You work as a network administrator for a college located

Assignment Help Computer Network Security
Reference no: EM13464053

You work as a network administrator for a college located in your local city. Next door to the college is a new gated community. The residents have being moving in over the last few months. The college is running a converged network. The services that are present on the infrastructure include the phone system that all staff and faculty use to make calls (voice network). The data for students and faculty are also present on the infrastructure. The infrastructure includes a student-accessible wireless environment. You have gotten numerous complaints about call quality. Complaints have included the following:

• It has being intermittent and very hard to track down the issue

.• The trouble report states that the call quality is poor and that calls are breaking up.

• It was also stated that the overall network performance is very bad, and it started a few months ago but it is progressively getting worse.

• It takes a long time to access any files or the Internet. About 2 months ago, you implemented a network monitoring solution. You decided to check the logs as a result of a call you received from your CIO. The president of the college was on an important phone call and was not able to communicate as a result of the call quality. A review of your performance monitor logs revealed an enormous amount of traffic on the network. This excess network traffic was generated from the wireless LAN. Network traffic was destined for P2P (peer-topeer) Web sites for movie and music downloads. The logs further reveal very high traffic volume when the students, staff, and faculty were off campus. You just remembered that the university did not have a wireless access control solution in place. It appears that unauthorized usage of the wireless network is generating this traffic that is greatly affecting network performance. You reported this finding to the CIO, and she needs a resolution. Deliverable:

• Research and identify an enterprise wireless access control solution.

• Based on your research, write a report of 2-3 pages for your boss on your solution.

• Discuss authentication methods and encryption. Grading Criteria :Students should include the following:

• They should discuss any solution of their choosing. One such solution could be a company's unified wireless solution, which requires that all wireless access points be registered with a wireless controller. The wireless controller will then pass off registration requests to a radius server that leverages LDAP for authenticating against an access database (the same database that the students will use to access their resources on or off campus).

• With this implementation, the services set identifier (SSID) could be broadcast. However, access to wireless services would only be granted to those who provided a valid username and password that would be required before traffic is allowed to pass through to the Internet. Wireless encryption including, but not limited to, Extensible Authentication Protocol (EAP), Protect Extensible Authentication Protocol (PEAP), or Challenge Handshake Authentication Protocol (CHAP), among various other options, can be implemented to protect communication between the access point (AP) and the wireless devices.

Reference no: EM13464053

Questions Cloud

She is depressed what may be diagnosis what is her : mrs. oliver has pain and stiffness in the muscles and tendons of her shoulders legs and neck. she had osteoarthritis
Define erp what is the primary purpose of an erp system : 1.define departmental processes enterprise processes and inter-enterprise processes. describe their
Any gaps in this background will require you to make sound : this assignment consists of two 2 sections a written paper and a work breakdown structure wbs. you must submit the two
Answer the module review questions listed below these : 1.answer the module review questions listed below. these questions were chosen to demonstrate your understanding and
You work as a network administrator for a college located : you work as a network administrator for a college located in your local city. next door to the college is a new gated
Big data is a term used to describe the voluminous amount : big data is a term used to describe the voluminous amount of structured and semi-structured data generated by
Pick an organization that you know of or where you arewere : 1. list the horizontal and vertical levels of systems that exist in organizations.2.nbspdescribe at least five steps
You are a respected and tenured it professor and you also : you are a respected and tenured it professor and you also manage the university computer operations that consist of a
Explain various roles and responsibilities of case manager : writenbspa 1050- to 1750-word case management overview paper that includes the followingnbspnbspmiddot discuss the

Reviews

Write a Review

Computer Network Security Questions & Answers

  Problem on ethereal lab

The basic tool for observing the messages exchanged between executing protocol entities is called a packet sniffer. As the name suggests, a packet sniffer captures ("sniffs") messages being sent/received from/by your computer

  Question about communication

Communication is valuable; a main part of this is the ability to provide management the information they required, when they require it.

  What is the single most important new technology

What is the single most important new technology that has affected digital forensics in the last five years and why?

  What will be your plan to enhance your network security

Assume that you are the network security officer of one company, what will be your plan to enhance your network security (firewall? VPN? Content level protection? Or combination of them?) More details about your security infrastructure design will..

  Organization-severely lacks in appreciating need security

Organization that severely lacks in appreciating the need for security or a company that depends on equipment that is outdated and services from contractors that are low quality? Why?

  Strategies and recommendations to the cio

Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization and draft a one page Executive Summary that details your strategies and recommendations to t..

  Determine the legal and ethical considerations

Determine the legal and ethical considerations for investigating and prosecuting digital crimes and analyse data on storage media and various file systems

  Calculates the hash value

Alice is able to intercept the message, and generates an alternative message that has a hash value that collides with Bob's original hash value. Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's or..

  Explain prudent policy to protect datafrom corruption-theft

The opposing require to protect this data (from corruption and theft) which typically means controlling access to much/all of the data? What policy is prudent here?

  Explain cross site scripting attack

Explain Cross Site Scripting attack

  How to manage the file system encryption keys

Setup a 64MB encrypted file system in a file on a Flash drive so that it can be used with the cryptmount command.

  Find sequence of courses to satisfy all prerequisites

Bob loves foreign languages and wants to plan his course schedule for the following years. He is interested in the following nine language courses: LA15, LA16, LA22, LA31, LA32, LA126, LA127, LA141.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd