Inaicates a required elt FORUM DESCRIPTION 5-6 Protecting information resources
ID: 354636 • Letter: I
Question
Inaicates a required elt FORUM DESCRIPTION 5-6 Protecting information resources as well as data communication delivery is one of the greatest concerns for information systems managers, Information can be delivered anywhere and anytime. Some common threats to resources and delivery are rogue access points, DOS attacks, social engineering, viruses, worms and phishing. As an information systems manager, you will want to address these issues and maintain control providing rapid responses as often as needed. One avenue is to use CERT teams, implement fault tolerance, password strategies, encryption measures and many others discussed in the text What types of networks have you used? What are some experiences you have had concerning the common threats listed above? How does a network topology affect data communication? Your discussion(s) should he addressed from a managers perspective as well as personal experiences. Please post your intial response wth no less than 250 words early duning the week (Tst post) so that others will have time to review them for commenting Aher revewing your peers posts, make one reply that consists of no lees than 50 words (2nd post Identity Theft Prevention-ID Theft Facts and Figures Duration (220) identityTheft Prevention-Don't Beco. CaT-STAY WITH M Cick Save Draft to ae a druft of this messnge Click Subenit te suhmit thExplanation / Answer
The network is a when two or more computers are connected with each other, communicate with each other and share their resources. A topology is a structure or arrangement of the network which may be physically or logically interconnected.
The different types of a network according to the area of operation are listed as follows:
1.PAN-Personal area network
2.LAN-Local area network
3.MAN-Metropolitan area network
4.WAN-Wide area network
5.SAN-Storage area network
6.CAN-Campus area network
The type of network according to communication type with advantages and disadvantages and risks associated are as follows:
Network Type
Advantages
Disadvantages
Threats
Server based-All computers are connected to a central unit.
Central computer manager’s entire network. It is suitable for a large network and security can be maintained.
It is very expensive and needs a dedicated central computer which may overflow and slow down the operations over a period of time.
Dos attack as anybody with even a limited knowledge of network can attack the network.
Digital threats-This can be by a boot virus, polymorphic virus, worms, macros, data threat, bombs etc
Packet sniffing, packet spoofing, sniffer attack etc.
Peer to peer-A systems connected to each other.
All systems are connected to each other like peer 1 is connected to peer 2 and n number of systems are connected and each has his own storage. It is suitable for a small network
Data is not shared fully; no central security system can control data. It has limitations on a number of connections but if administered successfully is a better option.
Hybrid Network-It is a combination of both servers based and peer to peer.
It is most suitable and has the advantages of both the systems
It is quite complex and is an expensive option.
Network security methods:
As I manager we come across many threats to name a few ways to handle them are as follows:
1.Inside attacks are almost 70% of the total threats because insider has complete knowledge of the network.
2.Attack from an outsider is basically from competitors looking for our important information or attempting to invade our systems. These could be a threat to availability, confidentiality, integrity, and authenticity.
These can be in form of above-mentioned threats through cookies, packet sniffing and packet spoofing, sniffer attack etc.
The Network topology is of three different types as follows:
1.Common bus: A single wire is connected to each node and each node has to be monitored and can be very slow.
2.Star Bus: Each node is connected to a central traffic controller. The communication travels from each node to the traffic controller and then from traffic controller to another node. The virus attacks can be controlled by the traffic controller.
3.Ring Bus: In this system, each node receives many messages, analyses the messages relevant to it and moves the designated one. Here there is no central control system. The threat is that some node and messages may not be read as they do not match the assigned parameters.
To sum it up a manger in security system has to be vigilant and upgrade their systems continuously, there is no perfect network or topology.
Network Type
Advantages
Disadvantages
Threats
Server based-All computers are connected to a central unit.
Central computer manager’s entire network. It is suitable for a large network and security can be maintained.
It is very expensive and needs a dedicated central computer which may overflow and slow down the operations over a period of time.
Dos attack as anybody with even a limited knowledge of network can attack the network.
Digital threats-This can be by a boot virus, polymorphic virus, worms, macros, data threat, bombs etc
Packet sniffing, packet spoofing, sniffer attack etc.
Peer to peer-A systems connected to each other.
All systems are connected to each other like peer 1 is connected to peer 2 and n number of systems are connected and each has his own storage. It is suitable for a small network
Data is not shared fully; no central security system can control data. It has limitations on a number of connections but if administered successfully is a better option.
Hybrid Network-It is a combination of both servers based and peer to peer.
It is most suitable and has the advantages of both the systems
It is quite complex and is an expensive option.