Network Security and Management

Submitted by: Submitted by

Views: 82

Words: 3911

Pages: 16

Category: Science and Technology

Date Submitted: 02/05/2015 10:34 AM

Report This Essay

Network Security and Management

Brandi Schoch

CTU Online

Introduction to Network Management

IT245-1403A-09

Jennifer Gaddy

August 11, 2014

Table of Contents

Table of Contents 2

Identifying the Network 3

The Organization 3

Network Servers 3

Network Personnel 3

Diagramming the Network 5

Network Architecture 5

Speed and Distance 6

Access Method 6

Network Models 8

OSI Model 8

FCAPS Model 11

The Diagrams 13

Protocols and Agents 14

Protocols Used Presently 14

Security Concerns 15

Network Security 16

Viruses, Worms and Trojan Horses 16

Hacker Attacks 17

Identity Theft 17

Network Management 18

Managing Hardware and Applications 18

Managing Network and Security Issues 18

Utilizing Utilities and Applications 18

References 20

Introduction to Network Management

Identifying the Network

The Organization

This is a personal home network that also runs an internet business. There is one location and many hubs within that location to provide: internet access for family members, and business personal, as well as printer and fax services for the business, as this is an internet business reliable internet access is a must security is paramount.

Each family member has their own desktop computer, laptop computer, and tablet, 2 members have smart phones, there is also a PlayStation 3 console, Xbox 360 console, and a Wii console connected to the network.

Network Servers

Each hub has its own user. This is not the case with consoles as they are used by everyone. The modem/router connects all the hubs to a wireless 4-in-one printer that provides all printing/fax services for each computer. This printer also has the capacity to scan and send document to each computer. So all hubs are providing and consuming. However only one computer is used for the business and there are times when another printer is hooked up to it briefly for special jobs.

Network Personnel

Each computer user is responsible for all their data....