Free Essay

It 255 Assignment 8

In:

Submitted By dawisin
Words 362
Pages 2
Network Hardening Assignment 8
The Internet is vulnerable to myriads kinds of attacks, due to:
1. Vulnerabilities in the TCP-IP protocol
2. No global flow control mechanisms
The above two problems lead to many TCP exploits and the dreaded DDoS attacks.
We have devised a method of incrementally upgrading the network infrastructure at the transport level that solves the above problems and makes the network significantly more resilient to attacks, particularly the DDoS attack.
The approach uses "hardened routers" -- routers that can do simple cryptographic functions (encryption, signatures) on all packets flowing int he network, as well as to participate in a hierarchical control network. We show how incremental deployment of such routers can make the Internet safer.
Like all things dynamic, change is inevitable. Such is the case with your network environment. Upgrades and modifications to the network architecture can sometimes expose (or create) security holes. As such, it is important to consistently evaluate the
Making a Business Case for Network Hardening
Hardening a network does not always translate into spending large quantities of money. However, money will be required in some form or fashion. Whether that means spending it on new hardware, software, or man hours really depends on what needs to be addressed. It may include all of the above. The time may come when a cost/benefit analysis will be required by those in charge before hardening activities can move forward. As such, it's prudent to point out some of the non-technical benefits of network hardening for the business as a whole.
A Stable Work Environment for Employees
The more time you spend hardening your network, the safer it will be for not only your customers but your employees as well. As mentioned in Part 1, internal threats as just as prevalent as external threats. Your Human Resources department will undoubtedly have confidential personal information on file for every employee. This could include social security numbers, information on dependents, emergency contacts, home addresses and telephone numbers, etc. That information will most likely be stored in an electronic format somewhere on your network. Keeping that information safe and secure from prying eyes should be a priority.

Similar Documents

Premium Essay

Assignment

...readings and material covered in the class lecture you have been provided information about IP subnet breakdowns. For this assignment the students will answer questions related to IP subnet ID determination concepts and perform analysis and calculation for the scenarios provided. Chapter 18 in the textbook provides practice question and answers for this type of procedure. Be sure to review those questions and methods before completing this assignment. For each of the five questions, fill in the table for the IP subnets given IP address. Also, if the numbers of subnets is greater than eight, show the first seven and the last subnet. Be sure to show your work in the space provided or on separate pages. Questions are on the next pages. Questions: 1. IP Address: 192.168.254.37/25 Octet | 1 | 2 | 3 | 4 | Mask | 255 | 255 | 255 | 128 | Magic Number | | | | 128 | Classful Network/Subnet Zero | 192 | 168 | 254 | 0 | First Nonzero Subnet | 192 | 168 | 254 | 128 | Next Subnet | | | | | Next Subnet | | | | | Next Subnet | | | | | Next Subnet | | | | | Next Subnet | | | | | Next Subnet | | | | | Next Subnet | | | | | Broadcast Subnet | 192 | 168 | 254 | 255 | Invalid—Used by Process | 192 | 168 | 254 | 256 | 2. IP Address: 172.16.44.139/26 Octet | 1 | 2 | 3 | 4 | Mask | 255 | 255 | 255 | 192 | Magic Number | | | | 64 | Classful Network/Subnet Zero | 172 | 16 | 44 | 0 | First Nonzero Subnet | 172 |...

