessing the backup files on the hub. If the hub adds a device like a printer all the other computers on the network can access the new device by simple accessing the hub.…

    • 1143 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In the paper, [1], the author introduced two kinds of topology attacks focus on the architecture of SDN and emphasized the weakness of the host tracking service and the link discovery service. And then, the paper provides the security extension, called Topoguard, for the Floodlight v0.9 controller. A. Two topology attacks The first attack as we mentioned, Host Location Hijacking Attack, is to send a fake request that the target host migrates to a new location trying to intercept packets and connections to the target host. This attack uses the weakness of the host tracking service that the controller simply follows the latest Packet-in message and does not check the identity of the request.…

    • 647 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ilab 5 jerry Metcalf Keller Graduate School of Management Professor: Gregory Gleghorn 6/4/2017 VPN Connection The type of VPN connection solution that we will be using to connect user to the internet work will be the Cisco Any connect client and the RSA secureID. We will be going in to detail of how the connection process goes and also how to configure it. Both clients are required in order for the user to authenticate and connect to the company network. When the user is connected they will be able to do their job remotely and send and retrieve information remotely.…

    • 678 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Implementing Firewall Filter Implementing firewall filters on a network makes the network free from attackers and very secured. Some of the boundaries that I will consider using on my firewall will be blocking ports on the network. First of all I will establish a new FTP session which the will initiate a connection to an FTP server that listens on TCP port 21 by default. This will help users on the network to login with user name and password before any data to port 21 will accepted. I will establish SSH(secure shell) which will provide a strong and secure communications over the network.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Hi Marcos, That's no problem; I'm always happy to help! You can access and download the required files using the credential's below. Once you access the FTP server, you will find a “FreeFlyer_Releases” folder that contains the most recent version of FreeFlyer, FreeFlyer 7.1.1. Within that subfolder you can select the bitness version installed on your system and access the "Extras" folder. Once you're in the folder then you will find a "Network Licensing" folder that will contain an lmadmin folder from which you can download and save freeflyr.exe to your system.…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 2 Case Study

    • 235 Words
    • 1 Pages

    This isn't a problem from the technical side of things, fairly easy and straight forward. There is some basic hardware we would need, the cost for the hardware/software is minimal and/or provided as part of the service with some of the vendor options. We will need to make sure we are compliant with PCI regulations and ensure we are meeting the minimum levels of security required to keep customers’ credit card information secure, this shouldn't be a problem. There are some business decisions to make as far as which vendor would be best for us, they vary a little regarding fee's etc. and I'm not sure what impact there would be if some of these vendors may be sitting on our cash flow vs being directly deposited into our account (eg. paypal/square…

    • 235 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    NT1330 Unit 1 Lab Report

    • 1743 Words
    • 7 Pages

    1. Goal The main purpose of this lab is to introduce us to the RLES vCloud system, begin setting up a network with a router VM and a main Redhat VM, and configure some baseline features for the continuation of our work in future labs. This included configuring DNS forwarding and NTP on the PFSense router VM, and configuring a wiki on the redhat VM alongside monitoring software such as Zabbix or Opsview. When configuring the router, all was fairly straightforward and without any major setbacks. The web panel was very helpful in configuring the various NAT, DNS, and NTP settings.…

    • 1743 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    Nt1310 Unit 3 Case Study

    • 283 Words
    • 2 Pages

    The kernel is not a fast food venor in this case but the system in which the operating system of the computer (such as Mac, Windows, Linux etc…) communicates with the cpu. What this bug has caused is a massive breach in the way this communication is happening because it has halted the communication from being coded allowing hackers to come in and destroy peoples systems. There should be a full investigation on Intel and any of the other affected chip makers and to prevent this from happening with any other chipsets in the future there needs to be government inspectors in this industry. I hope to learn why Intel/ARM chipset makers did not notice this bug and why they didn’t notify the public of this when they 1st discovered it. I also hope to…

    • 283 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Every business owner should consider the below points before setting up a network and also businesses might get expanded or changed in future. Long term investments should be considered here for future growth as well. So we should have a proper planning before we establish. Number of Users – Number of network users, printers, scanners, servers, data centers and security measures. Types of Equipment – Highly sophisticated equipment that should be capable of handling large networks and flexibility for expanding the networks for future purpose.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1 Case Study

    • 370 Words
    • 2 Pages

    1. The customer edge router will peer only with a provider router and will not peer with other customer edge routers. With reference to the diagram above, CE2 will peer with PE2 and not with CE1 or CE3. 2. If a new site is added, configuration is done only on the provider edge router.…

    • 370 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Abstract: With a specific end goal to outline and fabricate the secured network system, numerous elements must be thought seriously about, for example, the topology and position of hosts inside of the system, the determination of equipment and programming innovations, what's more, the cautious arrangement of every part. My paper will be an examination of the issues percentage in outlining a safe Local Area Network (LAN) and a best's portion practices proposed by security specialists. I will examine securing a LAN from network's perspective. [1] Introduction: With most complex innovations, there's not one size-fits-all arrangement regarding the matter of network administration. The needs and assets of every one of a kind association will relate…

    • 877 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Security Considerations The issues with the current set up of our lab in an enterprise environment are control and exceptions. Control is an issue because with all of the computers on a different domain password policies and other security features will not be implemented. This hurts the organization because it is not prepared for an intrusion of their network. A good fix for this issue is to get the network on the same domain and keep control over all users.…

    • 604 Words
    • 3 Pages
    Improved Essays