Building A Secure Network
Building A Secure Network
Praveena Alukuru
Document Summary
This document is very important especially when it comes to the scope and the approach.
Therefore it is required make sure that the security at the Tech management is in better place.
Additionally, this document is responsible for all the people that are working within the
organization as well. Therefore, all the guidelines n that are used in tis document provide the
responsibilities for all the workers in the Tech management. Additionally, the testing and the
Standard compliance-the system needs to show and provide the corporate security standards and
Purpose-as per the requirements, the reason for this application is to provide an effective security
plan that will prevent unauthorized access. This means that there is need to have a secured server
System boundaries-in this case, it is important to note the hosts, the protocols associated with the
hosts and the services that are based on the findings from the various resources. This includes
The Scope Limitations- this system is used to address the inside building at the reputable
SECURITY PLAN
Overview
All the security pans are prepared by the technology associates as the basic system
security document and is proposed by the system. Additionally, this system should be able to
meet the company security program requirements. Furthermore, the security pan is used together
BUILDING A SECURE NETWORK 3
with the certification and accreditation process and serves for the Lifetime for the system as well.
This security plan is determined to contain very important and key information. Therefore, the
The plan provides the operation of the system and the measure that are required to control
access. Additionally, the plan is used to protect the system and its information as well, for this to
be effective, there is need to make decisions with the responsible parties. The security needs to
Security Personnel
Here, the name location as well as the contact information should include all the major
people. This includes the system owner, the Architect, Maintenance Facilitator and the
Personnel Security
The range of security clearance levels and the set of the formal access approvals shouldbe
Physical Protection
When it comes to the documentation, it needs to be unique for the system. Additionally, it
172.30.0.83
2. Identified Protocols
Ftp Protocol for exchanging files over the Internet, which uses Internet’s TCP/IP to
enable data transfer.
Telnet A network protocol used on the Internet or local area network that provides
bidirectional
interactive text-oriented communications facility using a virtual terminal
connection.
Ntp This network protocol is a clean, simple, lightweight, and efficient protocol
allowing clients to query
servers for the current time ( including the date).
Tftp 69; It is a Trivil Transfer Protocol which is used by a number of attacks and
worms to
Download trans or other components of the attack or worn.
ARP A network layer protocol used to convert an IP into a physical address called DLC
address.
TCP A transmission control protocol, which is a set of rules (protocols), used along
with the IP to
Send data in the form of a message units between computers over the Internet.
ICMP Internet Control Message protocol which is a message control and error reporting
protocol
Between a host server and a gateway to the Internet.
BUILDING A SECURE NETWORK 6
BROWSER web browser; used to locate and display Webpages. The two most popular
browsers are Microsoft Internet Explorer andFirefox. Both of these are graphical
browsers, which means that they can display graphics as well as text.
DHCP Dynamic Host Configuration Protocol; An auto configuration protocol used on IP
networks. Computers that are connected to IP networks must be configured before
they can communicate with other computers on the network. DHCP allows a
computer to be configured automatically, eliminating the need for intervention by
a network administrator. It also provides a central database for keeping track of
computers that have been connected to the network.
DNS Domain Name System (DNS) is a hierarchical naming system for computers,
services, or any resource connected to the Internet or a private network. It
associates various information with domain names assigned to each of the
participants.
FTP-Data Information that can be given about a file is its data type, which dictates the
overall representation of the file. Types specified four different data in the FTP
standard:
ASCII: Defines an ASCII text file, with lines marked by some sort of end-of-line
marker as described above.
EBCDIC: Conceptually the same as the ASCII type, but for files using IBM's
EBCDIC character set.
Image: The file has no formal internal structure and is sent one byte at a time
without any processing; this is the “black box” mode I mentioned above.
Local: This data type is used to handle files that may store data in logical bytes
containing a number of bits other than 8.
LLMNR Link Local Multicast Name Resolution (or LLMNR) is a protocol based on the
Domain Name System (DNS) packet format that allows both IPv4 and IPv6 hosts
to perform name resolution for hosts on the same local link. It is included in
Windows Vista, Windows Server 2008 and Windows 7
LOOP a network whose components are serially connected in such a way that the last
component that is connected to the first component.
NBNS A server that stores NetBIOS name-to-IPv4 address mappings and that resolves
NetBIOS names for NetBT-enabled hosts. The WINS Server service is the
Microsoft implementation of an NBNS.
SMB Server Message Block, a message format used by DOS andWindows to share
files, directories and devices. NetBIOS is based on the SMB format, and many
network products use SMB. These SMB-based networks include Lan Manager,
Windows for Workgroups, Windows NT, and Lan Server.
SRVLOC Service Location Protocol provides a scalable framework for the discovery and
selection of network services. Using this protocol, computers using the Internet
need little or no static configuration of network services for network based
applications. This is especially important as computers become more portable,
and users less tolerant or able to fulfill the demands of network system
administration.
BUILDING A SECURE NETWORK 8
172.30.0.91 Netbios-ssn
Vmware-auth – Vmware authentication daemon 1.0 (uses VNC,SOAP)
Microsoft-rdp – Microsoft terminal service
http – national instruments LabVIEW service locator httpd 1.2
172.30.0.74 NONE
172.30.0.76 NONE
172.30.0.88 NONE
172.30.0.90 unknown
172.30.0.80 NONE
172.30.0.102 NONE
172.30.0.112 NONE
172.30.0.116 NONE
172.30.0.75 NONE
172.30.0.84 NONE
172.30.0.87 NONE
172.30.0.93 NONE
172.30.0.83 NONE
172.30.0.100 NONE
172.30.0.111 NONE
172.30.0.115 NONE
172.30.0.96 NONE