Coaxial cable more resembles like TV installation cable. It is more expensive than twisted-pair cable but provide high data transmission speed.
Author: Neftaly Malatjie
114061 LG 1.31 Cables and connectors
Cable is one way of transmission media which can transmit communication signals. The wired network typology uses special type of cable to connect computers on a network.
There are a number of solid transmission Media types, which are listed below. – Twisted pair wire
It is classified as Category 1, 2, 3, 4, 5, 5E, 6 and 7. Category 5E, 6 and 7 are high-speed cables that can transmit 1Gbps or more. –
114061 LG 1.30 Switch
Switch is a telecommunication device grouped as one of computer network components. Switch is like a Hub but built in with advanced features. It uses physical device addresses in each incoming messages so that it can deliver the message to the right destination or port.
Like Hub, switch don’t broadcast the received message to entire network, rather before sending it checks to which system or port should the message be sent. In other words switch connects the source and destination directly which increases the speed of the network. Both switch and hub have common features: Multiple RJ-45 ports, power supply and connection lights.
114061 LG 1.49 Creating a security log management process
The first step in creating a log management process is the creation of a policy. The policy should define the objectives the organization wants to meet by managing log information. Supporting standards and guidelines are necessary to ensure policy compliance. According to Kent and Souppaya, the following issues should be addressed:
- Log generation
- Log information transmission
- Log storage
- Log analysis
- Log disposal
When deciding how and when to generate logs, security managers should carefully select the information required. Data contained in the logs should match those needed to hit management objectives as defined in the policy. Building a table to list and define log data elements
114061 LG 1.48 SECURITY ADMINISTRATION PROCEDURES
The following are security procedures for WAN;
- Encryption
The primary purpose of encryption is to protect the confidentiality of digital data stored on computer systems or transmitted via the Internet or other computer networks. Modern encryption algorithms play a vital role in the security assurance of IT systems and communications as they can provide not only confidentiality, but also the following key elements of security:
- Authentication: the origin of a message can be verified.
- Integrity: proof that the contents of a message have not been changed since it was sent.
- Non-repudiation: the sender of a message cannot deny sending the message.
Network encryption (sometimes called network layer, or network level encryption) is a network security process that applies crypto services at the network transfer layer – above the data link level, but below the application level. The network transfer layers are layers 3 and 4 of the Open Systems Interconnection (OSI) reference model, the layers responsible for connectivity and routing between two end points. Using the existing network services and application software, network encryption is invisible to the end user and operates independently of any other encryption processes used. Data is encrypted only while in transit, existing as plaintext on the originating and receiving hosts.
- Keys
It connects your computers or other devices to your router, allowing you to receive the signal and get online. If your computer forgets or someone changes the network security key, you will be unable to access your internet-based websites, programs, and files. You very often will need it if trying to connect a new device to your network.
On Your Router
Often, the network security will be marked on a label on your router, and if you never changed the password or reset your router to default settings, than you’re good to go. It may be listed as “Security Key,” “WEP Key,” “WPA Key,” “WPA2 Key,” “Wireless Key,” or “Passphrase.”
You might also find this in the documentation that came with your router.
If you can’t find it on your router or in the paperwork, how you find it depends on your operating system.
On Your Computers and Devices
When you are connected to the network, your computer remembers it, and you can look in your PC to obtain the password. It’s a good idea to write it down somewhere ahead of time and keep it somewhere safe so you can easily retrieve it as needed.
- Logs
Logs containing information relevant to security management are generated by many sources, including:
- Firewalls
- Intrusion detection and prevention systems
- Anti-malware systems, especially centrally managed solutions with aggregated reporting
- Operating systems
- Switches
- Routers
- Workstations
- Applications
Many organizations ignore the logs until there’s a security incident. However, preventive security measures require a daily review of information from business critical sources. This type of review can help identify (Karen Kent and Murugiah Souppaya, NIST SP 800-92, September 2006):
- Security incidents
o Password hacking
o Large numbers of login failures
o Malware attacks
o Port scans
o Denial of service attacks
o Excessive errors on network devices - Policy violations
- Fraudulent activities
- Operational problems
- Regulatory compliance issues
The challenges to log review can be overwhelming to many businesses. Logs are continuously growing, are located in many silos, and the staffing and skills necessary to make sense from all the information collected is unavailable. Security Log Management helps with the process of aggregating, correlating, and reacting to information captured in logs across an enterprise.