Describe peer-to-peer networking, Computer Networking

You are requested to design a secure home or small scale network (Fig. 1) to satisfy the key concepts underlying computer and network security: confidentiality, integrity, availability, accountability and non-repudiation.

A small home network comprising: two personal computers (PC1 and PC2), a laptop and an ADSL Modem with wireless G Router. PC1 is directly wired to the Router using an RJ45 connections crossover cable, while PC2 and the laptop are connected by wireless adapters to the router. A mobile phone, iPhone 4S, can also connect to the internet using wireless technology. The technical specifications of the devices and the details of the operating systems are given in Table 1.

The network is peer-to-peer networking to allow the users to share files and printing and scanning facilities attached to PC1.

1. Identify possible weaknesses in the network infrastructure that may make it vulnerable to attacks, accidental and intentional misuses. Assess the assets, vulnerabilities and threats to the network. Carry out a risk analysis for the data asset.

2. What are the reasonable precautions, countermeasures and risk mitigation to provide/install in order to secure the network?

3. Visiting guests need to access and connect to the internet, using their private laptops, how would you devise/design procedures to protect the network and the information contained in the devices?

4. The network owner would like to convert PC1 to a file server and would like secure access to his files from outside the network using the internet, how would you change/design the network to satisfy this requirement?

Posted Date: 3/19/2013 1:43:33 AM | Location : United States







Related Discussions:- Describe peer-to-peer networking, Assignment Help, Ask Question on Describe peer-to-peer networking, Get Answer, Expert's Help, Describe peer-to-peer networking Discussions

Write discussion on Describe peer-to-peer networking
Your posts are moderated
Related Questions
Explain the term- congestion The average queue size over the last cycle and the current cycle is calculated. This value is the threshold. By averaging over two cycles instead o

Can you define the WAN and LAN Interface in Routers?

What is the disadvantage of a star topology? One major drawbacks of star topology is that once the central hub or switch get damaged, the whole network becomes unusable.

10Base-T: Twisted Pair Ethernet Most popular standard simplest to install and reconfigure Star topology LAN utilize UTP cable no need for AUI It supports data rag

Disadvantages of OSPF protocol i) Single Area ii) High Hardware Requirements iii) Troubleshooting

Write the Generic Name of the OSI Layer a)  The figures below illustrate, side by side, the OSI 7-layer reference model and the Internet protocol stack. Inside each box represen

Multiplexing Multiplexing is the set of techniques that allows simultaneous transmission of multiple signals across a single  data like. It  is methods  for efficient utiliza

MIME The Multipurpose Internet Mail Extensions While  the message  headers described in are satisfactory for sending  ordinary  ASCII text they are  not sufficiently Reich for

What is Single-mode fiber Single-mode fiber is competent of higher bandwidth and greater cable run distances than multi-mode fiber. For the reason that of these characterist

how does the near/far effects infulence TDMA system?what happen CDMA system? what are countermeasures in TDMA system/