Nt1330 Unit 3 Assignment 1

Decent Essays
Implementing Firewall Filter
Implementing firewall filters on a network makes the network free from attackers and very secured. Some of the boundaries that I will consider using on my firewall will be blocking ports on the network.
First of all I will establish a new FTP session which the will initiate a connection to an FTP server that listens on TCP port 21 by default. This will help users on the network to login with user name and password before any data to port 21 will accepted. I will establish SSH(secure shell) which will provide a strong and secure communications over the network. This will also help all communication to be automatically encrypted.
Since port 23(Telnet ) helps to access a remote computers from all the department of the
…show more content…
Since its necessary to maintain a consistent DNS server and DNS data base, I will block most queries from outside DNS to ensure consistency in the company DNS database and DNS servers. Also attackers will not be able to retrieve DNS information through queries. I will Configuring the DNS servers to permit zone transfers to only legitimate users. I will choose pot 110 as default to use the company standard port for POP3 connections over TCP/IP. I will make sure that POP3 service is controlled which will makes users who are not allowed to access the server to not access mail through the POP3 service.
Because Port 111 is a place to find out which and where services are running. Without blocking this port, company is more vulnerable to attackers. Also without blocking this port remote attackers will be able to trick the service into executing arbitrary commands on the system with root privileges. I will always, keep up-to-date on patches and releases to best protect the company network.
Port 143 IMAP will also be blocked to secure the company

Related Documents

  • Decent Essays

    Upgrade your iMac into the machine that will help you provide quality outputs at ultra-fast speeds. With a 4GB DDR3 SODIMM Laptop RAM, you’ll raise your iMac’s capacity beyond industrial standard and provide the consistent efficiency when you’re required to, or better yet, just for your personal use. With 4GB worth of RAM, this DDR3 upgrade provides an optimal processing speed for your iMac to work with data with incredible results. That means you can open apps instantly, access data with less loading time, and operate a more responsive system regardless of you’re doing a system-intensive task or project. At 1333 MHz, you’ll be able to finish projects faster, better and a lot more consistent than ever.…

    • 291 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    CHALLENGE: Reigning in security management and reducing complexities at remote sites. SOLUTION: Palo Alto Networks PA-3020 and PA500’s, simplifies security at Data Center and advanced security policy deployment for the remote offices RESULTS: Simplify network security with powerful security controls, ease of use and powerful reporting. Visibility into the specific identity of each application helps enforce appropriate usage policies.…

    • 750 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Figure 6 shows Internal Security settings that were not set as high as they might have been to aide in threats that require a human response. Lesson 7: Invest in good technological defenses, but do not under invest in people who will be operating this equipment. Another, related lesson learned here is the need to strive to be excellent, rather than average. This stems from the view that we had taken during many simulation results that we were still doing "pretty good" when looked at in the context of all sectors taken together.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1380 Words
    • 6 Pages

    First to connect to the internet you need an internet service provider to have access to the internet which is a router to connect to your home network to the ISP. It can be wired or wireless connected to your home network. The web browser is a program which allows me to browse web pages such as my sync email account. You need a domain name to identify the IP address to have access; they are used in URLs to find particular web pages. URL first part is named a protocol finder and indicates what protocol should be used, the last part is a resource name and it identifies the IP address of where the resource is placed.…

    • 1380 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Nt1310 Unit 9

    • 1390 Words
    • 6 Pages

    UML 91.561 Computer & Network Security I HomeWork 1 Name – Nrupen Abnave Student ID -01382247 1.1 (a) Describe the major structure of a TCP packet and explain the main functions of the TCP headers. - TCP is a transport layer protocol and is connection oriented. Its reliable connection, has error checking and flow control.…

    • 1390 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    In its fiscal year 2016 assessment report, ICS-CERT listed the most prevalent critical infrastructure vulnerabilities and potential risk that may result from exploitation of these weaknesses. 1. Boundary protection: Weaker boundaries between industrial control systems and enterprise networks makes it difficult to detect unauthorized activity in critical systems. 2. Least functionality: It is important for organizations to minimize and close unused services, ports, protocols, applications and functions that increases vectors for malicious party to gain access to critical systems.…

    • 301 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Question 1 1.1)T.C.P(transmittion control protocol)-It is the language the computer uses to acess the internet. It is made up of protocalls which are made to establish a network of networks and provide a host with access to the internet. 1.2)I.P(Internet Protocol)-It is the way or protocol of how data is sent from one computer to another computer on the internet. 1.3)Physical Layer-the Physical layer is the interface between the medium and the device. It is made to transfer raw bits over a communication channel.…

    • 266 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    All of the United States Government agencies are now implementing some sort of risk management into there every day operations. A risk management can be done for a simple office party to the most dangerous raid. The Department of Homeland Security is no different with their 22 departments. In the case of ports, the Coast Guard and FEMA “cybersecurity efforts in the maritime port environment have been limited” (GAO, 2014, p.1). This includes the lack of a risk assessment that is heavily followed by DHS.…

    • 1502 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    ABC Accounting, Inc. is a quickly growing company looking to upgrade its current network. The company has grown from 5 to 200 employees in the past year and a half. The company is expected to grow to 350 employees in one year. ABC Accounting, Inc. will add more offices in the current building, which will span three floors. To accommodate their growth ABC Accounting is seeking the necessary solution to build an affordable, expandable, and secure network.…

    • 1768 Words
    • 8 Pages
    Improved Essays
  • Great Essays

    Information security policy refers to measures taken by a company in an attempt to control the behavior of the labor force. The policy ensures that no inappropriate activities take place within the working environment. As part of the rules that the policy has to abide by is the compliance with the laws and regulation and the ability to create defense in the court (Peltier, 2016). The management must support and administer the policy in a suitable manner. It is imperative to tailor the policy as a way of meeting the needs of the company.…

    • 1257 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 2049 Words
    • 9 Pages

    Each zone is constructed as virtual hierarchical that are geographic -specific. Each zone has a pre-defined number of nodes and a coordinator 〖C(i)〗_11^1to these nodes. The coordinator is assigned based on the proposed IHRW hashing algorithm, as illustrated in heuristic 3. Heuristic 3: The adaptive HRW protocol proposed in figure 5 is implemented in each level of the virtual hierarchical. Suppose the system contains n_od nodes that will be divided into number of Rendezvous geographic Zones (〖RG〗_Z) based on their geographic area.…

    • 2049 Words
    • 9 Pages
    Improved Essays
  • Improved Essays

    Port Scanning Policy

    • 729 Words
    • 3 Pages

    2. Policies Associated with vulnerability assessment and Penetration testing: Organizations should enforce policies that must be strictly adhered by all associated people to make penetration tests successful and maximize the vulnerability detection rate and fix the detected risks. a. Port Scanning Policy: 1. Purpose and Scope: The purpose of this port scan is to get the information about the devices connected in the network and get verified from the security officer so that none of the irrelevant ports are open and to make companies devices more secure.…

    • 729 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Introduction There are several types of crimes committed on a daily basis. Whether it is Robbery, Murder, Grand Theft and the list goes on. As of 2005, in over 7,000 (seven thousand) businesses, 67% were detected to at least have one cybercrime committed. Out of that 67%, 60% had more than one cybercrime committed. (Bureau of Justice Statistics, 2010)…

    • 868 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    The internet has cyber laws that were put into place for the users to stay protected. This allows internet users access, privacy, freedom of expression, and jurisdiction. Cyber Laws are important because it incorporates all the activities concerning the internet. The article The Importance of Cyber Laws, one must Know Before Using Internet by Hector says that cyber laws are significant because they ensure that crimes are not encountered. Many people are not fully informed about these laws and how they affect us every time we decide to open up our internet browsers.…

    • 1245 Words
    • 5 Pages
    Superior Essays