securing_network_report (3).docx - Networking Security 1...

This preview shows page 1 - 5 out of 10 pages.

Networking Security 1 NETWORKING SECURITY (Name): Class (Course): Professor (Tutor): University: City and State : Date:
Networking Security 2 Networking Security Introduction To certify the availability of network and secure from malicious attacks, there are vital things that an organization must undertake. A secured network is less prone to vulnerabilities, user authenticity, and protection. It does not matter if an organization may have a complex or a simple network system, but how secure is it. To implement a secure network system there standardized protocols that should be followed(Mahmoud at el. 2015). These protocols include data security, which is achieved through cryptography and encryption techniques, secure file transfer protocol (SFTP), Secure Socket Layer (SSL), and Hypertext Transfer Protocol (HTTPS). In our cases we have to ensure the security measures on each protocol have been implemented i.e., secure routing, secure the server in OSLO 1, secure web server and other devices in this network; Solution and Summary Cisco packet tracer was used to create a logical representation of the system, as shown in figure 1. This is to simulate how the real network works, mapping all the devices connected to this network.
Networking Security 3 Figure 1: Network topology created in Cisco Packet Tracer: Security measurements to be configured: Securing the routing information on all routers Passive interfaces are configured on all channels of the router that are not connected to another router. This measurement is made to prevent routers from declaring their networks to
Networking Security 4 unwanted hosts. It is done with the command passive-interface <int> while in routing protocol configuration prompt.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture