Describe peer-to-peer networking, Computer Networking

You are requested to design a secure home or small scale network (Fig. 1) to satisfy the key concepts underlying computer and network security: confidentiality, integrity, availability, accountability and non-repudiation.

A small home network comprising: two personal computers (PC1 and PC2), a laptop and an ADSL Modem with wireless G Router. PC1 is directly wired to the Router using an RJ45 connections crossover cable, while PC2 and the laptop are connected by wireless adapters to the router. A mobile phone, iPhone 4S, can also connect to the internet using wireless technology. The technical specifications of the devices and the details of the operating systems are given in Table 1.

The network is peer-to-peer networking to allow the users to share files and printing and scanning facilities attached to PC1.

1. Identify possible weaknesses in the network infrastructure that may make it vulnerable to attacks, accidental and intentional misuses. Assess the assets, vulnerabilities and threats to the network. Carry out a risk analysis for the data asset.

2. What are the reasonable precautions, countermeasures and risk mitigation to provide/install in order to secure the network?

3. Visiting guests need to access and connect to the internet, using their private laptops, how would you devise/design procedures to protect the network and the information contained in the devices?

4. The network owner would like to convert PC1 to a file server and would like secure access to his files from outside the network using the internet, how would you change/design the network to satisfy this requirement?

Posted Date: 3/19/2013 1:43:33 AM | Location : United States

Related Discussions:- Describe peer-to-peer networking, Assignment Help, Ask Question on Describe peer-to-peer networking, Get Answer, Expert's Help, Describe peer-to-peer networking Discussions

Write discussion on Describe peer-to-peer networking
Your posts are moderated
Related Questions
How to Perform Basic Switch Configurations Step : Complete basic configuration of switches S1, S2, and S3. Configure the S1, S2, and S3 switches according to the following

Wide Area Network WAN Wide  Area Network  ( WANs) connect larger geographic  areas such as  London the UK or the  world. In this types  of networks  dedicated transoceanic cab

State the reason for Intranet system breaks down Care must be taken to ensure that proper spare parts are available even after about five years of commissioning. In addition t

Ethernet Frame Format Consists of seven fields There is No mechanism for acknowledging received frames considered an unreliable medium

Q. Show the Class D and Class E Addresses? Class D and Class E Addresses Class D - reserved for multicast addresses Multicasting - transmission method which allo

When the computers on the network basically listen and receive the signal, they are referred to as passive due to they don't amplify the signal in any way.

Network Criteria - Performance - It is able to be measured by transit time and response time. Affected by type of medium, number of users and connected HW/SW - Reliability

- The project should include a web server, and an example webpage - Webserver should continue to accept multiple requests from client browser - Webserver should print out logs: how

What is TDM? TDM is a digital process that can be applied when the data rate capacity of the transmission medium is greater than the data rate needed by the sending and receivi