Your Perfect Assignment is Just a Click Away

We Write Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!

glass
pen
clip
papers
heaphones

SNHU Solution for IP Routing and Configuration Protocols Discussion

SNHU Solution for IP Routing and Configuration Protocols Discussion

Before you complete your initial post, read Section 1.2 in the “Security of IP Routing Protocols” resource. In your post, analyze this question from the document: “If these companies had such a hard time getting it perfect, what chance does anyone else have?” Although this was written in 2001, many of the identified exploits still exist. If money hasn’t been the solution, what is? Justify a possible solution. Include network security and IP routing and configuration in your discussion.

In response to your peers, connect their solutions to the application of the CIA triad or Fundamental Security Design Principles (FSDPs). For reference, refer to the CIA Triad and Fundamental Security Design Principles document. 

i know the file i uploaded is big but its only section 1.2

Peer posts:

Benjamin Kachel posted Nov 9, 2021 10:27 AM

Subscribe

Hello classmates,

I think the real way to keep any company safe from hack attacks, is to accept that they are bound to happen, have a plan in place for when they do, and train every single employee on the importance of cyber attacks and how to best avoid them at all costs.

Network security- The obvious way to secure a network is by a firewall. Easy, right? Not really, because if a firewall’s settings aren’t switched from default, then any hacker could find what the default settings are of the firewall and find a way through it. Implementing a firewall into a network is pointless if the settings are not configured out of the box.

IP routing and configuration- Configuring routers on a network to allow communication between computers is something every business needs to allow for fluent file transfer, access, updates across the network, and maintaining a fluid flow of business. However, some ports are not utilized for such communication and are left open because of a lack of configuration. If you route these ports to open when they are needed and then close afterward, you can deter many attacks. You could also assign communications to happen over secure ports or encrypt the messages before and after transmission to deter MITM attacks.

Closing open ports, only letting specific IP addresses talk to others in the network, encryption, and adding firewalls are all great mitigation techniques and will keep some attackers at bay. However, as I stated first thing, it is impossible to stop all attacks. That is why having a plan beyond mitigation is so important. Also, having the systems within the networks keep logs of activity will help if an attack happens. Especially if it’s a honey pot. Then you can really mitigate risks and analyze where the network weaknesses are, although hiring a pen-tester would also help.

Thanks,

~Benless

Samuel Kellogg posted Nov 9, 2021 5:12 PM

Subscribe

Although the exploits still exist, security protocols have advanced since that time. However, the exploits have evolved along with the protocols. Money is not the solution to resolving security issues, but making sure your team is committed to protecting the network that they maintain.

Performing routine scans could help protect the network’s security and assist in keeping the network administrators up-to-date with the network. Maintaining a list of users and checking that each user is correctly assigned privileges and has no excessive access to files could also help maintain security.

Configuring the router to open only assigned ports could prevent hackers from utilizing unsecured access points to upload malicious software. A company could automate this process by creating a program that lists the ports and allows only privileged clients to access the network.

Order Solution Now

Our Service Charter

1. Professional & Expert Writers: School Assignment only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by School Assignment are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. School Assignment is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At School Assignment, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.