CIS246 Network Integrity and Availability

$4.50

CIS246 Network Integrity and Availability
In this topic, we will discuss measures that can be taken to ensure that a network’s programs…

SKU: CIS 246 Network Integrity and Availability Categories: , Tags: , , ,

Description

CIS246 Network Integrity and Availability

CIS246 Network Integrity and Availability

Course Discussions Week 6 All Students Posts – 25 Pages 

In this topic, we will discuss measures that can be taken to ensure that a network’s programs, data, services, devices, and connections are sound and protected from anything that might render them unusable. What situations can compromise integrity and availability and what, specifically, can we do to protect our networks? What is fault tolerance, and what network aspects must be monitored and managed to ensure fault tolerance?

Network integrity can mean different things to different people within an organization. Integrity means that the network is stable and available at almost all times, it also means that every transmission on the network is secure and has a high reliability of not becoming hijacked and changed. The first thing to look at in a security department is redundant connections to the outside world. This means not only multiple connections to the outside world but multiple ISPs to support those connections. There is a story of an airport that had multiple connections to the outside world and was service by two different ISPs. One day while a construction crew was digging they accidently cut the lines from the airport to both ISPs. This happened because even though the airport had good security with multiple connections to the outside world both connections ran through the same location. The airport failed to have a large separation between the redundant connections to the ISPs.

Wireless overlapping is also a great way to have redundant connections for wireless users in a company. If one wireless access point fails then there are redundant access points to pick up the slack. Anti-Virus, Anti-spyware, Anti-mailware, firewalls, are just a few things to help keep the network safe from outsider threats. Job rotation, mandatory leave, using least privilege, account administration, and active scanning are ways to help prevent insider threats to the network and the software and systems that reside on the network…