Describe peer-to-peer networking, Computer Networking

Assignment Help:

You are requested to design a secure home or small scale network (Fig. 1) to satisfy the key concepts underlying computer and network security: confidentiality, integrity, availability, accountability and non-repudiation.

A small home network comprising: two personal computers (PC1 and PC2), a laptop and an ADSL Modem with wireless G Router. PC1 is directly wired to the Router using an RJ45 connections crossover cable, while PC2 and the laptop are connected by wireless adapters to the router. A mobile phone, iPhone 4S, can also connect to the internet using wireless technology. The technical specifications of the devices and the details of the operating systems are given in Table 1.

The network is peer-to-peer networking to allow the users to share files and printing and scanning facilities attached to PC1.

1. Identify possible weaknesses in the network infrastructure that may make it vulnerable to attacks, accidental and intentional misuses. Assess the assets, vulnerabilities and threats to the network. Carry out a risk analysis for the data asset.

2. What are the reasonable precautions, countermeasures and risk mitigation to provide/install in order to secure the network?

3. Visiting guests need to access and connect to the internet, using their private laptops, how would you devise/design procedures to protect the network and the information contained in the devices?

4. The network owner would like to convert PC1 to a file server and would like secure access to his files from outside the network using the internet, how would you change/design the network to satisfy this requirement?


Related Discussions:- Describe peer-to-peer networking

Explain about flow control, Q. Explain about Flow Control? - Signifies...

Q. Explain about Flow Control? - Signifies to ask the transmitter to stop/resume sending in data - Required when DTE to DCE speed > DCE to DCE speed - (Exampl

Work-sharing constructs in openmp, Work-Sharing Constructs A work-shari...

Work-Sharing Constructs A work-sharing construct distributes the implementation of the associated region between the members of the team that encounters it. A work-sharing cons

What is money laundering and how is money laundered, Question: a) (i)...

Question: a) (i) Describe the entire process of credit card processing, identifying the different steps and parties involved. (ii) What are the roles of the acquiring ban

Fiber modems, FIBER MODEMS: LAN methods are discovered to perform with...

FIBER MODEMS: LAN methods are discovered to perform within the same building. However most institutions have offices located far apart from one other. DISTANCE LIMITATION A

Security and reciprocity of RSA, Q. Security and Reciprocity of RSA? S...

Q. Security and Reciprocity of RSA? Security and Reciprocity of RSA - Kp and N are issued publicly. - Ks is kept secret. - Since the snooper does not know p and

Wireless access - computer network, Wireless Access Wireless access co...

Wireless Access Wireless access connecting end  systems ( that are often  mobile) into the network. Today there are two broad types  of wireless internet access(1) wireless an

Application of satellite communication , Application of Satellite Communica...

Application of Satellite Communication started with the installation and commissioning of STD- “B” Earth Station having 11m diameter antenna in 1982, Initially with to only three

Define the term - frame and packets, Define the term - frame and packets ...

Define the term - frame and packets Frames sum up packets. When a packet arrives at data link layer, the complete packet, header, data and remaining all, is used as data field

Method of ip multicasting or multicast ip address, Can you describe the con...

Can you describe the concept of IP multicasting or multicast IP address?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd