Free Essay

Nt2580 It

In: Computers and Technology

Submitted By belovedken2000
Words 266
Pages 2
Kenneth Williams
NT2640
LAB2
Setting Router Password
Step 4 Router(config-line)#
Step 11 Yes it ask for a password and it work with clscopress
Step 12 Barney works
Config router ip
Step 4 It says unassigned
Step 10 The ip is 10.1.1.4
Step 11 Yes it did
Config SSH
Step 4 R1 config-line #
Step 7 Config-line now I am in config
Step 11 It connect me to R2 user command
Terminal history
Step 5 It shows 192.168.54.0/29, 3 subnets/192.168.54.64.[120/1] via 192.168.54.34, 00:45:35
Step 6 I see 5 commands I put in
Step 8 I see two commands
Rebuild a config
Step 2 Ip 10.22.1.1, 255.255.0.0,hostname clock rate 1536000, password ciscopress, router config 10.0.0.0,its shutdown on each
Step 3 Yes the ping worked
Step 4 No it didn’t work
Step 5 No it didn’t work
Step 6 Yes it did work
SSH and Telnet
Step 1 10.21.1.1,10.23.2.2,10.21.1.254,10.23.2.254,10.21.0.1,10.23.0.2
Step 2 Yes for use no for enable mode
Step 3 SSh and telnet
Step 4 Step command incomplete
Basic router config
I can not find this lab on here.
Switch and router security
Step 2 No not any subcommand showed up
Step 3 No the same happened here

Subnetting lab 3
Step 1 I have no clue
Step 9 No it does not match…...

Similar Documents

Free Essay

Nt2580

...NT2580 DEREK GRASSER LAB 7 1. Describe the differences between symmetric key cryptography and Asymmetric key cryptography. Ans: Symmetric key cryptography is older and only uses one key to encrypt and decrypt. Asymmetric key cryptography is newer than symmetric and uses two different keys to decrypt and decrypt, a public key and a private key. 2. How can public key cryptography be used for nonrepudation? Ans: The cryptography will be able to tell who it came from and what time it happened. Gives all the information needed. 3. How do digital signatures ensure the integrity of a message and verify who wrote it? Ans: Digital Signatures apply the same functionality to an e-mail message or data file that a handwritten signature does for a paper-based document. The Digital Signature vouches for the origin and integrity of a message, document or other data file. 4. What is a Certificate authority? (CA) Ans: In cryptography, a certificate authority or certification authority (CA) is an entity that issues digital certificates. The digital... Certificate_authority. 5. What are the fields and their purpose that make up distinguished name of an X.509 certificate? Ans: is an ITU-T standard for a public key infrastructure (PKI) and Privilege Management Infrastructure (PMI). X.509 specifies, amongst other things, standard formats for public key certificates, certificate revocation lists, attribute certificates, and a certification path validation......

Words: 262 - Pages: 2

Free Essay

Nt2580 Assignment 1

...NT2580 Network|| NetRange|76.74.255.0 - 76.74.255.127| CIDR|76.74.255.0/25| Name|PEER1--AUTOMATTIC-SERVERBEACH-ACCOUNT--01| Handle|NET-76-74-255-0-1| Parent|PEER1-SERVERBEACH-08A (NET-76-74-248-0-1[->0]) | Net Type|Reassigned| Origin AS|| Organization|Automattic, Inc (AUTOM-93[->1]) | Registration Date|2012-03-26| Last Updated|2012-03-26| Comments|| RESTful Link|http://whois.arin.net/rest/net/NET-76-74-255-0-1| See Also|Related organization's POC records.[->2]| See Also|Related delegations.[->3]| Organization|| Name|Automattic, Inc| Handle|AUTOM-93| Street|60 29th Street #343| City|San Francisco| State/Province|CA| Postal Code|94110| Country|US| Registration Date|2011-10-05| Last Updated|2011-10-05| Comments|| RESTful Link|http://whois.arin.net/rest/org/AUTOM-93| Function|Point of Contact|| NOC|NOC12276-ARIN (NOC12276-ARIN[->4])|| Abuse|NOC12276-ARIN (NOC12276-ARIN[->5])|| Tech|NOC12276-ARIN (NOC12276-ARIN[->6])|| Admin|NOC12276-ARIN (NOC12276-ARIN[->7])|| Point of Contact|| Name|NOC| Handle|NOC12276-ARIN| Company|Automattic| Street|60 29th Street #343| City|San Francisco| State/Province|CA| Postal Code|94110| Country|US| Registration Date|2011-10-04| Last Updated|2012-10-02| Comments|| Phone|+1-877-273-8550 (Office)| Email|ipadmin@automattic.com| RESTful Link|http://whois.arin.net/rest/poc/NOC12276-ARIN| bossip.com registry whois|Updated 1 second ago - Refresh[->8]| Domain Name: BOSSIP.COM Registrar: GODADDY.COM...

