Monday, January 7, 2013

my work in the project report


Network Layout:

The network layout for the IT department will be organized in a STAR TOPOLOGY design as the company want depending on their business “The design of networks should only be as complex as the business needs it to be (Simmons,2011). We have the router which the ports connected to the Server, Printer and the switches using .The diagram below illustrates the design using Packet Tracer:
There are 3 LAN ports that are connected to the router. The first connect the router to the server while the second port is between the router and the printer and the final port connects the router to the switch. Both the server and the printer have a static IP (192.168.5.5 for the server and 192.168.3.3 for the printer). However, we have putted an IP address for the PC’s and Laptops that the range for those devices is from 192.168.1.1 to 192.168.1.9

 

 

Security policy:

 

In today's high technology environment, organizations are becoming more and more dependent on their information systems. The public is increasingly concerned about the proper use of information, particularly personal data. The threats to information systems from criminals and terrorists are increasing. Many organizations will identify information as an area of their operation that needs to be protected as part of their system of internal control. So our aim is protecting all application systems which are based on computers and manufacturing systems and networks. Our tool to achieve our goals is security. So to achieve our goal we should apply policies. Here some of the policies we can use:
User Information authentication-
It is very important to protect the user himself before protecting any software or Hardwar where the user represents the main assets of a company or firm even home land security so if the user is protected from any intruder or attacker or even sniffer the user won’t be in line of danger. Simple things the user could follow to keep himself protected from attackers:-
1-User must make a monthly change of his password.
2-User should not make a simple (1,2,3,4,5,6) password.
3-User shouldn’t make password known to a possible attacker.
These were few examples of User authentications method passwords are very sensitive information it’s the only thing that makes the computer knows that the user is who he’s clamming to be so if the attacker knows that information then there’s nothing stopping the computer from letting the attacker, some antivirus programs keep your computer protected from attackers that it would be hard to get in your system to steal your password or information.
Anti-virus –
“It is very important that your computer has antivirus software running on your machine. By having an antivirus program running, files and emails will be scanned as you use them, download them, or open them. If a virus is found in one of the items you are about to use, the antivirus program will stop you from being able to run that program and infect yourself. (Lawrence, 2004)

No comments:

Post a Comment