Networking Security 1NETWORKING SECURITY (Name):Class (Course):Professor (Tutor):University:City and State :Date:
Networking Security 2Networking SecurityIntroductionTo certify the availability of network and secure from malicious attacks, there are vital things that an organization must undertake. A secured network is less prone to vulnerabilities, user authenticity, and protection. It does not matter if an organization may have a complex or a simple network system, but how secure is it. To implement a secure network system there standardized protocols that should be followed(Mahmoud at el. 2015). These protocols include data security, which is achieved through cryptography and encryptiontechniques, secure file transfer protocol (SFTP), Secure Socket Layer (SSL), and Hypertext Transfer Protocol (HTTPS). In our cases we have to ensure the security measures on each protocol have been implemented i.e., secure routing, secure the server in OSLO 1, secure web server and other devices in this network;Solution and SummaryCisco packet tracer was used to create a logical representation of the system, as shown in figure 1. This is to simulate how the real network works, mapping all the devices connected tothis network.
Networking Security 3Figure 1: Network topology created in Cisco Packet Tracer:Security measurements to be configured:Securing the routing information on all routersPassive interfacesare configured on all channels of the router that are not connected to another router. This measurement is made to prevent routers from declaring their networks to
Networking Security 4unwanted hosts. It is done with the command passive-interface <int> while in routing protocol configuration prompt.