Riordan Network Security Recommendations: Hardware & Software Report

Verified

Added on Ā 2019/10/18

|5
|923
|161
Report
AI Summary
This report provides a detailed analysis and recommendations for securing Riordan Manufacturing's network from electronic threats. It begins by advocating for the use of Virtual Private Networks (VPNs) over public internet connections, emphasizing their inherent security advantages through encryption and data integrity checks. The report then explores various VPN security protocols, including IPsec, SSL/TLS, and others, to enhance security. A comparison of Local Area Networks (LANs), Wide Area Networks (WANs), and wireless technologies is presented, highlighting their differing physical characteristics and underlying technologies. The report also outlines the key components of data communication networks, such as servers, clients, transmission media, and various hardware devices like NICs, hubs, switches, routers, and gateways. The report concludes with a list of references used in its creation. This report serves as a valuable resource for understanding and implementing robust network security measures.
Document Page
RIORDAN NETWORK SECURITY RECOMMENDATIONS 1
Riordan Network Security Recommendations
NAME
August 08, 2016
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
RIORDAN NETWORK SECURITY RECOMMENDATIONS
Hardware and Software Required to Secure Our Network From Electronic Threats
We chose Virtual Private Network (VPN) over public Internet under intranet site-to-site
for Riordan Manufacturing.
VPNs by default are more secure than the underlying public network as they "use
advanced encryption protocols and secure tunneling techniques to encapsulate all online data
transfers " ("What Is A VPN? - WhatIsMyIP.comĀ®", 2016) and also data integrity checks (VPN
SECURITY February 2008, 2008).
VPNs cannot make online connections completely anonymous, and thus we would like to
increase the security, for which we include the following as applicable ("Virtual private
network", 2016):
1. Internet Protocol Security (IPsec)
2. Transport Layer Security (SSL/TLS)
3. Datagram Transport Layer Security (DTLS)
4. Microsoft Point-to-Point Encryption (MPPE)
5. Microsoft Secure Socket Tunnelling Protocol (SSTP)
6. Multi Path Virtual Private Network (MPVPN)
7. Secure Shell (SSH) VPN
Comparison of Local Area Networks (LANs), Wide Area Networks (WANs) and wireless
technologies
The technologies to realize a LAN, WAN and a wireless network are different as they
have different physical characteristics.
Document Page
RIORDAN NETWORK SECURITY RECOMMENDATIONS
LANs use Ethernet, cables, and network switches for hardware. A switch can be
connected to a router, cable modem, or ADSL modem for Internet access ("A Review of the
Basic Components of a Local Area Network (LAN)", 2016). For protocol, it uses TCP/IP.
One way of WAN is based on leased lines connected by a router on each end. Another way is
using circuit switching or packet switching. Protocols include Packet over SONET/SDH, MPLS,
ATM and Frame Relay. The hardware includes Network Access Points (NAP), backbones and
routers.
For Wireless Personal Area Networks (PANs) Bluetooth, IEEE 802.15, and IrDa Cable
replacement technologies are used. For Wireless LAN, IEEE 802.11, Wi-Fi, and HiperLAN are
used. And for global coverage, CDPD and Cellular 2G, 2.5G, and 3G and LTE are used ("Types
of Wireless Networks", 2016)
Concepts and Building Blocks of Data Communication Networks
In general, a data communication network includes the following components ("Network
Fundamentals Study Guide - Webopedia", 2016):
1. Server: It is a computer or device that manages network resources.
2. Client: A client is a computer/application that requests a server for some resource.
3. Transmission media: The type of physical system used to carry a communication signal
from one system to another. Examples of transmission media include twisted-pair cable,
coaxial cable, and fiber optic cable, wireless etc.
4. Network Interface Card (NIC): An expansion board you insert into a computer so the
computer can be connected to a network.
5. Hub: It connects multiple computers or other network devices together ("What is Hub?",
2016).
Document Page
RIORDAN NETWORK SECURITY RECOMMENDATIONS
6. Switch: A device that filters and forwards packets between LAN segments.
7. Router: A router is a device that forwards data packets along networks.
8. Gateway: A node on a network that serves as an entrance to another network.
9. Bridge: A device that connects two local-area networks (LANs), or two segments of the
same LAN that use the same protocol
10. Access Point: A hardware device or a computer's software that acts as a communication
hub for users of a wireless device to connect to a wired LAN.
11. Modem (modulator-demodulator): A modem is a device or program that converts
electrical signal to physical signal and vice-versa.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
RIORDAN NETWORK SECURITY RECOMMENDATIONS
References
A Review of the Basic Components of a Local Area Network (LAN). (2016). Networkbits.net.
Retrieved 8 August 2016, from http://networkbits.net/lan-components/local-area-network-lan-
basic-components/
Groth, D. & Skandier, T. (2005). Network+TM Study Guide: Exam N10-003, 4th Edition. John
Wiley & Sons.
Network Fundamentals Study Guide - Webopedia. (2016). Webopedia.com. Retrieved 8 August
2016, from http://www.webopedia.com/quick_ref/network-fundamentals-study-guide.html
Tanenbaum, A. & Wetherall, D. (2011). Computer networks (p. 3). Boston: Pearson Prentice
Hall.
Types of Wireless Networks. (2016). Computernetworkingnotes.com. Retrieved 8 August 2016,
from http://www.computernetworkingnotes.com/wireless-networking-on-cisco-router/types-of-
wireless-networks.html
Virtual private network. (2016). Wikipedia. Retrieved 8 August 2016, from
https://en.wikipedia.org/wiki/Virtual_private_network#Security_mechanisms
VPN SECURITY February 2008. (2008) (1st ed., p. 5). Retrieved from
http://www.infosec.gov.hk/english/technical/files/vpn.pdf
What Is A VPN? - WhatIsMyIP.comĀ®. (2016). Whatismyip.com. Retrieved 8 August 2016, from
https://www.whatismyip.com/what-is-a-vpn/
What is Hub?. (2016). Computerhope.com. Retrieved 8 August 2016, from
http://www.computerhope.com/jargon/h/hub.htm
Wireless. (2016). Wikipedia. Retrieved 8 August 2016, from
https://en.wikipedia.org/wiki/Wireless
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]