Words: 553 - Pages: 3

Premium Essay

Finance Assignment

...Assignment 1 Economics for Management – GSB728 Due on: 07/06/2010 University of New England Victor M. Ayala Lancheros Student # 220070594 Word Count: 1,152 Economics for Management – GSB728 PART 1 Question # 1 Demand for Bus Services: D1 = 3,500 – 350P1 + 25P2 + 2Y Supply for Bus Services: S1 = 100P1 The market equilibrium point is obtained where S1 = D1 therefore, 100P1 = 3,500 – 350P1 + 25P2 + 2Y Substituting for Price of Taxi trips (P2 = $1,000) and Income (Y=$50,000), then: 450P1 = 3,500 + 25(1,000) + 2(50,000) P1= $285.55 per Bus Trip (Equilibrium Price). Question # 2 In order to find the equilibrium quantity, the Price per Bus Trip obtained above (P1 = $285.55) is plugged into either the Demand (D1) or Supply (S1) equations so that: D1 = 3,500 – 350P1 + 25P2 + 2Y D1 = 3,500 – 350(285.55) + 25(1,000) + 2(50,000) D1 = 28,555 Bus Trips per year (Equilibrium Quantity). Or Alternatively: S1 = 100P1 S1 = 100(285.55) = 28,555 Bus Trips per Year (Equilibrium Quantity). To illustrate the results in questions 1 and 2, a schedule for the Supply (S1) and Demand (D1) functions is provided below. As shown on the Assignment 1 Page 2 of 9 Economics for Management – GSB728 schedule, the market equilibrium is reached where supply and demand intersect and the market clears. P1 (Dollars per Trip) D1 (Trips per Year) S1 (Trips per year) 0 128,500 0 50 111,000 5,000 100 93,500 10,000 150 76,000 15,000 200 58,500 20,000 250 41,000 25,000 285.55 28,555 28,555 300 23,500 30,000 350...

Words: 1461 - Pages: 6

Premium Essay

Subnetting Assistiance

...8 equal subnets using the following IP range: 205.32.16.0/24. They have offices in 5 different locations: 1. New York with 17 workstations 2. Chicago with 15 workstations 3. Los Angeles with 20 workstations 4. Phoenix with 11 workstations 5. Boston with 22 6th site anticipated. NOTE: There are only 6 locations, requiring 6 subnets of EQUAL size. This does NOT mean you will use the entire /24 block of addresses. In other words, there WILL be enough space for 2 more subnets (8 equal subnets total) but we WILL NOT allocate the remaining space to sites. Simply document the beginning and ending address of the unused space for the final 10 points of the project. Here is what we know: 205.32.16.0 /24 belongs to ACME 205.32.16.x = the CURRENT Network Portion (unusable address as it defines the network beginning) /24 means we have 256 total available addresses (explained below) 205.32.16.255 is the Broadcast IP Resulting a USABLE IP RANGE OF 205.32.16.1 – 205.32.16.254 (254 usable hosts) /24 defines our subnet and the total addresses we CAN use. Let’s understand subnets… SUBNETS – Define the addresses we can USE /24 means we are using 24 of the 32 possible bits in the subnet mask. This can be determined by this: 255.255.255.0 = 11111111.11111111.11111111.00000000 OR 8bits.8bits.8bits.0bits = 24 total bits out of 32 possible bits Each 1 in the subnet equals a bit and each octet is a field of potentially 8 bits Each placement of a bit indicates a numeric...

Words: 1080 - Pages: 5

Premium Essay

Week 1 Assignment: Referencing Peer Reviewed Studies

...[pic] NORTHCENTRAL UNIVERSITY ASSIGNMENT COVER SHEET Student: THIS FORM MUST BE COMPLETELY FILLED IN Follow these procedures: If requested by your instructor, please include an assignment cover sheet. This will become the first page of your assignment. In addition, your assignment header should include your last name, first initial, course code, dash, and assignment number. This should be left justified, with the page number right justified. For example: |BTM7001-8 1 | Save a copy of your assignments: You may need to re-submit an assignment at your instructor’s request. Make sure you save your files in accessible location. | | | |BTM7001-8 | | | | | |Advanced Scholarly Writing |Week 1 Assignment: Referencing Peer Reviewed Studies | | | | Faculty Use Only ...

