IT Network Security

Verified

Added on  2022/11/14

|7
|1334
|234
AI Summary
This document covers various aspects of IT network security, including high strength password, gateway, important hardware components, FTP transfer modes, address resolution protocol, antivirus programs, software integration, access control, difference between router and switch, software configuration, firewall, and requirements for installing Windows Server 2012. It also mentions the software packages and features supported by Windows Server 2012.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: IT NETWORK SECURITY
IT Network Security
Name of the Student
Name of the University
Author Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1IT NETWORK SECURITY
1. High Strength Password:
A high strength password defines that it will very much difficult to guess the
password means the effectiveness of the password is greater. Thus, a high strength password
can help to reduce the success chances of the brute force attack heavily.
The password strength requirement is important at the workplace for the user logins
as many of the users utilises a simple password for login at the system that they use in their
workplace. This type of passwords is very much easy to guess and can be easily cracked
through the brute force attack. Due to this factor high strength passwords are required for
protecting the organizational assets. Thus, high strength passwords must be a requirement at
the workplaces.
2. Gateway:
In the aspects of computer system, the gateway is considered as a part of networking
equipment that is utilised in telecommunicating purposes for allowing data to flow one
discrete network to another type of discrete network.
There are several of functionality that is provided by a gateway system. The gateway
actually acts as a gate among two networks. For this the gate can be the device such as
firewall, router and servers which are capable of traffic flow in and out of the respective
network.
3. Important Hardware Components:
The main five hardware components which need to be checked for ensuring the
compatibility while installing system software are the:
Processor
RAM
Document Page
2IT NETWORK SECURITY
Hard Disk Space
Network Interface Cards
Graphics Processing Unit Card
4. FTP Transfer Modes:
For the FTP transfer modes the three transfer modes are the Stream Mode, Block
Mode and the Compressed Modes.
Stream Modes: The stream mode is a default type of file transferring modes and this
technique works by chopping data within appropriate segments which is done by TCP.
Block Mode: Through the block mode data is transferred using FTP by preceding each of the
blocks in 3 bytes header. TCP is also leveraged in this case for transferring the data.
Compressed Mode: In this mode data is transferred using the FTP by compressing the data.
The run length encoding method is utilised in this case for preforming the compression.
5. Address Resolution Protocol:
The address resolution protocol is very much important concept that is utilised for
mapping the internet protocol address with a physical machine address and this physical
address must be recognised by the local network. It is also considered as a communication
protocol which is used for discovering the link layer address.
The ARP is important in this case as it is very much important to translate the host
software address to a specific type of hardware address. The ARP is utilised by a host for
assessing the hardware address of another host.
6. Currently Available Antivirus Programs:
In the current market the most secure and reliable antivirus programs are the:
Document Page
3IT NETWORK SECURITY
Norton Antivirus
Kaspersky Antivirus
McAfee Antivirus
Bitdefender Antivirus
7. Software Integration:
The process of software integration is considered as the process in which diverse
subsystems are combined together for creating a multifunctional system. Basically, this
defines that sub system components are aggregated within a single system so that it can be
ensured that all the subsystem functions as a whole system. Through the process of system
integration different types of software applications and computing systems can be linked with
each other functionally or physically.
8. Access Control:
The access control is a security technique that is used for regulating who can view and
access some specific resources within a computer environment. The main concept of access
control is minimising the security risk. The main principles of access control are depending
upon identification authentication and authorization. For satisfying these principles user and
the entities are evaluated for the login credentials. The login credentials include personal
identification numbers, passwords, biometric scans and various of security tokens which are
one of the most important authentication factors. Also, multifactor authentication can be
utilised in this case by combining two or more authentication factors.
It is very much important to ensure that access to some installed software and data is
restricted to some authorised peoples only for a better security of the data. For properly
securing this data and software principles of access control can be utilised in this case. From
the principles of access control authentication factors can be used in this case for

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4IT NETWORK SECURITY
distinguishing authorised and non-authorised personnel from accessing some sensitive data of
the organization.
9. Difference between Router and a Switch:
Router Switch
Routers are mostly used in small type of
network for connecting relevant devices to
the internet services.
Switches are mainly used for larger type of
network which can include a school or a
business. The switch provides connectivity
among many of the computer devices by
utilising a single local area network.
The router is currently functional on
network layer.
The switch is currently functional on data
link layer.
The main transmission mode in this case is
full duplex.
Transmission mode in this case can be full
or half duplex.
For the connection purpose IP address is
utilised by the routers.
Switch uses MAC address for the
connection purpose.
10. Software Configuration:
The software configuration can be done in many of the different ways. The main three
ways of software configuration are the concurrency management, version control and
synchronization. Through the concurrency configuration same file can be edited by different
type of persons at same time. Version control can be used for roll back to some previous
version of the software. The synchronization can be used in software configuration for
checking out more than one files or for copying an entire repository.
Document Page
5IT NETWORK SECURITY
11. Firewall:
In the context of network security firewall is considered as a security system which is
utilised for controlling and monitoring networking traffic which are outgoing and incoming in
nature. For creating a firewall predetermined security rules are applied. Through the firewall
a barrier can be established between internal and external networks which includes the
internet services.
The firewall is mainly used for designing a network security system through which
authorised access can be prevented from a private type of network.
13. 5 Software Package Supported by the Operating System:
The main software packages which is supported by the windows server 2012 are the
Adobe Dreamweaver, SAP, Wireshark, Windows media players and google chrome.
14. 5 Feature of Windows Server:
The main features of the windows server are the:
Hyper V 3.0
Changes in network virtualization
Management of IP addresses
PowerShell 3.0
CHKDSK changes
15. Four Requirement must be checked prior installing the Windows
Server 2012:
The four major requirement which need to be satisfied before the installation of
Windows Server 2012 are discussed in the following section.
Document Page
6IT NETWORK SECURITY
Processor: The processor must be a 64-bit processor with the base frequency of 1.4 GHz.
Ram: The minimum ram of the system must be the size of 512 MB.
Disk Space: For the successful installation of the Windows Server 2012 the minimum
amount of disk space should be around 32 GB and this is the minimum requirement of system
partition. There should be other space requirements also for other type of usages.
Other Requirements: The other important requirement are the DVD drives and internet
access.
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]