Thursday, January 30, 2020

Mcsa Networking Basics Essay Example for Free

Mcsa Networking Basics Essay Introduction What is a network? A network can be defined as two or more computers which are linked together to share resources. These resources can include internet access, printers, software and files. The ‘heart’ of a network is called the server, and its function is to contain all the software and services which the network and its users depend on. Figure 1: Example of a basic network The server is operated by personnel called Network or System Administrators, and it’s their responsibility to ensure the smooth running of the network so it is working as efficiently as possible. This is achieved through the use of a dedicated operating system called Windows Server 2003 – this gives the network administrator complete control over the network functions. Advantages for a network Cost Because networked computers can share the same resources, costs can be dramatically reduced. For example, if there are ten computers in a room each needing access to a printer – it is far cheaper to route all ten computers to a single, shared printer than it is to purchase ten printers; one for each computer. In this example, the saving would also include the cost of ink cartridges (you would only need to purchase one set of cartridges instead of ten). Software can be purchased and installed in a similar cost effective way. Most popular software is able to be bought and installed on a server, and anyone who requires to use it will only need to purchase a license (the legal rights to use it, usually in the form of a certificate). These licenses are far cheaper than buying the software for each user. This method also means that it isn’t necessary for an I.T Technician to install the software on every computer; only one install on the server is needed. Another benefit to this approach is when the software requires an update. If it is server based, only the software on the server would need to be updated. All the users would benefit from the update as soon as it has been installed. If each user had a copy on their computer, I.T Technicians would need to update each one. This could become time consuming, expensive and complicated. The software that this could apply to, includes most Microsoft software and Anti-virus software. Security Security is a vital element in any business. In a network, security is enhanced both internally (security within the network) and externally. Users are given a username and password to access their files and all the programs, hardware etc that they have been given access to. When a user saves a file, it is saved to the server and not the computer that he/she is working on. If that user wants to retrieve that file, it can be done on any computer on the network, and not just on the computer that was originally used. This data can be accessed, monitored and backed up by the Network Administrator at any time. Each department can have their own ‘identity’ on the server, which allows them to have access to files, applications and resources which would be relevant to their requirements. For example, the Accounts department may need to have access to invoicing software (e.g. Sage and Excel), whereas Sales may only require software to monitor and forecast sales over a period of time (e.g. Excel). Accounts may not want other departments accessing their software due to security or confidentiality reasons. Internet security is tighter for both users accessing the internet, and external threats when a network is set up. All the computers can share a single access point to the internet, which makes it easier to monitor internet usage, help reduce hacking and other external threats trying to access data on the network. Another feature which can be applied by the system administrator is Encryption. Data within a folder/subfolder can be encrypted to prevent unauthorized access to data if other security measures have been breached. Typically, only system administrators will be given the ‘recovery key’ to be able to decrypt data incase of system failure or other unforeseen situations. Disadvantages for a network Expensive to install The initial cost of setting up a network can be expensive, with hardware like the server, router, cabling, backup equipment, network printers and server software. Also, dedicated personnel must be hired to keep the server running efficiently and to resolve any server/network issues. Centralised Data Having all of the data in one place means that data could be lost in the event of a system failure. Regular backups of the server are highly recommended (daily, weekly and monthly) to help to keep data safe. But if the server goes down in between backups then all the recent data will be lost. Reduced Performance The server’s performance can become reduced as the network expands or as its workload increases through the working day. A server must have as much memory and processing power as possible to help minimise the reduction in performance. Task 2a Network Topology is the description of how a network is laid out, the devices (server, routers, printers etc) attached to it and the direction which data flows. A network can be described as either Logical Topology (the way data flows in a network) or as a Physical Topology (how a network is physically laid out) There are six main topologies, Bus, Ring, Star, Extended Star, Hierarchical, and Mesh. Bus Topology This can be both a Physical and Logical, in a local area network (LAN), each device is connected by a single cable. This single cable is also referred to as the ‘backbone’ of the network. A terminator must be on either side of the cable to prevent the data signal from bouncing back down it. The Bus Topology was widely used in early networks using standard Co-ax cables. It was an economical solution for networking as only one main cable was needed. The disadvantage to this was if this cable failed, the whole network would go down. Ring Topology In a Ring Topology (also known as IBM Ring Token), each computer (node) is connected to each other in a closed loop. Each computer has its own unique identity on the network. When data is transmitted from one node to the other, the data will include the destination’s identity and will pass through each node until it reaches the destination. This type of topology has two main disadvantages; only one computer can transmit data on the network at a time and if a computer fails the whole network will go down. There is a slight variation to this; the Duel Ring Topology The second ring within the network provides a backup connection, so if there is a failure within the network, the secondary connection will keep the network connected. This is expensive as more cabling is required. Star Topology The most common type is called a Star Topology. Each device is connected to a dedicated central hub. All the data on the network flows through the