Words: 1138 - Pages: 5

Premium Essay

Subnet Assignment

...CMIT 265 Subnetting Assignment Subnetting Assignment: 215.251.145.0/24 subnetted to 46 subnets and provide information for subnets #1, #4, #5, and #46 Step 1: Convert the network address to binary 215.251.145.0/24 is a class C address with a subnet mask of 24 bits of ones First Octet 128.64.32.16.8.4.2.1, 128=1, 64=1, 32=0, 16=1, 8=0, 4=1, 2=1, 1=1 215 = 11010111. Second Octet = 128.64.32.16.8.4.2.1, 128=1, 64=1, 32=1, 16=1, 8=1, 4=0, 2=1, 1=1 251 = 11111011 Third Octet = 128.64.32.16.8.4.2.1, 128=1, 64=0, 32=0, 16=1, 8=0, 4=0, 2=0, 1=1 145 = 10010001 Fourth Octet = 0 11010111.11111011.10010001.00000000 Network address Step 2: Convert Subnet mask into binary First Octet 128.64.32.16.8.4.2.1, 128=1, 64=1, 32=1, 16=1, 8=1, 4=1, 2=1, 1=1 255 = 11111111 Second Octet 128.64.32.16.8.4.2.1, 128=1, 64=1, 32=1, 16=1, 8=1, 4=1, 2=1, 1=1 255 = 11111111 Third Octet 128.64.32.16.8.4.2.1, 128=1, 64=1, 32=1, 16=1, 8=1, 4=1, 2=1, 1=1 255 = 11111111 Forth Octet = 0 11111111.11111111.11111111.00000000 Subnet mask Step 3: Calculate the subnets required 46 subnets required per instructions: Use the formula 2 to the power of X to find out how many bits to borrow from the subnet mask. 2^5= 32 and is insufficient to cover the subnets required so, 2^6 = 64 x is 6 we need 6 bits from last octet of the subnet mask to cover our subnets. I need 46 subnets but I have total 64 available so that leaves me with; 64-46 = 18 extra subnets to use at a later date. Original...

Words: 1170 - Pages: 5

Free Essay

Signal and System

...ECE 2610 Introduction to Signals and Systems Spring Semester 2011 Instructor: Dr. Mark Wickert Office: EB-292 wickert@eas.uccs.edu http://www.eas.uccs.edu/wickert/ece2610/ Phone: 255-3500 Fax: 255-3589 Office Hrs: Required Text Optional Software: Grading: M&W 12:45-1:15am, M&W 3:05pm-4:00pm, others by appointment. James McClellan, Ronald Schafer, and Mark Yoder, Signal Processing First, Prentice Hall, New Jersy, 2003. ISBN 0-13-090999-8. The student version of MATLAB 7.x available under general software in the UCCS bookstore. Other specific programming tools will be discussed in class. 1.) 2.) 3.) 4.) 5.) 6.) Graded homework worth 20%. Quizzes worth 15% total Laboratory assignments worth 20% total. Mid-term exam worth 15%. Final MATLAB project worth 10%. Final exam worth 20%. Topics Text 1.1–1.4 2.1–2.9 3.1–3.9 4.1–4.6 5.1–5.9 6.1–6.9 7.1–7.10 8.1–8.12 9.1–9.10 10.1–10.6 11.1–11.11 12.1–12.4 Weeks 0.5 1.0 1.0 1.0 1.5 1.5 (exam) 1.0 2.0 1.5? 0.5? 1.5? 1.5 (project) 1. Course Overview and Introduction 2. Sinusoids 3. Spectrum Representation 4. Sampling and Aliasing 5. FIR filters 6. Frequency response of FIR filters 7. z-Transforms 8. IIR Filters 9. Continuous-Time Signals and Systems 10. Frequency Response 11. Continuous-Time Fourier Transform 12. Filtering, Modulation, and Sampling Note: that topics 9–12 will most likely only be overviewed at the end of the semester....

Words: 276 - Pages: 2

Free Essay

Video Segmentation

...Digital Media Computing Assignment 1: Video Segmentation ------------------------------------------------- HAND IN DATE: 31st October 2010 WEIGHTAGE: 25 Marks ------------------------------------------------- Student Name Name | Student ID | Robert Johnson | 102122913 | Table of Contents User Guide 2 Video Selection 2 Video Playback and Segmentation Execution 2 First Implementation 2 Second Implementation 3 Third Implementation 4 First Implementation 6 Part A: 50% Split 6 Part B: Custom User Percentile 7 Second Implementation 7 Part A: Uniform N-Splits 7 Part B: Histogram Equalization 8 Part C: Average Frames 8 Third Implementation 9 Order of processing 10 Problems Encountered 10 User Guide All three implementations can be accessed by opening the index.html page. The implementations have been tested to be work on Firefox 15 with any resolution above 1024x768. Due to the extensive use of HTML5 canvas, several legacy browsers may not be able to run the web page successfully. Video Selection Once the page has been loaded, the user has an option to select from 3 different videos. Two of which are stored locally. Please ensure to place both file ‘tracker.ogg’ and ‘video.ogg’ in the same folder as the index page. The user can click on either button 1, 2, or 3 to swap between different videos to experiment on. The video can be seen when user clicks on the play/pause button. Video Playback and Segmentation Execution It is important...

Words: 3318 - Pages: 14

Premium Essay

Disruption Management in the Airline Industry

...related to disrupted routes in the initial schedule, and routes are deleted based on a selective criterion related to aircraft. 1 Contents 1 Introduction 4 2 Problem Description 6 2.1 Stakeholders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.1.1 Airports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.1.2 Aircraft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.1.3 Passengers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2.2.1 Disruptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2.2.2 Operating Costs . . . . . . . . . . . . . . . . . . . . . . . . . . ....

Words: 15844 - Pages: 64

Premium Essay

Ip Addressing

...there were just 32-bit numbers as IP addresses – no classes or obvious distinction between network and host bits. It was assumed that the first eight bits were the network. This only offered 254 networks. Many organizations didn’t need 16,777,214 host addresses, and over time it was obvious that we needed not only different sizes of networks, but more of them. In 1981 a new way to partition the bits of an IP address was put into use. In order to be able to easily see which bits were network and which were host, a class system was defined. (Sharma, 2011) The IANA has set rules that are followed worldwide to allow international use of the internet and intranets. Using the knowledge that an octet can only show numbers between zero and 255, classes were developed for the numbers that designate a network, which has nodes - or devices - within it. Class A networks are ones that the first octet starts with binary digit zero, so 00000001 to 01111111 or 1 to 127. It is accepted that 127.0.0.0 is not used as an IP network. It is only used within your computer, often as a loopback address to ascertain whether TCP/IP is properly installed and functional. As part of the definition of a...

Words: 954 - Pages: 4

Premium Essay

Itech 1005

...ITECH1002 Assignment 1 Lecturer’s Name: Sanjay Jha ATMC Sydney Assignment has to be submitted online on Moodle on or before the due date. SUBJECT CODE: ITECH1004 SUBJECT TITLE: NETWORK OPERATING SYSTEM ASSIGNMENT NUMBER AND TITILE: 1- NETWORKING ASSIGNMENT WORD COUNT (IF APPLICABLE): 3274 DUE WEEK: WEEK-6 LAB/TUTORIAL GROUP: LAB 2 LECTURER: SANJAY JHA TUTOR: SANJAY JHA STUDENT ID (FedUni): 30314027 STUDENT FAMILY NAME: KIRAN STUDENT GIVEN NAMES: RIJAL I declare that this assignment is my individual work. I have not worked collaboratively nor have I copied from any other student’s work or from any other source except where due acknowledgement is made explicitly in the text, nor has any part been written for me by another person. I realize that the penalties may ensure for late submission or any other breaches of assignment rules. 1 20 December 2015 ITECH1002 Assignment 1 Lecturer’s Name: Sanjay Jha Kiran Rijal Student ID: 30314027 Contents 1. INTRODUCTION ................................................................................................................... 3 1.1 VIRTUALIZATION .................................................................................................................... 3 1.2 NUMBER SYSTEM .................................................................................................................. 3 CONVERSION .....................................................

Words: 3418 - Pages: 14

Free Essay

Unit 8 Assignment 1 Video Summary 6

...Unit 8 Assignment 1 Video Summary 6 VIDEO #3.01 Topics: * Microsoft Operating Systems * Other Operating Systems Terms: * DOS – Disk Operating System is an acronym for several closely related operating systems that dominated the IBM PC compatible market between 1981 and 1995 * UNIX - is a family of multitasking, multiuser computer operating systems that derive from the original AT&T UNIX. * Command Line Interface - also known as command-line user interface, console user interface, and character user interface (CUI), is a means of interacting with a computer program where the user issues commands to the program in the form of successive lines of text (command lines). Summary: The video taught me that everything that was developed after series 9x of operating systems is built on the NT platform. Also the NT did not have a device manager or a hardware wizard as well as not supporting plug and play. I also learned that Linux was developed by a Finnish student named Linus Torvalds. This information is not really useful for me its old information that for me has no value unless I want to be a technology historian. Unit 8 Assignment 1 Video Summary 6 VIDEO #3.02 Topics: * Partitioning * Creating Partitions * Create/Delete Partitions Terms: * Partition - In personal computers, a partition is a logical division of a hard disk created so that you can have different operating systems on the same hard disk or to create the appearance...

Words: 819 - Pages: 4

Premium Essay

Explain How Quartiles, Percentiles and the Correlation Coefficient Are Used to Draw Useful Conclusions in a Business Context.

...! ! Course Unit No. Unit Name Unit code Batch Student Assignment Covering Form Course/Unit Information Pearson (Edexcel) BTEC Level 5 Higher National Diploma Unit 6 Business Decision Making D/601/0578 J65-1403/E65-1403 ! Name Phone Skype ! ! Instructor Information Anil Ahluwalia +971 52 905 9904 anilbaljit anil@westford.org.uk ! ! ! Email Assignment Information Full/ Part Assignment Date Assignment Issued Part 11/03/2013 Tasks-1&2: 29/03/2014 ! Date Assignment Due ! ! Student Information (To be filled by the student prior submitting the assignment) Name Westford Student ID Edexcel Student ID Email Tsion Girma Birru tsn_grm@yahoo.com Date of Submission March 29,2014 All the submissions to be done through e-front LMS, no email or other format will be accepted.Student Assignment covering form is an integral part of the assignment document and should be submitted along with all submissions. ! ! Student Declaration ! ! I, Tsion Girma Birru hereby confirm that this assignment is my own work and not copied or plagiarized. It has not previously been submitted as part of any assessment for this qualification. All the sources, from which information has been obtained for this assignment, have been referenced as per Harvard Referencing format. I further confirm that I have read and understood the Westford School of Management rules and regulations about plagiarism and copying and agree to be bound by them. ! ! ! ! ! ! !...

Words: 3533 - Pages: 15

Premium Essay

Technology

...Unit 3 IP Subnetting IP NETWORKING IP SUBNETTING ASSIGNMENT 1. How many bits of mask are required to provide 30 host addresses? 5 bits of mask are required to provide a 30 host address. 2. How many networks will be created using a 255.255.0.0 given a class A IP network? There will be around 16 million networks created using a 255.255.0.0 Class A IP address. However, the number of these networks will depend on the available licenses per IP address. 3. What would be the dotted decimal equivalent of the slash notation of /30? 255.255.255.252. 4. What would be the dotted decimal equivalent of the slash notation of /8? 255.0.0.0 5. What would be the dotted decimal equivalent of the slash notation of /17? 255.255.128.0 6. What would be the dotted decimal equivalent of the slash notation of /12? 255.240.0.0 7. Given 9 bits of mask for the host portion, how many host addresses are available? 23 8. Given 13 bits of mask for the host portion, how many host addresses are available? 19 9. Given 3 bits of mask for the host portion, how many host addresses are available? 7 10. Given 8 bits of mask for the network portion, how many subnets are available? 255 11. Given 4 bits of mask for the network portion, how many subnets are available? 11 12. Explain the reasoning behind the concept of “subnet Zero” Subnetting breaks down a given network address into smaller subnets. Coupled with other technologies...

