Computer Networking > Research Paper > Research Paper > ITT Tech Flint - IS 220 Project Part 2 Network Design Project Part 2 (All)

Research Paper > ITT Tech Flint - IS 220 Project Part 2 Network Design Project Part 2

Document Content and Description Below

ITT Tech Flint - IS 220 Project Part 2 Network Design On the first part of the project, the company corporation techs had a breach into the network and taken data information. The company bids for di... fferent IT jobs all over the place and has many clients everywhere. For a time the company started to get out bid on every job it bid for. When this happen we found out that there was a breach within the network and that the hacker was taking data from out network. The data they took was the bids for the jobs the company wanted. We do not know who has hacked us but we believe it is a competitive IT Company. With that data they undercut our bids and give our competition an unfair advantage. After the hack we used net witness and wire shark scans to take a look at all of our traffic that was going throw our network. Thanks to the scans we were able to see the holes within the network. We then came up with a network strategy that could plug up the holes within the network. We also have a plan on how to educate our employees on why this is important, and build policy’s that keeps the network safe and keep it at its highest performance. So fare from what we have discussed, the configuration of the network can affect what can be done on the network and the security and defense of the network. If we were to use the network survey produced when our network severs got hit the first time, we can use the host vulnerability assessments as an access requirement. With this we can create a very powerful network structure. After working for the company Corporation Techs for a few years as the technology associate in the information systems department, it has been brought to my attention that all the computers in the network uses the same Class C public IP address range. This includes all of the workstation on the network, the servers that provide authentication, email, and both public and secure websites. The task now is to create a better network design that reduces the large number of public addresses to the lest we need for the company [Show More]

Last updated: 1 year ago

Preview 1 out of 4 pages

Reviews( 0 )

$7.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

GET ASSIGNMENT HELP
65
0

Document information


Connected school, study & course


About the document


Uploaded On

Feb 27, 2021

Number of pages

4

Written in

Seller


seller-icon
Kirsch

Member since 4 years

902 Documents Sold


Additional information

This document has been written for:

Uploaded

Feb 27, 2021

Downloads

 0

Views

 65

Document Keyword Tags

Recommended For You

What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·