Author: Neftaly Malatjie

  • 114061 PG 1.1 CONTACT DETAILS


    Unit Standard:

    US 114061

    Course:

    Demonstrate an understanding of Wide Area Computer Networks (WAN`s), comparing them with Local Area Networks (LAN`s) 

    Assessor Details

    Name

    Branch

    Registration No:

    Contact Details

    email:

    Phone:

    Fax:

    Moderator Details

    Name

    Branch

    Contact Details

    email:

    Registration No:

    Phone:

    Fax:

    Candidate Details

    Surname

    Name

    College

    ID No

    Branch

    Contact Details

    email:

    Phone:

    Fax:


  • 114061 LG 1.54 NETWORK DOCUMENTATION

    Although network documentation is always a good idea, it’s especially important for service providers and value-added resellers (VARs). Documenting your customers’ networks can make the troubleshooting process much more efficient when problems arise.

    These same network documents can also help you spot areas of your customers’ networks that may need to be upgraded, giving you the possibility of earning extra revenue. Finally, good network documentation proves that you adhere to industry best practices, and could be your best defense should a customer ever file litigation against you for something network-related.

    The following must be documented;

    1. Create a networkdocumentation policy

    A network documentation policy should detail what aspects of a network need to be documented, especially each server. A documentation policy also communicates to each administrator exactly what is expected of them regarding the documentation process.

    1. Create a network topology diagram

    Ideally, you want this map of the network’s topology to include each network segment, the routers connecting the various segments, and the servers, gateways and other major pieces of networking hardware that are connected to each segment. For larger networks, you may have to create a general segment map and make more specific maps of each individual segment.

    1. Document server names, roles and IP addresses

    While the information included in a network topology diagram is not necessarily specific, there is certain information that you should include for each server, even if that information has to be placed in an appendix. For each server, list the server’s name, its IP address and the role that the server is performing (DNS, DHCP, mail server, etc.). Keep in mind that a server may be assigned multiple IP addresses or have multiple NICs, so you should document that information too.


  • 114061 LG 1.53 Network Audit Features

    The uniform audit capability extending across the whole network makes the most of the CPA’s graphical analysis capabilities. Graphs and reports can indicate, authorization failures, for example, for all computers in one view. The Enforcive Cross Platform Audit Analyzer provides this network security auditing functionality through a flexible multiple graph capability on a single screen. Up to four graphs showing different viewpoints can be compared side by side on the screen.

    An important component to help make the network auditing task a little easier is the existence of ready-defined reports. The Cross-Platform Audit has numerous pre-defined reports and even alerts which can be adapted as necessary and made use of at any time, to give the most powerful network security audit tool for multiple platforms.


  • 114061 LG 1.52 The Enforcive Cross Platform Audit

    Enforcive’s Cross Platform Audit (CPA) is a network security audit tool designed to bring together a wide scope of network security and data security information from many different computers, in one place. It allows a direct view into each host computer’s audit logs, but more significantly, provides a mechanism to extract that information to a single, uniform database. This extraction can include all or selected parts of the audit information collected on the host computer.

    The Cross Platform Audit achieves the collection and integration of multi-platform audit data by a first line of platform-specific agents which reside on the mainframe, AS/400, iSeries, Windows, AIX and Linux computers on the network. Once collected, the data is automatically transferred, over a secure connection to the Cross Platform Audit database where it can be reviewed and analyzed.

    An alert mechanism is built into the Cross Platform Audit which can inform the administrator of simple or complex events, immediately upon their arrival at the Cross Platform Audit database, providing a further tier of network security auditing.

  • 114061 LG 1. 51 Network Security Audit?

    In the wake of today’s ever increasing compliance awareness, network security auditing is high on the list of data security software tools. A network security audit is a means by which the ongoing level of performance of an organization’s network security can be monitored and it allows for the investigation and pinpointing of chosen trends and specific security incidents. Various kinds of network security audit features exist in all modern computing platforms, such as security event logs and journals of database activity. Less commonly found are the audit tools that allow a level of merging or consolidation of information across different platforms.

    The network security audit looks at two broad categories of information. The first is the static data, such as system definitions, protocols used, password rules, firewall definitions and the like, whereas the second category of this kind of data security software deals with the activities that have taken place. Access to databases, transfer of files, and when and where users log on are just some of the more common items viewed in the network security audit.