ABC Threads: Network Issues The headquarters of ABC threads, which is a large Te
ID: 3842509 • Letter: A
Question
ABC Threads: Network Issues
The headquarters of ABC threads, which is a large Textile Company located in Dallas, Texas has its network administrator, based in Houston. Mac is the network administrator and was conducting a routine maintenance on the network. While conducting the maintenance Mac came across a ticket opened by an employee. On further investigation Mac figured out that the complaint was that the employee was facing trouble in connecting to the network.
As the network administrator, Mac then began a trace in order to capture the communications from the employee (client IP host) that cannot connect to the rest of the company network or on the other side of the local router.
Additionally, the employee is able to communicate with all the other local systems without any issues except for the client IP host which is not able to connect.
What security considerations should be made or implemented in order to secure the communication of the network?
Explanation / Answer
The starting point for any security model is to assure that security standards and policies are in place to protect the system from external attacks and unauthorized internal usage. Securing computer resources, applications, and related data is an integral part of securing an enterprise. Securing a system involves implementing a set of procedures, practices, and technologies to protect the information technology (IT) infrastructure as well as software and associated data throughout the organization.
Utilizing private instead of public networking for internal communication is almost always preferable given the choice between the two. However, since other users within the data center are able to access the same network, you still must implement additional measures to secure communication between your servers.
Public key infrastructure, or PKI, refers to a system that is designed to create, manage, and validate certificates for identifying individuals and encrypting communication. SSL or TLS certificates can be used to authenticate different entities to one another. After authentication, they can also be used to established encrypted communication.