...Unit 1 Assignment 2: Impact of a Data Classification Standard Course Name & Number: NT2580 Introduction to Information Security Learning Objectives and Outcomes * You will learn how to determine the impact of a data classification standard on an organization's IT infrastructure. Assignment Requirements You are a networking intern at Richman Investments, a mid-level financial investment and consulting firm. Your supervisor has asked you to draft a brief report that describes the “Internal Use Only” data classification standard of Richman Investments. Write this report addressing which IT infrastructure domains are affected by the standard and how they are affected. In your report, mention at least three IT infrastructure domains affected by the “Internal Use Only” data classification standard. Your report will become part of an executive summary to senior management. Required Resources None Submission Requirements * Format: Microsoft Word * Font: Arial, Size 12, Double-Space * Citation Style: Chicago Manual of Style * Length: 1–2 pages * Due By: Unit 2 Self-Assessment Checklist * I have identified at least three IT infrastructure domains affected by the “Internal Use Only” data classification standard. * In my report, I have included details on how those domains are affected. Internal Use Only The term “internal use only” is a term that refers to information or data that could also include communications are...
Words: 835 - Pages: 4
...TYPES OF COMPUTER NETWORKS Maninder Kaur professormaninder@gmail.com What is Network? • A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. • The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams. Different Types of Networks • Depending upon the geographical area covered by a network, it is classified as: – Local Area Network (LAN) – Metropolitan Area Network (MAN) – Wide Area Network (WAN) – Personal Area Network (PAN) Local Area Network (LAN) • A LAN is a network that is used for communicating among computer devices, usually within an office building or home. • LAN’s enable the sharing of resources such as files or hardware devices that may be needed by multiple users • • Is limited in size, typically spanning a few hundred meters, and no more than a mile • Is fast, with speeds from 10 Mbps to 10 Gbps • Requires little wiring, typically a single cable connecting to each device • Has lower cost compared to MAN’s or WAN’s Local Area Network (LAN) • LAN’s can be either wired or wireless. Twisted pair, coax or fibre optic cable can be used in wired LAN’s. • Every LAN uses a protocol – a set of rules that governs how packets are configured and transmitted. • Nodes in a LAN are linked together with a certain topology. These topologies include: – Bus – Ring – Star ...
Words: 611 - Pages: 3
...protocol operates at the Physical and Data Link layers of the OSI, performing any type of serial interface. This technology was developed at an attempt to resolve some of the communication problems that the other protocols would not. There was an increased need for higher speeds, an increased need for larger bandwidth efficiency, an increase in intelligent network devices that lower protocol processing, and the need to connect LANs and WANs. The Frame relay evolved passed the X.25 as a less careful, but less burdensome protocol designed to transmit packets across a network. (Horton, 2010) Frame relay is known all around the world in many different networks. There are many terms that describe and refer to Frame relay and Wide Area Networking in telecommunications. These terms are also noted when referring to Local Area Networking as well. The table below describes these terms. (Horton, 2010) Table 1 – Frame Relay Terms CIR Committed Information Rate – the minimum level of throughput as guaranteed by the service provider. DCE Data Circuit-terminating Equipment – a device on the service provider's network that connects to the customer's DTE. DTE Data Terminal Equipment – a device at the customer's site that connects to the service provider's DCE. DLCI Data Link Connection Identifier – a 10-bit number used...
Words: 1228 - Pages: 5
...Networking When you have two or more computers connected to each other, you have a network. The purpose of a network is to enable the sharing of files and information between multiple systems. The Internet could be described as a global network of networks. Computer networks can be connected through cables, such as Ethernet cables or phone lines, or wirelessly, using wireless networking cards that send and receive data through the air. LAN - Local Area Network A LAN connects network devices over a relatively short distance. A networked office building, school, or home usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span a group of nearby buildings. InTCP/IP networking, a LAN is often but not always implemented as a single IP subnet. In addition to operating in a limited space, LANs are also typically owned, controlled, and managed by a single person or organization. They also tend to use certain connectivity technologies, primarily Ethernet and Token Ring WAN - Wide Area Network As the term implies, a WAN spans a large physical distance. The Internet is the largest WAN, spanning the Earth. A WAN is a geographically-dispersed collection of LANs. A network device called a routerconnects LANs to a WAN. In IP networking, the router maintains both a LAN address and a WAN address. A WAN differs from a LAN in several important ways. Most WANs (like the Internet) are not owned by...
Words: 719 - Pages: 3
...Acme Manufacturing Network Plan Ann Johnson IT/242 October 23, 2011 David Edwards Acme Manufacturing Network Plan Acme Manufacturing needs a new network plan implemented for corporate, three distribution centers in Chicago, Phoenix, and New York, and is expecting to expand with a new facility in China. A successful network design provides future growth within the organization. Meetings are scheduled weekly in the main Atlanta Headquarters conference room with the facilities from Phoenix, New York, Chicago, and China attending via telecommunications. The network plan will include the type of cabling needed for each facility, the equipment used to connect the different facilities, and the installation of Voice over IP (VoIP) and Virtual Local Area Networks (VLANs). Security measures are needed including firewalls and a backup plan. The lines required to carry the traffic on the network are leased T1 lines and a satellite connected overseas. T1 leased lines are used for the Atlanta, Phoenix, New York, and Chicago offices. China connects through a satellite service. A Virtual Private Network (VPN) connects wireless users to their designated department through mobile devices. Routers are used to direct communication between LANs and are needed at each department. Voice over IP (VoIP) has opened possibilities for more interactive communication across WAN networks. VoIP bypasses the need of conventional telephone hardware by transmitting voice over the existing data line...
Words: 1193 - Pages: 5
...program to have the right equipment, hardware, security, network, and adding upgrades especially in the security area, network, and the information data on Kedler Fine Food loyal customers. Technical Architecture for Kudler Fine Foods Like any other architecture project it is important to have a good development plan on how to achieve it. It is necessary to develop the technical architecture within a reasonable time, because any delays can have a negative effect on monetary constrains and resources to Kudler Fine Foods. Each business location of Kudlers Fine Foods has workstation of Point of Sale which uses a Local Area Network to be connected using a Hub working on a half-duplex. The process is that whenever Kudler Fine Foods makes sales form its loyal customers, the workstations of the Point of Sale sends hat information to the Local Area Network and transmit that data to a server that can monitor the purchase of the loyal costumer. The problem is when a customer makes a purchase with a credit card the performance of the point performance diminishes because of the slow connectivity and upon verifying the network does not have a solid security. Without a proper security the information of the costumers can be jeopardize none authorized users or hackers. The technical architecture will help develop a faster communication to the workstation of the Point of Sale and their Local Area Network to be more...
Words: 807 - Pages: 4
...to Fluke Networks’ EtherScope™ Network Assistant to bring visibility to missioncritical networks The weight of the world is on The New York Times Company to not only deliver up-to-the-minute news and information around the planet via The New York Times and The Boston Globe, but also to distribute news through their other news communications media. The company operates 21 regional newspapers, 8 network-affiliated television stations, three magazines and two New York City radio stations along with a news photo and graphic services group. Needless to say, a network hiccup could bring this vital flow of information to a screeching halt – something The New York Times ’ IT group keeps an ever-watchful eye on to prevent. The IT group works out of the Shared Services Center in Norfolk, Virginia, where personnel manage accounting, benefits, human resources and IT services for the company’s nearly 5000 employees. All of Shared Services’ data rides on two frame relay networks that serve 6800 nodes and provide internet access for the entire company’s operations. With an eye toward being more proactive, the IT group has developed a more automated problem detection process utilizing HP OpenView. This allows them to see trends early on and gauge utilization on all circuits. If hardware goes down, they know about it before it causes a problem at the site. Although they’re on the right track integrating their network analysis tools, they still need to see more information on the network. The network...
Words: 1074 - Pages: 5
...to provide end users with a well maintained network storage that would be easily accessible from any location while maintaining a secured connection. To provide an environment to minimize the use and maintenance of local servers, server space, connectivity, and redundancy. | 2. Intended clients or customers The intended client or customer would be the end users of the company, this end users vary from medical office assistants, physicians, office managers, nurses, administrative assistants, receptionist, finance dept, insurance dept, medical records, and materials management to name a few. | 3. Business objective statementThe business objective is to minimize the cost of maintaining 40+ servers on a specified region, meanwhile providing for data storage, redundancy, and fast access to network files that would be housed in the cloud. | 4. Application architecture descriptionThe application architecture would consist of building a system that in scalable for future growth, it would possibly include emails servers, data servers, instant messaging. | 5. Information provided to the clientsThe clients would be notified of the changes being made via email, departmental meetings, and online training in order to be able to find their files and incur minimal downtime. | 6. Basic requirementsSome of the basic requirements we would be looking at would be the cost effectiveness of using cloud services, the capacity of our current networks to be able to maintain a feasible connectivity...
Words: 3576 - Pages: 15
...ABSTRACT When designing project for a top level enterprise-wide telecommunications network for ABC Company (ABC) with worldwide offices in the U.S. (San Francisco, Detroit, Washington, Indianapolis, Tampa), Europe (Paris, Liverpool), Japan (Tokyo), and South America (Sao Paulo), is engaged in the development of audio and video special effects for the entertainment and advertising industry. It is imperative as team member to work diligently and closely to deliver a quality project on time for the company. We [must] keep in mind as well to meet some technical customer requirements, keep the network managed and running at its best performance, and ensure that the network is pretty secure. The design for this network begins by designing the local network, at each of the provided locations, and then connecting all the offices together in an effective Wide Area Network (WAN) Design. The network design will include both voice and data sharing. Microsoft Project will be used as a tool to organize and manage the complete project, and it will include budget and schedule. We also must remember that the main design centers are in San Francisco, Detroit, Paris, Tokyo, and Sao Paulo, with Corporate Headquarters lodged in San Francisco. The remaining offices are used as sales offices. Consider the company to operate on a 24 hours a day and 7 days a week basis, because it is global. It has been said, that with the advent of globalization, WAN has become a major artery for communication...
Words: 1405 - Pages: 6
...Kudler Fine Foods. First in these points is that of the hardware, and the software that is needed to make sure that the electronic threats to their system is taken care of. Next is the Local Area Networks (LAN), and also the Wide Area Network (WAN) not forgetting the wireless aspects of it all. Then finally in these points is that of the building blocks of the system. These building blocks are switches, routers, and also cabling. Hardware, and Software In the aspects of Kulder Fine Foods we don’t want to forget the important aspect of the chances of electronic threats to the system. One big way that this can be done is by isolating the electronic information. This may seem like a of course kind of thought, but it is one we don’t want to forget. Making sure we include hard walls, locked doors, and even the possibility of safes. The best time to secure the system is before there is any problems which is by understand the way they could try to attach the system. We could install something like Netware to help protect the sensitive information on the system. LAN/WAN, and Wireless Technology Next on the areas of networks such as LAN Local Area Network, and also WAN Wide Area Network, also...
Words: 743 - Pages: 3
...Riordan Manufacturing’s network configuration consists of infrastructure within four locations. The headquarters is in San Jose, CA and the other three are in remote in Albany GA, Pontiac MI, and Hangzhou, China. The investigation and detail required to demonstrate transition of WAN from Legacy to current design shows sources for which any problems may exist. Contributing information about the WAN includes the VoIP data router, satellite between headquarters and China, and T-1 connections between headquarters to both Georgia and Michigan. Many new technologies are available to help propel a business forward including Riordan. Many consider VoIP to be a new technology that has provided new uses for telephone systems. It has seen much technological advancement since its inception. In the past, one gave little consideration to transporting voice over data circuits. One currently treats voice traffic, because of its high growth rate, as an important application to be given special consideration. VoIP is a natural progression and has changed how consumers and business use the telephone system. (voip.com, 2006). The voice switches allow connection to analog lines providing a 10/100 Base Twisted Pair (TP) Ethernet connection. With the addition of a VoIP switch, the telephone system provides private dialing, caller id, interoperability with other VoIP systems, and the ability to manage the telephone system over the Internet using a web browser. Features provided with VoIP switch...
