Design Unit 26 Design a small or home office network

Slides:



Advertisements
Similar presentations
Technology Requirements for Online Testing Online Training Module for the Smarter Balanced Assessment.
Advertisements

Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
The Remote Workplace Designing, deploying, and supporting the remote workplace environment Presented by: John Milhoan Information Technology Cooperative,
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Introduction to Fortinet Unified Threat Management
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
DVG-N5402SP.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Your storage on the ground; Your files in the cloud.
Wireless Networks Tamus, Zoltán Ádám
Computer Networks Unit 1 – BTA 3O Ms. Chytra. Introduction to Networks Most people working in an office with more than a few computers will be using some.
Module 11: Remote Access Fundamentals
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
Module 7: Implementing Security Using Group Policy.
Wireless and Mobile Security
Introduction TO Network Administration
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
What’s New in Fireware v WatchGuard Training.
Technology Requirements for Online Testing Training Module Copyright © 2014 American Institutes for Research. All rights reserved.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
SOHO Security Recommendations. Change default user/password Of the AP/router Typical  admin – admin  root – root  root – 1234  Admin - There are web.
Technology Requirements for Online Testing Training Module Please refer to the revision log on the last slide of this presentation, updated August.
Munix Bus WiFi Authentication, Log Management, Internet Security, Content Filter & VPN Service Internet Gateway & Business Intelligence
Security fundamentals
What’s New in Fireware v
Getting Connected to NGS while on the Road…
Barracuda SSL VPN 2012.
Chapter 3: SYSTEM SOFTWARE
Phase 4: Manage Deployment
Methods of Securing Data in Windows Networks
Lab A: Planning an Installation
Network Security Solution
Barracuda Web Security Flex
CONNECTING TO THE INTERNET
TECHNOLOGY GUIDE THREE
Configuration for Network Security
Business Risks of Insecure Networks
Security of a Local Area Network
Welcome To : Group 1 VC Presentation
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
IS4550 Security Policies and Implementation
HOW TO SETUP DLINK ROUTER?. STEP 1: You need to start from connecting the hardware.You need to unplug your modem from the power source. If you cannot.
Unit 27: Network Operating Systems
Cybersecurity Strategy
Digital Pacman: Firewall Edition
SPECIAL OFFER NetDefend UTM Firewall RRP€ 1063 SP€ 932 DFL-870
Chapter 6 Networks Communicating and Sharing Resources
Design Unit 26 Design a small or home office network
Design Unit 26 Design a small or home office network
Firewalls Routers, Switches, Hubs VPNs
Getting Connected to NGS while on the Road…
Level 2 Diploma Unit 11 IT Security
Connecting Remotely Winter 2014.
Assignment 2 Task 1 – Help Document.
Network hardening Chapter 14.
PLANNING A SECURE BASELINE INSTALLATION
Cybersecurity and Cyberhygiene
Tonight – Finishing off workshop
SBS 2008 – One year on David Overton
LM 5. Wireless Network Security
Presentation transcript:

Design Unit 26 Design a small or home office network HND in Computing and Systems Development

Timeline Week Activity 1 10 LO2 Devices, Bandwidth, Users 2 11 LO2 Applications, Scaling, Security 3 12 Assignment 2 LO2 4 13 LO3 Device installation 5 Introduction 14 LO3 Network installation 6 LO1 Capacity 15 LO3 Testing 7 LO1 Usage 16 L04 User access, maintenance 8 LO1 Security 17 LO4 Improvements 9 Assignment 1 LO1 18 Assignment 3 LO3 & 4 (mostly witness)

Learning outcome 2 Be able to design small or home office networks Devices: number of connected devices; anticipated participation Bandwidth: average load; peak load; local Internet availability; cost constraint Communications plan from lesson 2 Users: quality expectations; concept of system growth Applications: requirements eg security, quality of service Communications: considerations eg suited to devices, suited to users, lifestyle preferences, commercial requirements Scalable: considerations eg supporting device growth, supporting additional devices, bandwidth use trend change Security: considerations eg addressing policy, device participation, firewall rules, encryption preference

LO2 Assessment criteria 2.1 Design a small or home office network solution to meet a given specification 2.2 Evaluate the design and analyse user feedback

Previously …. You created a physical and logical network design There are still design decisions to be made Namespaces Operating systems Applications Scalability Security

Namespaces Names are needed for accounts, machines, shares, emails, directories What are the rules for naming Formulaic – eg T202Bay12 Thematic – eg Chewie, Leiai, Deathstar Functional – Staff007, Student40917 Descriptive – Staffshare, Studshare, T104Printer Can be difficult to stick to one type Often mixed, with one type dominant

Namespace example Student userIDs are their MIS number Staff userIDs are their SurnameInitial Email addresses are the UserID@domain name Home directories are UserID Servers are Starwars names PCs are BayNumberRoomNumber Printers are PrinterTypeLocation

Activity Decide on the namespace policies for MWS

Operating systems Choices for servers, desktops, laptops, mobiles, tablets Open source – Linux Proprietary Microsoft Apple Google Consider cost, support, features, technical knowledge Make a justified recommendation for MWS

Applications for MWS Office Manufacturing Payroll Accounting

Scalability How easy will it be for the network to grow with the business? Server file space and additional users Network ports Increased bandwidth More CNC machines Assess your design for scalability. How will it cope if the business grows to 4 times the size Employees Extra building Machines and devices

Security Wireless LAN No Default Settings – change SSID and Admin account Cell Sizing – modify transmitter power SSID Naming – use a meaningless name Cloaking – turn of broadcast SSID name MAC Filters – et allowable MAD addresses Encryption – use WPA2 Restricted IP – set IP ranges in DHCP Turn off unnecessary services

Password security Set minimum and maximum lengths Passwords should use three of four of the following four types of characters: Lowercase Uppercase Numbers Special characters such as !@#$%^&*(){}[] Require a number of unique passwords before an old password may be reused - say 24 Set a maximum password age - 60 days

Password security Account lockout threshold - 4 failed login attempts Reset account lockout after 30 minutes. Password protected screen savers should be enabled and should protect the computer within 5 minutes of user inactivity Rules that apply to passwords apply to passphrases which are used for public/private key authentication

Malware protection Anti virus Update OS and applications Firewalls Software in OS Built into routers Appliances

Security appliances Unified threat management (UTM) network firewalling network intrusion prevention  gateway antivirus (AV) gateway anti-spam VPN (virtual private network) content filtering load balancing data leak prevention  on-appliance reporting Easy to manage but comprehensive

Examples WatchGuard Firebox T10 Check Point 600 Appliance Easy to install Web interface Subscription updates Priced feature set (£300-700) Check Point 600 Appliance Can pay for management (£20/month) £300

Security for MWS Write a brief security and recommend any security products for MWS