network engineering

In many organizations the boundary between the network administration group and the security administration group is not well delineated which leads to conflict and lack of clarity in responsibilities. Give a brief example of a situation that others might have experienced. What would make it easier for an organization to prevent such conflicts from occurring?

What do you think are the most important security policies that an organization needs to have in place and why?

A lot has been said regarding physical security in the recent past. What are your thoughts on biometrics and how can they be used more effectively in the overall physical security effort?

Is airport screening effective? How can it be improved?

Give an example of a system (or type of system) that you would recommend protecting with host-based IDS. Provide a topic describing the system and briefly explaining why HIDS would be appropriate to use as security measure.

What role do you think IDS (network and/or host-based) should have in the security posture of a home network?

Can a user with the following clearance {Top Secret; (Red, Blue)} have access to information classified in the following ways under the military security model?

a.{Top Secret; Blue}

b.{Secret; Green}

c.{Secret;(Red, Yellow)}

d.{Confidential; (Red, Blue)}

In the early days of Kerberos the authentication protocol was vulnerable to replay attacks. How can a security administrator reduce the possibility of a replay attack in Kerberos?

Before the advent of Active Directory, Microsoft utilized LANMAN authentication. What are some of the critical flaws in the LANMAN authentication?

Name three advantages of syslog over the Microsoft Windows event logging system?

This requires some thought about what types of IDS you might use, and in what locations, to protect a home network environment.

Create a network "architecture" diagram representing a regular home network (presuming Internet access is available from home) and to indicate on the diagram where you might locate IDS sensors. You need not use a technical drawing tool such as Visio, nor do you need to find relevant clip art or other graphics for your diagram. Lines and boxes such as those you can produce in PowerPoint are sufficient. If drawing via computer is not feasible, a scanned image of a hand-drawn diagram is acceptable as well.

Diagram should include the following elements at a minimum:

[url removed, login to view] of your Internet connection (whether dial-up, cable modem, router, etc.)

[url removed, login to view] connected to the network, as well as a designation of whether the connection type is wired or wireless (or both)

[url removed, login to view] other devices attached to the network

[url removed, login to view] location and type of any IDS sensors you would place on the network

A brief text description of the diagram should also be included, particularly to explain your choices about IDS placemen.

Skills: Anything Goes, Article Rewriting, Research Writing, Technical Writing

See more: microsoft windows event logging system, role think ids security posture home network, critical flaws lanman authentication, writing elements, writing devices, writing clip art, writing about art, windows security administration, why is academic writing important, why are computers important, why academic writing is important, where to find powerpoint on your computer, where can you find powerpoint on your computer, what is effective writing, visio system diagram, visio system architecture, visio engineering, visio architecture diagram, visio architecture, types of hand writing, three d model, the writing elements, the advantages of academic writing, the active network, technical writing types

About the Employer:
( 58 reviews ) New Delhi, India

Project ID: #2540251

Awarded to:


Skillful network and system engineer (active CCNP certification) Cisco Id :- CSCO11597222 with good analytical, troubleshooting, and communication skills. Over 7 years' experience in configuring and maintaining highly More

$10 USD / hour
(1 Review)

3 freelancers are bidding on average $9/hour for this job


I have written a lot on various niches, and able to provide you quality and unique contents without any errors. Please see PMB for details and samples.

$8 USD / hour
(25 Reviews)

Hi I was a Director of infrastructure development and then a Director of Network Operations for the Seychelles Government so I have been through this process. I also hold a Masters in Computer Science.

$9 USD / hour
(0 Reviews)