Words: 1100 - Pages: 5
...involves computing over a network, where a program or application may run on many connected computers at the same time. It specifically refers to a computing hardware machine or group of computing hardware machines commonly referred as a server connected through a communication network such as the Internet, an intranet, a local area network (LAN) or wide area network (WAN). Any individual user who has permission to access the server can use the server's processing power to run an application, store data, or perform any other computing task. Therefore, instead of using a personal computer every-time to run the application, the individual can now run the application from anywhere in the world, as the server provides the processing power to the application and the server is also connected to a network via internet or other connection platforms to be accessed from anywhere [33]. All this has become possible due to increasing computer processing power available to humankind with decrease in cost as stated in Moore's law. In common usage the term "the cloud" is essentially a metaphor for the Internet.[1] Marketers have further popularized the phrase "in the cloud" to refer to software, platforms and infrastructure that are sold "as a service", i.e. remotely through the Internet. Typically, the seller has actual energy-consuming servers which host products and services from a remote location, so end-users don't have to; they can simply log on to the network without installing anything...
Words: 377 - Pages: 2
...NT1210 Wide-Area Networking Unit 7 Lab 7.1: Distance Considerations Exercise 7.1.1 It’s impractical for an organization to own the entirety of a WAN because it would be very expensive for the company to run all the lines necessary and to pay for all the labor to keep the WAN up and running. It is less expensive for an organization to own a LAN so that’s why it is favorable for them to maintain ownership of it. Exercise 7.1.2 The further a signal is transmitted on a LAN lessens the strength of the signal. To transmit signals over a long distance access points are required which also decreases signal strength. Exercise 7.1.3 Media | Infrastructure | Summary | UTP | Phone lines | Uses a customized infrastructure for performing two jobs, one being phone and the other being data transfer | Coaxial | Television cable | This type of media is used for transmission of television from a company to a customers house. | Fiber-optic | Cellular, Broadband | Uses a customized infrastructure to run dedicated connections; this is a costly option | Electric power lines | Electricity, Broadband | This type of media can be used with Broadband over Power Lines (BPL), making use of the extensive infrastructure in place already. | Exercise 7.1.4 Media | Summary | Satellite | Transmits from ground to space then back to where the transmission is required to be sent | WiMAX (Worldwide Interoperability for Microwave Access) | Used for transmitting a wireless network that could...
Words: 743 - Pages: 3
...copy of the map being played on installed onto their local computer. Every time the gamer moves the direction of their character, their data is sent from their machine to their router, and then out past the demarc point. On the other side of the demarc is where the service provider picks up the data and moves the data from local network to the central office (better known as the local exchange). The central office then sends the data over the MAN (metro area network) or WAN (wide area network) to continue the data to game server. If the data hasn’t reached the server yet (for example the gamer lives in Michigan and the server is in California) the data will be passed over the core (also known as long-haul) network which connects MANs and WANs of different geographies together. On the off chance the Michigan gamer decided to play on a European server then his data would be transferred overseas to the European server over the Ocean network. Once the gamer’s data reaches the game server, the game server acknowledges and sends the data out to all the other gamers in the match, each taking the necessary routes over the previously explained networks to reach all the players. In...
Words: 398 - Pages: 2
...Abstract Networks are nowadays the core of modern communication. Computer or data network is a telecommunication network allowing computers to exchange data, files and also allow remote computing, that is, giving authorized users the ability to access information stored on other computers found on the same network. This exchange of data is carried through network links which are established between nodes using either cables or wireless media. Most information in computer networks is carried in packets, thus, increasing the difficulty to manage and secure the network from hazards such as security threats. Undesired packets may easily harm the systems. To counter such infected packets, firewall has been implemented with packet filters which check...
Words: 2254 - Pages: 10