SlideShare a Scribd company logo
1 of 15
Building a Data Network
(wired and wireless) for a
Small Office
 BY :
 1.     PYIE SONE
 2.     SOE THIHA
 3.     PYAE PHYO AUNG
Here’s The office layout




To the layout
How we design the network




   To The Network Diagram
Installation schedule




   One Week
   After Office Hour
   Testing
Logical Diagram explained with
specific layering



   To Logical Diagram
Budget


   4 Routers
   2 Switch
   1 Access Point
   Internet Connection
   Cable
   IP Phone
   Printer
Detail Description of Selected Devices
Diagram      Item                       Price

             Amped Wireless Amped       $ 159.99
             Wireless AP20000G
             Wireless Access Point
             TRENDnet TEG-S224          $ 100.5
             Gigabit Ethernet Switch
             Epson Workforce Pro WP-    $ 259.99
             4540 All-in-One Printer

             Hawking Tech. HSB2 IEEE    $ 149.99
             802.11b/g Wi-Fi Signal
             Booster
             D-Link amplifi DIR-857     $ 179.99
             Wireless Router - IEEE
             802.11n
             Linksys SRW224G4 28-port   $ 200
             WebView Gigabit
             Ethernet Switch
I.    Worms and Viruses
-    Last year, 75% of small and medium-sized
     businesses affected by at least one virus.
-    Meanwhile office staffs are also spreading virus
     unintentionally by downloading untrustworthy
     material.
-    Security Systems need to detect and repel worms,
     viruses, and spyware at all points in the network.
   IIInformation Theft
-   Hackers break to steal credit card or social security
    numbers in small-sized businesses rather than large
    corporations.
-   From both inside and outside of the office, there
    should be security strategy to prevent theft of
    sensitive electronic information.
   III   Business Availability
-   DoS and DDoS attack are one of top
    most destructive attacks which cause
    inability to process legitimate traffic, and
    If more severe, office's credibility is
    damaged.
-   Normally small-sized businesses are less
    prepared for attacks than large
    corporations.
-   Even a modest attack could result in
    substantial lost and tax internal resources
    and attacks are more sophisticated and
    stealthier.
HOW TO PREVENT THESE THREATS
   1.   Cisco Self-defending Network
       long term strategy to secure business processes
    both internal and external threats.
   they can protect both their networks, and their
    network investments
   , It has 3 main characters, integration, collaboration
    and adaptability, integrate into all elements in the
    network,
   work together to exchange information,
    use innovative behavioral recognition to repel new
    threats
Stay Open for Business, Even While Under
Attack


       proven, multifaceted approach protects
      from devastating effects of worms, viruses.
      IPSs (Industry-leading Cisco intrusion
      prevention systems)can and inspect all
      incoming traffic in real time, if found, stop
      the threat and prevent it from spreading
      though the network.
     Layers of security allows to continue to
      respond to clients and stay open for
      business - even while under attack.
Precaution



   Enable MAC address filtering
   Static IP Address
   Disable SSID broadcast
   Firewall
   WPA2 Encryption
Pros And Cons of wLAN


   Pros                  Cons
   Mobility              Slow
   Wireless              Limitation
   Less Complicated      Security
   Roaming
THANK
       YOU!
DATA COMMUNICATION AND WIRELESS SOLUTIONS TEAM

More Related Content

What's hot

Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoTVasco Veloso
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of ThingsBryan Len
 
secureIoT Presentation #1
secureIoT Presentation #1secureIoT Presentation #1
secureIoT Presentation #1Mel Savich
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsKenny Huang Ph.D.
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Edureka!
 
IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamAmit Rohatgi
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan securityAnkit Anand
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 
Attacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network SecurityAttacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network Securityijtsrd
 
Privacy & Security for the Internet of Things
Privacy & Security for the Internet of ThingsPrivacy & Security for the Internet of Things
Privacy & Security for the Internet of ThingsGerry Elman
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeBlock Armour
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIJNSA Journal
 
Complete Security
Complete SecurityComplete Security
Complete SecuritySophos
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 Tonex
 

What's hot (19)

Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
 
secureIoT Presentation #1
secureIoT Presentation #1secureIoT Presentation #1
secureIoT Presentation #1
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Partner Welcome Kit
Partner Welcome KitPartner Welcome Kit
Partner Welcome Kit
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
IoT Security, Mirai Revisited
IoT Security, Mirai RevisitedIoT Security, Mirai Revisited
IoT Security, Mirai Revisited
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
 
IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you Spam
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
Attacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network SecurityAttacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network Security
 
Privacy & Security for the Internet of Things
Privacy & Security for the Internet of ThingsPrivacy & Security for the Internet of Things
Privacy & Security for the Internet of Things
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
 
Complete Security
Complete SecurityComplete Security
Complete Security
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019
 

