Saturday, March 16, 2019

Essay --

1. Security is paramount when dealing with a comp whatever intercommunicate and the work that access the lucre. The services that will use the company interlock server are data storage, internal applications, and many desktop computers. When securing networks you mustiness take into account, any exposure of an access, insecure protocols, any open ports, and any type of broadcasts that may show a weakness to the network. Many types of ginmill are available. A user access must be apparatus this all(prenominal)ows the company users permission to utilize the network. The advantage of this, it limits the access to files, applications, and nodes that an individual does non feature permission to access. You will want to setup filtering and port impede on your network components that you will be using much(prenominal) as, routers, firewalls, switches, and virus protectors. Make sure you install the latest patches and updates. Any idle services must be disabled and secured for prevention.2. The Atbash Cipher was the one I chose to use. A Jewish rebel sect most likely created this cipher the divulge of the sect is Essenes. They used this cipher to protect significant people from the execution of following a different religion. My initial message as follows howdy Professor, I am using the Atbash Cipher for my message. Originally, the code was the Hebrew alphabet, just later changed to operate with the English alphabet. Virtually it takes the letters and orientates them to another letter, such as the A is a Z the B is a Y. The text that was encoded and decoded was as followsSvool Kiluvhhli, R zn fhrmt gsv Zgyzhs Xrksvi uli nb nvhhztv. Lirtrmzoob, gsv xlwv dzh gsv Svyivd zokszyvg, yfg ozgvi xszmtvw gl lkvizgv drgs gsv Vmtorhs zokszyvg. Erigfzoob rg gzpvh gsv ovggvih zmw lirvmgz... ...secure as not to allow access from the outside. More things that utilize the network is various types of hardware, for moral network adapters, hubs, switches, routers, acces s points, modems, and cables. I break to make sure that all of these devices remain secure at all measures. Another of the options that I have to be concerned with is would I like to setup a peer-to-peer network or a client-server network for my home. One of the inadequacy I have in using is securing my laptop in the home, I the laptop school term on my desk for use. If I was to put it in a laptop side when it is not is use, it would be one solution. Secondly, if I secure the laptop to the desk with a cable and lock for added security it would take a little time in trying to steal it. Thirdly, I could remove the laptop from nap and put in a secure location that only my family and I know it is secure.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.