Words: 741 - Pages: 3

Premium Essay

Nt2580

...Microsoft Encrypted Authentication version 2 (MS-CHAP v2). * Or SSTP, L2tp/IPsec, PPTP, IKEv2 Access control model/ policy: This model would support Role based access controls and allow mandatory access control to be governed by remote access. The IS Dept. is responsible for maintaining the access and access rights and prividgles and restricted as needed by user roles in the organization. All data is encrypted and transmitted via remote and encrypted and used by the vpn tunnel. VPN access will be terminated on a 3 month basis and must be renewed by revisiting based on your access role and permissions. [continues] Read full essay Cite This Essay APA (2013, 07). Nt2580 unit 3 assignment 1 remote access control policy def. StudyMode.com. Retrieved 07, 2013, from http://www.studymode.com/essays/Nt2580-Unit-3-Assignment-1-Remote-1853418.html MLA MLA 7 CHICAGO...

Words: 339 - Pages: 2

Free Essay

Nt2580 Final Project

... Richman Investments | Richman Internet Infrastructure Security Management Upgrade | ITT Technical Institute NT2580 Course Project | | Jason R Spitler | 5/30/2014 | Based on the premises that Richman has 5000 employees throughout the main office and several branch offices, this document dictates research solutions and details the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system. | Final Project I. Richman Internet Infrastructure Security Management Upgrade A. Purpose Based on the premises that Richman has 5000 employees throughout the main office and several branch offices, this document dictates research solutions and details the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system. II. Basic Authentication Procedures and Standards, (Who users are.) A. Trinity-Three-factor Authentication Method replaces Basic Authentication It is my view the Administrator’s responsibility is to provide secure communications by adding layers of security at all levels to assure the amount of protection for company’s valuable assets. Richman will provide its employees a new method of authentication I call Trinity. It is a three-factor authentication method requiring updated......

Words: 1901 - Pages: 8

Premium Essay

Nt2580 Week 1

...ITT Technical Institute 3825 West Cheyenne Avenue, Suite 600 North Las Vegas, Nevada 89032 NT2580 Introduction to Information Security Week 1, Unit 1 – Information Systems Security Fundamentals Class Plan Time Duration: This Class Period will be approximately 4 ¾ Hours in length. It will be divided 2 ¾ hours for Theory and 2 ½ hours for Lab. Content Covered: • Textbook o Chapter 1 - Information Systems Security Objectives: After completing this unit, the student should be able to: • Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. Key Concepts: ▪ Confidentiality, integrity, and availability (CIA) concepts ▪ Layered security solutions implemented for the seven domains of a typical IT infrastructure ▪ Common threats for each of the seven domains ▪ IT security policy framework ▪ Impact of data classification standard on the seven domains Materials: Week 1 PowerPoint Presentation Assignment Overview: Refer to Assignment 1: Match Risks/Threats to Solutions in the Graded Assignment Requirements section of this instructor guide. In this assignment, the students need to match common risks or threats within the seven domains of a typical IT infrastructure with the possible solutions or preventative actions. Use the hand out worksheet NT2580.U1.WS1.doc. Refer to Assignment 2: Impact of a Data Classification Standard, you must write a brief......

Words: 530 - Pages: 3

Premium Essay

Nt2580: Introduction to Information Security Week 2 Essay

...Week 2 Essay Johnathan Terrance NT2580: Introduction to Information Security Brian Alley May 10, 2014 I have been given the task of designing a remote access control policy for establishing secure access between remote offices across several different states. Establishing this policy will protect the company and employees against attacks that may cost them tons of money and even their jobs. The policy will define several different security practices that employees need to adhere to in order to keep the network safe. These policies will be dictated through an AUP and signed by all employees with access to the network. The employees will also have to go through initial information security training before gaining access to the network. This training will also be required annually in order to maintain their access to the network. The AUP will dictate the requirements for passwords. The requirements will include an eight character alphanumeric password, two uppercase letters, two lowercase letters, two special characters, and two numbers. This will make it more difficult for the password to be breached. The AUP will also state that the company systems will only be used for work related purposes. All social networking sites and many other miscellaneous sites will be blocked. The user will also have to consent to monitoring when signing the AUP. Users will only be given access to files they need through the use of an ACL. This way if a password is breached the hacker will...

Words: 617 - Pages: 3

Free Essay

Nt2580 Unit 6 Assign 1

...JO STARNES, NT2580, UNIT 2 CALCULATING THE WINDOW OF VULNERABILITY The window of vulnerability is the amount of time the systems defense measures are compromised, minimized, or eliminated. This is when the system is most likely to be at risk, and can be affected by malicious attacks. It is not stated as what day the server software detected the attack on the SMB server. It only states that it was detected the day before. So from day one, these are the steps we will need to take to get the SMB server back up and running properly and safely, as well as the amount of time it will take for us to solve the issue: Day 1 - The software company will release a patch for this attack in three days. Day 4 – We will receive the patch, and we need to install and test the patch, this will take at least five days. Day 9 – After installation and testing is completed; we will send the update to the entire company’s network devices. As soon as all the updates are sent out to all the devices, they will need to be rebooted in order for the patch to take effect. We can send out a message to all devices to insure this happens. This could take a day or two to complete. This could all be completed as early as 10 days if there are no issues during the process, however problems may arise and it could possibly take a day or two more. I hope that this is helpful and we will start immediately on the problem. It is of upmost importance that you have team members monitoring the server at all times......

Words: 310 - Pages: 2

Premium Essay

Nt2580 Remote Access Policies

...NT2580 Week 2 Essay Create a Remote Access Policy Definition NT2580 The requirements for establishing a secure connection between remote locations vary between organizations. The needs of the organization are based on the type of information and data being transferred, as well as the sensitivity of the information. There are several options available to networks to get their data sent securely and reliably. All seven layers of the OSI model must be taken into account when designing secure Remote Access Control Policies. In order to create a secure remote connection between offices in Atlanta, San Francisco, Chicago, and Dallas, a WAN link would be the best type of connection. A dedicated WAN link would offer the organization a secure, reliable, dedicated P2P type of connection. Wide Area Network links would be monitored by the owners of the lines that connect each location. Leased lines from the providers will allow for scalability with potential growth. The downside to this type of connection is the expense and an internet connection is not necessarily provided by the link. In order to add to the security of the network physical and logical access controls are necessary. Logical implementations added to the network will be Acceptable, Email, and Wireless Use policies, Antivirus and firewall software, as well as Extranet, Interconnection, and Host Security. In order to ensure the physical assets, as well as employees, physical security must also be considered.......

Words: 704 - Pages: 3

Premium Essay

Nt2580

...Richman Investments has decided to expand their business. We have been given their new growth projections of 10,000 employees in 20 countries, with 5,000 located within the U.S. Richman have also established eight branch offices located throughout the U.S. and have designated Phoenix, AZ being the main headquarters. With this scenario, I intend to design a remote access control policy for all systems, applications and data access within Richman Investments. With so many different modes of Access Control to choose from it is my assessment that by choosing only one model would not be appropriate for Richman Investments. My recommendation would be a combination of multiple Access Control Models that overlap to provide maximum coverage and overall security. Here are my suggestions for access controls. Role Based Access Control or RBAC, this will work well with the Non-Discretionary Access Control model, which will be detailed in the next paragraph. RBAC is defined as setting permissions or granting access to a group of people with the same job roles or responsibilities. With many different locations along with many different users it is important to identify the different users and different workstations within this network. Every effort should be dedicated towards preventing user to access information they should not have access to. Non-Discretionary Access Control is defined as controls that are monitored by a security administrator. While RBAC identifies those with......

Words: 548 - Pages: 3

Premium Essay

Nt2580 Unit 4 Assignment 2

...Dallas Page July 17, 2015 Unit 4 Assignment 2 NT2580 Acceptable Use Policy Definition 1. Overview To protect the integrity, confidentiality and accessibility along with the safety of our clientele and employees it is necessary that a precise set of standards must be defined for anyone who utilizes the electronic devices to access information via the internet. Richman Investments is committed to protecting employees, partners and the company from illegal or destructive actions whether knowingly or unknowingly. Internet or Intranet related systems, including but not limited to the World Wide Web, storage media, operating systems, network accounts and electronic mail are intended to be used for business pertaining to Richman Investments. It is the responsibility of each electronic device user to know the guidelines of the Acceptable Use Policy and to adhere to the Acceptable Use Policy of Richman Investments. 2. Purpose To outline and give a clear precise definition of what is and what isn’t acceptable when using the property of Richman Investments. Property including but not limited to computers, internet service, email service, storage media, operating systems or network accounts. Inappropriate use of either of the aforementioned exposes Richman Investments to legal liability and/or risks of damage to company hardware and/or software. 3. Scope The Acceptable Use Policy applies to all employees, contractors, clients, visitors and partners to...

Words: 689 - Pages: 3

Premium Essay

Nt2580 Unit 1

...NT2580-M1 Introduction to Information Security Unit 1: Information Systems Security Fundamentals 2015-Summer, 6/20/2015, Saturday (9:00am – 1:30pm) Student Name ___________________________________ Lesson Plan Theory (in class, Lab #2)……………………………..…………………..……...2 Reading  Kim and Solomon, Chapter 1: Information Systems Security. Objectives……………..………………….……………………………….2 Student Assignments for this Unit Unit 1 Lab Perform Reconnaissance & Probing Using ZenMap GUI (Nmap) Lab #1: Performing Network Reconnaissance using Common Tools Overview and access vLab..............................................................................................3 Part 1: Exploring the Tools used in the Virtual Lab Environment……………16 Unit 1 Assignment Match Risks/Threats to Solutions Part 2: Connecting to a Linux Machine …………………. .........................44 Unit 1 Assignment Impact of a Data Classification Standard Part 3: Using Zenmap to Perform Basic Reconnaissance ……………………59 Appendix A. SYLLABUS………………………………………………..……..………….69 B. Forgot your password?………………………………………………..……..73 Instructor: Yingsang “Louis” HO Tel: 425-241-8080 (cell), (206) 244-3300 (school) Email: yho@itt-tech.edu NT2580_2015_Summer_M1_UNIT1.doc Page 1 of 76 Unit 1: Information Systems Security Fundamentals Learning Objective  Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. Key Concepts  Confidentiality, integrity, and......

Words: 3379 - Pages: 14

Free Essay

Nt2580 Unit 1 Assignment 2

...------------------------------------------------- Nt2580 - Unit 1 Assignment 2: Impact of a Data Classification Standard Richman Investments Internal Use Only Data Classification Standard Domain Effects Richman Investments has implemented an “Internal Use Only” data classification standard. This report will describe the effects of the Internal use Only Standard on our respective system domains. “Internal Use Only” sets up a restricted access security policy to our network. Any access, including from a website would require company mandated credentials to log on and enter the system. This type of policy is enforced because companies do not want to allow “free access” to their network for potential threats to their system or their security. This policy will impact three of the seven domains. These include: * User Domain * Define: This Domain defines what users have access to the information system.   * Policy Impact: The IT Team will use the User domain to define who has access to the company’s information systems. The domain will impose an acceptable use policy (AUP) that will define the permissions of what actions a user may make while inside the system. These permissions may also be defined by the data they are accessing at the time. All third party users (vendors, contractors, outside users, etc.) must also agree to the AUP. Any violation will be reported to management and/or the authorities, depending on the violation. * Workstation......