Similar to Building a data network (wired and wireless

Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Jiunn-Jer Sun
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...IOSR Journals
 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOWJoshua Sibaja
 
An approach to mitigate DDoS attacks on SIP.pptx
An approach to mitigate DDoS attacks on SIP.pptxAn approach to mitigate DDoS attacks on SIP.pptx
An approach to mitigate DDoS attacks on SIP.pptxamalouwarda1
 
Wireless security report
Wireless security reportWireless security report
Wireless security reportMarynol Cahinde
 
Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Cisco Canada
 
Plugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlowPlugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlowNetFlow Analyzer
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overviewCisco Canada
 
Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingShivamSharma909
 
Retail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsRetail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsAirTight Networks
 
Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutionsAlan Rudd
 

Similar to Building a data network (wired and wireless (20)

Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOW
 
An approach to mitigate DDoS attacks on SIP.pptx
An approach to mitigate DDoS attacks on SIP.pptxAn approach to mitigate DDoS attacks on SIP.pptx
An approach to mitigate DDoS attacks on SIP.pptx
 
Wireless security report
Wireless security reportWireless security report
Wireless security report
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
5691 computer network career
5691 computer network career5691 computer network career
5691 computer network career
 
Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles
 
Plugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlowPlugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlow
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Wireless Lan Security
Wireless Lan SecurityWireless Lan Security
Wireless Lan Security
 
CEH Domain 6.pdf
CEH Domain 6.pdfCEH Domain 6.pdf
CEH Domain 6.pdf
 
Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network Hacking
 
Retail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsRetail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—Recommendations
 
Enterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISEEnterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISE
 
Solution
SolutionSolution
Solution
 
Solution
SolutionSolution
Solution
 
ForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk ReportForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk Report
 
Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutions
 

Building a data network (wired and wireless

  • 1. Building a Data Network (wired and wireless) for a Small Office BY : 1. PYIE SONE 2. SOE THIHA 3. PYAE PHYO AUNG
  • 2. Here’s The office layout To the layout
  • 3. How we design the network  To The Network Diagram
  • 4. Installation schedule  One Week  After Office Hour  Testing
  • 5. Logical Diagram explained with specific layering  To Logical Diagram
  • 6. Budget  4 Routers  2 Switch  1 Access Point  Internet Connection  Cable  IP Phone  Printer
  • 7. Detail Description of Selected Devices Diagram Item Price Amped Wireless Amped $ 159.99 Wireless AP20000G Wireless Access Point TRENDnet TEG-S224 $ 100.5 Gigabit Ethernet Switch Epson Workforce Pro WP- $ 259.99 4540 All-in-One Printer Hawking Tech. HSB2 IEEE $ 149.99 802.11b/g Wi-Fi Signal Booster D-Link amplifi DIR-857 $ 179.99 Wireless Router - IEEE 802.11n Linksys SRW224G4 28-port $ 200 WebView Gigabit Ethernet Switch
  • 8. I. Worms and Viruses - Last year, 75% of small and medium-sized businesses affected by at least one virus. - Meanwhile office staffs are also spreading virus unintentionally by downloading untrustworthy material. - Security Systems need to detect and repel worms, viruses, and spyware at all points in the network.
  • 9. IIInformation Theft - Hackers break to steal credit card or social security numbers in small-sized businesses rather than large corporations. - From both inside and outside of the office, there should be security strategy to prevent theft of sensitive electronic information.
  • 10. III Business Availability - DoS and DDoS attack are one of top most destructive attacks which cause inability to process legitimate traffic, and If more severe, office's credibility is damaged. - Normally small-sized businesses are less prepared for attacks than large corporations. - Even a modest attack could result in substantial lost and tax internal resources and attacks are more sophisticated and stealthier.
  • 11. HOW TO PREVENT THESE THREATS  1. Cisco Self-defending Network  long term strategy to secure business processes both internal and external threats.  they can protect both their networks, and their network investments  , It has 3 main characters, integration, collaboration and adaptability, integrate into all elements in the network,  work together to exchange information,  use innovative behavioral recognition to repel new threats
  • 12. Stay Open for Business, Even While Under Attack  proven, multifaceted approach protects from devastating effects of worms, viruses.  IPSs (Industry-leading Cisco intrusion prevention systems)can and inspect all incoming traffic in real time, if found, stop the threat and prevent it from spreading though the network.  Layers of security allows to continue to respond to clients and stay open for business - even while under attack.
  • 13. Precaution  Enable MAC address filtering  Static IP Address  Disable SSID broadcast  Firewall  WPA2 Encryption
  • 14. Pros And Cons of wLAN  Pros  Cons  Mobility  Slow  Wireless  Limitation  Less Complicated  Security  Roaming
  • 15. THANK YOU! DATA COMMUNICATION AND WIRELESS SOLUTIONS TEAM