Tuesday, May 28, 2019
Essay --
1. Security is paramount when dealing with a company network and the services that gravel the network. The services that will use the company network horde are data storage, internal applications, and many desktop computers. When securing networks you must take into account, any exposure of an access, in see protocols, any open ports, and any type of broadcasts that whitethorn show a weakness to the network. Many types of prevention are available. A user access must be setup this allows the company users permission to apply the network. The advantage of this, it limits the access to files, applications, and nodes that an individual does not have permission to access. You will want to setup filtering and port blocking on your network comp mavennts that you will be using such as, routers, firewalls, switches, and virus protectors. Make sure you install the latest patches and updates. Any idle services must be disabled and secured for prevention.2. The Atbash Cipher was the one I c hose to use. A Jewish rebel sect most likely created this cipher the name of the sect is Essenes. They used this cipher to protect significant masses from the act of following a different religion. My initial message as followsHello Professor, I am using the Atbash Cipher for my message. Originally, the code was the Hebrew alphabet, entirely later changed to operate with the English alphabet. Virtually it takes the letters and orientates them to another letter, such as the A is a Z the B is a Y. The textual matter that was encoded and decoded was as followsSvool Kiluvhhli, R zn fhrmt gsv Zgyzhs Xrksvi uli nb nvhhztv. Lirtrmzoob, gsv xlwv dzh gsv Svyivd zokszyvg, yfg ozgvi xszmtvw gl lkvizgv drgs gsv Vmtorhs zokszyvg. Erigfzoob rg gzpvh gsv ovggvih zmw lirvmgz... ...secure as not to allow access from the outside. More things that utilize the network is various types of hardware, for example network adapters, hubs, switches, routers, access points, modems, and cables. I have to ma ke sure that all of these devices remain secure at all times. Another of the options that I have to be concerned with is would I like to setup a peer-to-peer network or a client-server network for my home. One of the inadequacy I have in using is securing my laptop in the home, I the laptop sitting on my desk for use. If I was to put it in a laptop case when it is not is use, it would be one solution. Secondly, if I secure the laptop to the desk with a cable and lock for added security it would take a little time in trying to steal it. Thirdly, I could remove the laptop from sight and put in a secure location that only my family and I know it is secure.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.