Words: 508 - Pages: 3

Premium Essay

Nt2580 Week 5 Essay 1

...Crystal Smith 8/30/2015 NT2580-Week 5 Essay Public and Private Sectors Agree: Strong Manufacturing Is Key to U.S. Innovation and a Competitive Future Federal Government Seeks Input on Cross-Sector Initiatives to Bolster Manufacturing New York, May 15, 2012 U.S. scientists, industry leaders, and public officials joined on May 8, 2012, for a discussion on how to nurture talent and fuel new scientific breakthroughs for America to have options that are more competitive. Among the speakers and participants were experts in research and development, renewable energy, smart grid, and advanced manufacturing, representing a number of member organizations of the American National Standards Institute (ANSI) from both the public and private sectors. The very important message was that our ability to innovate and build a stronger U.S. economy is very dependent on our manufacturing capability. The Advanced Manufacturing National Program Office, an interagency effort based at NIST, has released a request for information (RFI) seeking ideas, recommendations, and other public input on the design, governance, and other aspects of public-private partnership, the National Network for Manufacturing Innovation (NNMI). The NNMI will be the foundation of a U.S. innovation infrastructure of up to 15 linked regional hubs of manufacturing excellence, called Institutes of Manufacturing Innovation (IMIs). The IMIs would join industry, universities, community colleges, federal agencies, and...

Words: 417 - Pages: 2

Premium Essay

Nt2580

...A: Write a description of your communication behavior in problem-solving groups. Include a Description of the way you formulate and send messages, receive the skills you use, contribute your information and ideas to the group, receive information about group meetings and group business, and so on. I always try to identify and remember my group members by their names, followed by writing each members contact and communication information down. I encourage all members to brainstorm on the subject at hand while we identify our strength and weaknesses. After brainstorming, task is written down and various members are asked to pick a topic they are comfortable with. Deadlines for various group assignments are then set and group members are encouraged to respect them. In the event that I’m unable to make it to a group meeting, I send out a brief but a precise email to the group leader or all members explaining my absence. B: What are your strengths in communicating, and what areas need improvement? My listening ability and clearly communicating with simple and effective phrases and sentences are some of my strength. The area of my communication that needs improvement is through the phone or mail. Since I turn to use a lot of gesture when communicating, it is very difficult for me to do this when I’m writing or talking on the phone. C: After you have written your description, meet with two people who know you well and discus it with them. Can they add anything? Do they have......

Words: 308 - Pages: 2

Premium Essay

Nt2580 Unit 3 Assignment & Lab

...NT2580 Unit 3 Assignment & Lab Unit 3. Assignment 1 - Remote Access Control Policy Definition There are three key parts I will have to take into account while designing a Remote Access Control Policy for Richman Investments. These three parts (Identification, Authentication and Authorization) will not be all for the Remote Access Control Policy, I will need to include the appropriate access controls for systems, applications and data access. I will also need to include my justification for using the selected access controls for systems, applications and data access. The first part I need to implement for this Remote Access Control Policy is Identification, which is defined in this sense as: physical keys or cards, smart cards, and other physical devices that might be used to gain access to something. What needs to be done for the Remote Access Control Policy is a group member policy needs to be setup which uniquely identifies each user. Users should be identified by rank with higher ranking users requiring more authentication. Each individual user should be assigned to a group based on rank with special permissions. Using this system for Identification will make our company more secure in day to day operations. The second part I need to implement for this remote access control policy is Authentication, which is defined as: what you know or passwords, numeric keys, PIN numbers, secret questions and answers. For remote access, there must......

Words: 477 - Pages: 2