Develop a secure LAN or WAN for a hypothetical organization. What is security Forensic? How can an organization ensure that personnel does not become part of the security problem. Identify the...

1 answer below »
Develop a secure LAN or WAN for a hypothetical organization.
What is security Forensic? How can an organization ensure that personnel does not become part of the security problem.
Identify the standard organizations and the standards associated with LAN, MAN and WAN Security


Document Preview:

Two Full pages for each question. Develop a secure LAN or WAN for a hypothetical organization. What is security Forensic? How can an organization ensure that personnel does not become part of the security problem. Identify the standard organizations and the standards associated with LAN, MAN and WAN Security.






Two Full pages for each question. Develop a secure LAN or WAN for a hypothetical organization. What is security Forensic? How can an organization ensure that personnel does not become part of the security problem. Identify the standard organizations and the standards associated with LAN, MAN and WAN Security.
Answered Same DayDec 21, 2021

Answer To: Develop a secure LAN or WAN for a hypothetical organization. What is security Forensic? How can an...

David answered on Dec 21 2021
120 Votes
Develop a secure LAN or WAN for a hypothetical organization.
Solution:
First of all, it is significant to important to take into consideration the type of LAN that
one is going to develop for some organization ABC will be wireless LAN. Therefore, the
very first step is to ensure that the default name of network is change, i.e. SS
ID of
network. SSID needs to be changed since hackers are usually very well aware of by
default SSID of network. Furthermore, to ensure that hackers will have no way to find
out that particular SSID, it would be further essential that SSID doesn’t restrain any
particular information that would be helpful in concern to disclose the exact location or
name of an organization. The same thing must also be done in concern to the password of
an administrator on the AP/router and for these identical reasons, hackers are aware of
the default passwords for most of the brands of the software.
Furthermore, because an organization has no requirement for wireless access exterior to
the perimeter of premises, every router/AP will be placed within the workstation at the
center of operation floor. This would be useful due to the fact that it drastically reduces
the degree to which wireless signals spread out. Moreover, implementing MAC (Media
Access Control) over the network will be the next step in developing a secure LAN or
WAN for some hypothetical organization ABC. It is because MAC activates the
specification of which wireless PC cards become able to access the network and
consequently ensuring that all others are not permitted of access. It will be normally
pertinent to carry out a security check in same as just making use of software such as
Network Stumbler around the boundary of premises of an organization. It is done to
make certain the validity of data that hackers would have the possibility of access to
which in turn be followed by reconsideration of security measures such as adjusting
position of routers, in order to cope with specific security leaks.
Every organization that manages a network must develop security policies. LAN or
WAN can also be secured with firewall. Firewalls allow organizations to safely or
securely connect to the internet and protect data resources from illegal penetration. But its
main disadvantage is that its defensive design did not favor access to the internet based
remote networks.
While developing a secure LAN or WAN for some organization, one must completely
understand the requirements of that organization. For a secure network, developer must
work towards that networks which is as fast as possible and also handles the data
accurately and securely within a reasonable cost. Some of the questions that helps one
while developing a secure LAN or WAN
 Is this is replacing an existing installation or a new installation?
 If existing, what problems is organization facing?
 What are the needs?
 What is the data transfer rate?
 Should the network be of high speed in both directions or only in one direction?
 Further, what would be the levels of security?
 Areas that can be compromised?
Security policies must be evaluated at all levels of networking for developing secure
LAN or WAN.
Intranets Extranets
Remote Offices
Firewall
RAS Public Application
...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here