Various Aspects Of Network Security Computer Science Essay

Published:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

When a PC connect to a network, it is not acceptable to use anything except it complies with a policy defined; it includes anti-virus shield level, system update configuration. Whereas the pc is being analyzed by software, it will access all the resources that can resolve and update issues. Formerly when the business policy met, the computer is in the condition to access internet, sharing and other network resources, surrounded by the policies maintained and defined by NAC system. NAC (Network access control) is mostly Access to any network according to the person's profile. All the data which is used by specific user become restricted by NAC, as we have to implement such applications like; Anti-threat, Firewalls, Antivirus software.

Firewall:

Firewall is a component/part of computer network which is deliberately designed to block unauthorized control while allow official communications. It is a tool which is basically designed for the purpose of authorizes and rejects network transmissions according to its criteria. It can be in form of both hardware and software, or may be both hardware and software is use to install Firewall. Firewalls are commonly used to block unauthorized users and data interrupting from confidential networks, in particular intranets. All the data incoming or outgoing from intranet through firewall, each and every message is being checked and blocks those which do not meet security criteria.

According to the security concern, dedicated firewalls provide high level security which a software firewall does not provide the same. Because setting up and configuration of a software firewall can become more complicated, as well as most of user error generate issues. All these situations are preventable.

User Authentication:

Authentication means the procedure through determining what is happening and who which user is handleing of using it, declared to be. User authentication is commonly done in public and private like cafes,etc. where computer networks made (as well as the Internet connecton provides), Authentication is mostly done by the use of username and passwords which they own or given for the particular time. By the purpose of login it is defined that the user is authentic. As if user want to change password they should know the previous affirmed password. The flaw in this method is important because the username is visible to all and the passwords could be stolen, by chance exposed, or elapsed.

Virus Protection:

A virus is in a form of software or a file like a code whitch is designed to damage system files and pc. It can enter without and notice and authorization. Afterwards, that kind of file (Virus) will replicate itself and it is possible it cause severe damage. This problem can cause on any type of network either in client based or server based network, LAN, WAN,MAN,PAN. To avoid this virii from scattering, Homeusers which normally using Small Network like LAN they mostly use antivirus protection software and companies do the same.

Internet Access:

When the user connect to the Internet through any way it means internet access.In addition,using internet from private places (residences), there are many places which use internet include, libraries, cafes, where internet link are accessible. internet using across the world has been rising quickly.Weather the phase of spreading internet in most of the counties as it will become end in industrialize countries.

Task2

User in your company calls to report that she's unable to log on to e-mail. You respond with a couple of quick questions. Because you know that no one else is using the network right now, you cannot determine if the problem is unique to her machine or if the problem affects the entire network. Probing further, you also learn that she's unable to print. You decide this problem is probably easier to troubleshoot from the user's computer. Using the structured troubleshooting method, outline the things you must check and the questions you must ask when you arrive at the user's office. Based on the possible responses to your questions, describe the actions you will take to correct the potential causes.

Troubleshooting:

Troubleshooting is a method through witch the problem can be solved, often it is useful to repair futile products. It is a valid; most of the problems solved with the help of systematic search, so the application/product or process can be operate able. Troubleshooting for any purpose must be develop and maintain to handle multiple systems where the probability of upcoming problems is higher. General, the identification of troubleshooting is to diagnosis of "problem". Most of the problem described as symptom of breakdown, and due to troubleshooting process we can decide and resolve the problems.

According to Company:

Problem:

If there is a problem occurred to logon to email.

Questions:

May be your browser restrict the sites which you are looking to logon

Cookies must be enabled.

Unplugged internet connectivity.

Solution:

Go to your internet explorer setting afterwards, visit privacy and then allow your website address.

Enable cookies from internet options.

Check your internet connection, if it's unplugged; check your internet cable and fix it to connecter.

Problem:

Unable to print.

Question:

Is the printer driver installed?

Is problem occurred during printing process?

Check your printer adopter.

Solution:

Install the driver of your printer with the CD you have it with your printer.

Error might be given during printer because of the file might be effected from virus or might be corrupted.

Check and hookup the adopter in switch board conform; adopter must be ON.

Task3:

For an Internet-connected local area network (LAN) with which you are familiar (for example your company or college network): Determine whether the LAN is connected to the internet through a firewall. If so, determine the manufacturer and the model number of the firewall; what are the security features available in the Firewall. If no firewall is in place, research 3 Firewall products and report with its manufacturer and model number and the features (15 marks)

Give reasons for the appropriateness of a particular firewall for your organization(5marks)

Firewall:

Firewall is a component/part of computer network which is deliberately designed to block unauthorized control while allow official communications. It is a tool which is basically designed for the purpose of authorizes and rejects network transmissions according to its criteria. It can be in form of both hardware and software, or may be both hardware and software is use to install Firewall. Firewalls are commonly used to block unauthorized users and data interrupting from confidential networks, in particular intranets. All the data incoming or outgoing from intranet through firewall, each and every message is being checked and blocks those which do not meet security criteria.

BullGuard Internet Security:

Key Features:

Antivirus: Trojans and worms will be blocked.

Antispyware: It will block spywares like online fraud

Computer gets protected from unauthorized person means Hackers.

Spamfilter: Inbox and spam messages will be cleaned.

Backup: It also have an ability to secure system and important files from computer damage, computer crashes.

Support: Customer support is absolutely free and can contact 24/7.

User-friendliness: It's installation and usage is that much easy any one can use it.

Update: It will update automatically, and being up-to-date. Remove vulnerable files of internet security.

Minimun System Requirements:

OS : Windows 7 / Windows Vista / Windows XP (SP2 minimum)

RAM : 512 Mb RAM

HDD : 200 Mb free

Dial-up Internet Connection.

Comodo Firewall:

Key Features:

It will execute only known PC-safe applications

Prevent from viruses and malware initially.

Firewall can change software alerts accordingly.

User has to right to let the Comodo firewall know the description of the

application which the user .want to run except that none of the application can work.

Automatically up-to-date if the internet is enabled.

Warning popup windows will specify according to the level and type of threat.

Requirements:

128 MB RAM

210 MB hard disk space

Developer and model number:

Comodo INC.

5.1.37755.1159 is the modle number of Comodo Firewall.

Zone Alaram Firewall 2010:

Key Features:

System Requirements:

Task5:

Microsoft IPsec Diagnostic Tool assists Network administrators with troubleshooting network related failures, Download the utility from www.microsoft.com .

Run this diagnostic tool under the supervision of your tutor. Using this tool collect and report IPsec policy information on the system, trace collection for VPN, NAP client, Windows Firewall, Group policy updates, Wireless and System events, specific to your network. Your work needs to be evidenced byScreen shots. (15 marks)

Snapshots for IP Sec Diagnostic tool

Writing Services

Essay Writing
Service

Find out how the very best essay writing service can help you accomplish more and achieve higher marks today.

Assignment Writing Service

From complicated assignments to tricky tasks, our experts can tackle virtually any question thrown at them.

Dissertation Writing Service

A dissertation (also known as a thesis or research project) is probably the most important piece of work for any student! From full dissertations to individual chapters, we’re on hand to support you.

Coursework Writing Service

Our expert qualified writers can help you get your coursework right first time, every time.

Dissertation Proposal Service

The first step to completing a dissertation is to create a proposal that talks about what you wish to do. Our experts can design suitable methodologies - perfect to help you get started with a dissertation.

Report Writing
Service

Reports for any audience. Perfectly structured, professionally written, and tailored to suit your exact requirements.

Essay Skeleton Answer Service

If you’re just looking for some help to get started on an essay, our outline service provides you with a perfect essay plan.

Marking & Proofreading Service

Not sure if your work is hitting the mark? Struggling to get feedback from your lecturer? Our premium marking service was created just for you - get the feedback you deserve now.

Exam Revision
Service

Exams can be one of the most stressful experiences you’ll ever have! Revision is key, and we’re here to help. With custom created revision notes and exam answers, you’ll never feel underprepared again.