Resource Guide
BIANCA PAPAPIETRO
UNIVERSITY OF PHOENIX
NTC/362
7/1282019
Building
Blocks of
Today’s Data
It is important to
understand not only how
to build the network and
keep it secure. Each
component requires a
little bit of understanding
on how it works, where it
works and also how to
protect it as well.
Defining the Elements
Technical Term Definition
Network Interface Card The NIC is a device that helps a computer communicate with other devices.
Switch is a networking device that groups all the devices over the network to
transfer the data to another device
Router Is a device that connects the LAN to the Internet.
Hub Is a device that splits the connection into multiple devices.
Modem Connects the computer over the Internet through the telephone line.
Data Cable & Connector A cable communicates a signal and transmits media and messages over the
Internet. There are 3 types of cables: twisted, coaxial and fiber optic. These
cables uses different connectors to conne
In other words…
Current Cabling Solution 1 Solution 2
Cabling Types Coaxial Cable Twisted Pair Cable Ethernet
Speed of Cables 300 ns (roundtrip) 100 m 1 g/b per second
Main Function of
Cables
“The main purpose is for the radio frequency signal.” Purpose of twisting the wire is to
reduce the electrical interference from
the similar pairs in surroundings. The
performance of the wire improves with
the increase in the number of twists
per foot. (Thakur, n.d.)
They can even be good for wiring
analog PLC inputs and outputs,
because of the twisted pairs and the
shielding. ("speed of Fast Ethernet
cable - 65744," n.d.)
Cabling Types Untwisted Cable Ethernet Cable Fiber Optic Cable
Speed of Cables 1 g/b per second per 100 m 1 g/b per second 15 megabytes per second ("What is
the Typical Fiber-Optic Speed? (with
pictures)," n.d.)
Main Function of
Cables
The main purpose is for networking. Ethernet with the RJ45 connector to
help connect devices over Ethernet
and transmit over the network. ("What
Is an RJ45 Cable?," n.d.) ("How to
Make an Ethernet Cable - The Ultimate
Guide," 2018)
For transmitting over a long distance.
("Is Fiber Faster Than Traditional
Cables? Learn All About Fiber Optics,"
2007)
Improvements to the original campus networks.
Firewalls work by splitting the traffic transfer into
two or more networks.
Scenario 1:
Firewall left network vulnerable from lack of
diligence to secure network patches. In this scenario,
a simple way to ensure the network safety is by
putting it in a scheduled routine to manage the
updates.
Scenario 2:
Firewalls being configured poorly can leave a
network vulnerable. For example, dynamic routing
was considered a bad idea but is still setup by many
companies.
Security
Concerns
Wired networks are under
constant vulnerability
because of their physical
hardware addresses.
Therefore, it is vital to have
your network mapped
properly. Constantly
auditing your access points
will also help keep your
network safe to see what
has direct access to the
network.
Wired
Because wireless networks do not have
an actual physical address but instead
transmit data through radio waves it
is very much at risk of being
compromised. It is very hard to
protect against radio waves so it is
easier to spy or infiltrate on a
wireless network. In order to “protect
against wireless network threats,
organizations should encrypt their
data, enable web filtering and
implement comprehensive endpoint
protection to protect against malicious
software.”
Data leakage is a great concern for many companies
now as it should be. Although, a company may have a
secure network, most employees access their network
with a mobile device or have settings that allow it to
access the network.
The best way to avoid this issue is to help the
individual employees understand the necessity of
keeping secure the data and any access points to the
network. Also, having a security buffer any human
errors that may be mistakenly caused or created by
us.
Mobile Networks
According to one study 91% of attacks
begin with email. Social media websites
generally ask you to sign up with an
email and often times incites you to
majung this a big way to be targeted.
Also, studies show being on a mobile
device makes people more easily
influenced to fall for a phishing attacks.
The best way to do is if it looks
suspicious – do no open it. If you must
wait until you are on the desktop so
that you can confirm if it is and also
send it to the proper phishing
authorities.
“Cryptojacking is a type of
attack where someone uses
a device to mine for
cryptocurrency without the
owner's knowledge.” In an
effort in order to help
alleviate the fraud from
crypto mining, the
government has band and it
is now illegal to use on the
Android or iOS.
Conclusion
Firststepis to ensure that the networkis
properlyset up for not current usage but
future expansion.It needs to be ableto keep
the gatewayaccessible buteasilysecured.
Managinng the networkand its data is very
necessaryto make sure that the company
doesn’tfall preyto any malwareor dishonest
gain.
This Photo by Unknown Author is licensed under CC BY-SA-NC
References
Basic Network Building Blocks. (n.d.). Retrieved from
https://www.dummies.com/programming/networking/basic-network-building-blocks/
Dosal, E. (n.d.). 5 Firewall Threats and Vulnerabilities to Look Out For. Retrieved from
https://www.compuquip.com/blog/5-firewall-threats-and-vulnerabilities-to-look-out-for
Holyoak, J. (n.d.). 5 Network Security Risks to Prepare for | Types of Cyber Attacks. Retrieved from
https://marketing.pinecc.com/blog/5-network-security-risks-to-prepare-for-types-of-cyber-attacks
Raphael, J. (n.d.). 7 mobile security threats you should take seriously in 2019. Retrieved from
https://www.csoonline.com/article/3241727/7-mobile-security-threats-you-should-take-seriously-in-
2019.html

Resource Guid

  • 1.
    Resource Guide BIANCA PAPAPIETRO UNIVERSITYOF PHOENIX NTC/362 7/1282019
  • 2.
    Building Blocks of Today’s Data Itis important to understand not only how to build the network and keep it secure. Each component requires a little bit of understanding on how it works, where it works and also how to protect it as well.
  • 3.
    Defining the Elements TechnicalTerm Definition Network Interface Card The NIC is a device that helps a computer communicate with other devices. Switch is a networking device that groups all the devices over the network to transfer the data to another device Router Is a device that connects the LAN to the Internet. Hub Is a device that splits the connection into multiple devices. Modem Connects the computer over the Internet through the telephone line. Data Cable & Connector A cable communicates a signal and transmits media and messages over the Internet. There are 3 types of cables: twisted, coaxial and fiber optic. These cables uses different connectors to conne
  • 4.
    In other words… CurrentCabling Solution 1 Solution 2 Cabling Types Coaxial Cable Twisted Pair Cable Ethernet Speed of Cables 300 ns (roundtrip) 100 m 1 g/b per second Main Function of Cables “The main purpose is for the radio frequency signal.” Purpose of twisting the wire is to reduce the electrical interference from the similar pairs in surroundings. The performance of the wire improves with the increase in the number of twists per foot. (Thakur, n.d.) They can even be good for wiring analog PLC inputs and outputs, because of the twisted pairs and the shielding. ("speed of Fast Ethernet cable - 65744," n.d.) Cabling Types Untwisted Cable Ethernet Cable Fiber Optic Cable Speed of Cables 1 g/b per second per 100 m 1 g/b per second 15 megabytes per second ("What is the Typical Fiber-Optic Speed? (with pictures)," n.d.) Main Function of Cables The main purpose is for networking. Ethernet with the RJ45 connector to help connect devices over Ethernet and transmit over the network. ("What Is an RJ45 Cable?," n.d.) ("How to Make an Ethernet Cable - The Ultimate Guide," 2018) For transmitting over a long distance. ("Is Fiber Faster Than Traditional Cables? Learn All About Fiber Optics," 2007)
  • 5.
    Improvements to theoriginal campus networks.
  • 6.
    Firewalls work bysplitting the traffic transfer into two or more networks. Scenario 1: Firewall left network vulnerable from lack of diligence to secure network patches. In this scenario, a simple way to ensure the network safety is by putting it in a scheduled routine to manage the updates. Scenario 2: Firewalls being configured poorly can leave a network vulnerable. For example, dynamic routing was considered a bad idea but is still setup by many companies.
  • 7.
  • 8.
    Wired networks areunder constant vulnerability because of their physical hardware addresses. Therefore, it is vital to have your network mapped properly. Constantly auditing your access points will also help keep your network safe to see what has direct access to the network. Wired
  • 9.
    Because wireless networksdo not have an actual physical address but instead transmit data through radio waves it is very much at risk of being compromised. It is very hard to protect against radio waves so it is easier to spy or infiltrate on a wireless network. In order to “protect against wireless network threats, organizations should encrypt their data, enable web filtering and implement comprehensive endpoint protection to protect against malicious software.”
  • 10.
    Data leakage isa great concern for many companies now as it should be. Although, a company may have a secure network, most employees access their network with a mobile device or have settings that allow it to access the network. The best way to avoid this issue is to help the individual employees understand the necessity of keeping secure the data and any access points to the network. Also, having a security buffer any human errors that may be mistakenly caused or created by us. Mobile Networks
  • 11.
    According to onestudy 91% of attacks begin with email. Social media websites generally ask you to sign up with an email and often times incites you to majung this a big way to be targeted. Also, studies show being on a mobile device makes people more easily influenced to fall for a phishing attacks. The best way to do is if it looks suspicious – do no open it. If you must wait until you are on the desktop so that you can confirm if it is and also send it to the proper phishing authorities.
  • 12.
    “Cryptojacking is atype of attack where someone uses a device to mine for cryptocurrency without the owner's knowledge.” In an effort in order to help alleviate the fraud from crypto mining, the government has band and it is now illegal to use on the Android or iOS.
  • 13.
    Conclusion Firststepis to ensurethat the networkis properlyset up for not current usage but future expansion.It needs to be ableto keep the gatewayaccessible buteasilysecured. Managinng the networkand its data is very necessaryto make sure that the company doesn’tfall preyto any malwareor dishonest gain. This Photo by Unknown Author is licensed under CC BY-SA-NC
  • 14.
    References Basic Network BuildingBlocks. (n.d.). Retrieved from https://www.dummies.com/programming/networking/basic-network-building-blocks/ Dosal, E. (n.d.). 5 Firewall Threats and Vulnerabilities to Look Out For. Retrieved from https://www.compuquip.com/blog/5-firewall-threats-and-vulnerabilities-to-look-out-for Holyoak, J. (n.d.). 5 Network Security Risks to Prepare for | Types of Cyber Attacks. Retrieved from https://marketing.pinecc.com/blog/5-network-security-risks-to-prepare-for-types-of-cyber-attacks Raphael, J. (n.d.). 7 mobile security threats you should take seriously in 2019. Retrieved from https://www.csoonline.com/article/3241727/7-mobile-security-threats-you-should-take-seriously-in- 2019.html

Editor's Notes

  • #3 ("Basic Network Building Blocks," n.d.)
  • #7  (Dosal, n.d.)
  • #9 (Holyoak, n.d.) 
  • #10 (Holyoak, n.d.) 
  • #11 (Raphael, n.d.) 
  • #12 (Raphael, n.d.) 
  • #13 (Raphael, n.d.)