Ntc 362 Week 5 Individual Assignment
3536 words
15 pages
Final PaperNTC/362
Introduction
Kudler Fine Foods has established that they want to design a WAN to tie three different locations together and make the internal network in each store a Wireless Local Area Network. Then, they are requesting Voice Over Internet Protocol to each multi store network. Various protocols make all this happen. Transfer Control Protocol and Internet Protocol are the foundation of data transfer. TCP is the protocol that the internet, email and ftp highly rely on. Without TCP/IP there would be no internet, email or FTP. Two other protocols designed to process packets throughout the network are X.25 and Frame Relay. For this scenario Frame Relay will be used so I will not provide a brief description about …show more content…
Special hardware will be implemented when using WPA2 to work properly. WPA2 has the option to use a pre-shared key inside the company and 802.1x or you have the option to use a dynamic key, which a dynamic key will be used. Each of the employee’s laptops will run Kaspersky Anti-Virus. Kaspersky runs the update program inside Kaspersky whenever there is an update to be made. These updates usually come in files around 800kbs which will not congest the network. Kaspersky comes with a built in firewall inside the software. To keep the cost down, a contract will be made with the Kaspersky Company so we can legally keep the software on our systems. F-Secure will be a software package available for Smart phones inside the company and will be mandatory for connecting to the wireless router.
Kaspersky Firewall
Kaspersky includes a set of rules incorporated inside its software that allows you to set specific parameters inside specific software programs. You can create several permissions and block rules for each particular piece of software. Kaspersky will monitor specific IP octets to access specific programs and allow connections to be made on specific ports. If an attacker tries to connect to port 23, the firewall will not allow it because the Telnet session will be disabled. This will also leave a footprint behind allowing the network administrator to track the attackers IP address which will be saved in a log.
Security Analysis
The network systems