Words: 370 - Pages: 2

Premium Essay

Texas State Sales Tax Forecasting

...MBA 643-17 April - May 2015 Problem-Solving Skills Assignment One Texas State sales Tax Forecasting Due Date May 22, 2015 A major source of revenue in Texas is a state sales tax on certain types of goods and services. Data are compiled and the state controller uses them to project future revenues for the state budget. One particular category of goods is classified as Retail Trade. Four years of quarterly data (in millions) for one particular area of southeast Texas follows. Quarter | YEAR 1 | YEAR 2 | YEAR 3 | YEAR 4 | 1 | 218 | 225 | 234 | 250 | 2 | 247 | 254 | 265 | 283 | 3 | 245 | 255 | 264 | 289 | 4 | 292 | 299 | 327 | 356 | 1. Compute seasonal indices for each quarter for year 5 based on CMA. Seasonal indices can be calculated using this formula: (sum of average value for Qx divided by number of data). Therefore seasonal indices for quarters in year five will be: Q1 = (88.148 + 88.51 + 87.98)/3 = 88.21% Q2 = (98.68 + 98.51 + 97.29)/3 = 98.16% Q3 = (97.46 + 98.31 + 96.17)/3 = 97.31% Q4 = (115.35 + 114.17 + 117.30)/3 = 115.6% 2. Deseasonalize the data and develop a trend line of the deseasonalized data. Quarter | Sales | Index | Deseasonalised data | 1 | 218 | 0.8821 | 247.1 | 2 | 247 | 0.9816 | 251.6 | 3 | 245 | 0.9716 | 252.2 | 4 | 292 | 1.1561 | 252.6 | 5 | 225 | 0.8821 | 255.1 | 6 | 254 | 0.9816 | 258.8 | 7 | 255 | 0.9716 | 262.5 | 8 | 299 | 1.1561 | 258.6 | 9 | 234 | 0.8821 | 265.3 | 10 | 265 | 0.9816 | 270...

Words: 584 - Pages: 3

Free Essay

Lab 6 Securing a Server

...leave the text red so that your instructor will be able to find your responses easily. When pasting an image, please replace the red text with the image. Guidelines for the Week 6 Lab Securing a Server and Securing Infrastructure Services Total Points: 35 • Students will be using a login to the Microsoft virtual labs. Assignments (Using Labs 8 and 9 of the Microsoft virtual labs): 1. Perform Lab 8 Exercise 1 (3 points). [pic] [pic] 2. Perform Lab 8 Exercise 2 (3 points). >[pic] [pic] 3. Perform Lab 8 Exercise 3 (3 points). [pic] [pic] 4. Perform Lab 8 Exercise 4 (3 points). [pic] [pic] 5. Perform Lab 9 Exercise 1 (3 point). [pic] [pic] 6. Perform Lab 9 Exercise 2 (4 point). [pic] [pic] 7. Perform Lab 9 Exercise 3 (4 points). If you have problems, then try the following: Give Student01 Dial In permissions, disable the Windows Firewall on Server01 and 02, and finally, under Advanced TCP/IP Properties of IPv4, give Server01 and Server 02 a second IP address and use that second IP address on the other server as your destination VPN address. [pic] [pic] 8. Perform Lab 9...

Words: 343 - Pages: 2