network via the central hub. These types of networks tend to be small, as data could be degraded or lost on a large network. The main advantages to this is that it is easy to setup and easy to add new devices to the network. But if the central hub fails, the whole network goes down. Extended Star Similar to the Star Topology, but instead computers are grouped together and connected to a local hub, which in turn is connected to a central hub. This is widely used in large networks where the network may be in a large building, and each group of computers may represent each department. There are more points of failure on this network, but if a local hub fails, then the rest of the network will not be affected. Hierarchical or Tree Topology This is very similar to a Ring Topology, but computers are attached to the central hub in layers. While the structure looks different, this still has the main disadvantage of network failure if the top device goes down. Mesh Topology All the above topologies suffer from the same problem. If one device fails on the network, the whole network goes down. The only solution is to connect each device with each other and remove the need for a server. This is the Mesh Topology and has two main advantages; If a device fails, the network will still work and the network doesn’t need to rely on the processing power, bandwidth etc from a server as it is supplied from each computer. The disadvantage to this is the high cost of connecting each device to each other, so this would not be suitable on a large network. This type of topology is also referred to as Peer-to-Peer whereas the other topologies are considered to be Client/Server based. A comprise between cost and connectivity would be the Partial Connected Topology. Devices are connected to more than one node on the network, so if one fails the network can still work. This is more cost effective than Mesh Topology as less cabling is required. Task 2b Recommendations As it stands, the structure of the current network is a Hierarchical or Tree Topology. The network uses two different switches to connect the Domain Controller to the 24 computers. These are from two manufacturers; CISCO and 3Com and this offers 100Mb and 10Mb speeds respectively. This is a disadvantage because one ‘group’ of computers has a quicker data transfer rate than the other. The network does not have a disaster recovery plan should the Domain Controller fail. This has the potential for putting the whole network at risk from permanent data loss. The network also shares a single printer which is attached to the Domain Controller, 10 of the computers are connected to it through the slower 3Com 10Mb switch. This means all 24 computers print via the Domain Controller (which is currently overloaded) and 10 computers send data at a slower rate than the rest of the network. My first recommendation would be to replace both switches with a single CISCO 100Mb 48 port switch ( £631.99 from MISCO website). This would provide a standard, quicker data transfer speed throughout the network and allow for the network to expand. There are a total of 24 computers, and this switch would enable a further 24 devices to be added to the network e.g. additional computers, printers etc. This would allow the network to expand whilst maintaining a fast data transfer speed. With the new switch in place, my next recommendation would be to replace the HP Laserjet III (USB connection only) with a newer, network-ready printer like the HP Laserjet 2055DN or P2030 which costs  £319 and  £160 from HP website. By replacing it with a newer model, printing could be completed quicker, quieter and more cost effectively e.g. more reliable printing, more energy efficient, lower consumable costs etc. Also, sharing the workload throughout a faster network is more efficient than channelling all the printing requirements of the network to an older single printer on a slow 10Mb switch via the Domain Controller. This will also help reduce the workload to the Domain Controller. While the Domain Controller’s workload can be reduced by the addition of a network-ready printer, other options could be to increase the specifications (e.g greater hard drive space, more memory etc). Ensuring the controller has the latest software updates will ensure both the running efficiency and increase the network security. This will help prevent unauthorised access (hacking) to the network. My final recommendation is add disaster recovery and remote working within the network, By regularly backing up data on a daily/weekly/monthly basis, this will ensure the network can be restored in case of total data loss. To assist learning or to prevent students from accidentally causing errors/problems within the network, remote working should be enabled. User accounts can be easy created in Active Directory though the use of a standard template. Templates could be set up for both students and tutors, so all of the common properties of the accounts are already established. When a new user account is required, the administrator will only need to complete the fields that require unique values (eg, name, address, telephone number, course details etc). Once the users have been created within the Active Directory, they can be placed into Organisational Units (OU’s). This will group together users, so in this situation students could be placed in OU’s which represent their course. When the OU’s are established, the users’ configuration settings can be applied through the Group Policy Management Console (GPMC). It holds hundreds of user configuration settings, security options and user event logs, all which can be applied as required by the college administrators. Figure 2: Example of the Group Policy Management Console (GPMC) By using Group Policies effectively, the administrator can control and manage exactly what users can and cannot do whilst logged onto the domain. Administrators are able to control how the desktop appears, the icons that are available and the ability to configure the task bar etc by applying the Desktop setting found within the ‘User Configuration’ in the GPMC. This could be useful if the college policy states that all users must have the Llandrillo College logo as their wallpaper, and various required icons are in place and users to have access to various programs via the ‘start’ menu. To improve password security, administrators are able to increase the effectiveness of the passwords that users apply to protect their identity on the network. The password options can be found within the ‘Password Policy’ within the ‘Computer Configuration section of the GPMC. These options include the ability to reuse old passwords, to apply complexed passwords (eg. more than 6 characters, using upper, lower case letters and digits 0-9). In the example, a programmer has created a random word generator to create passwords. Group policy could be configured so when they log on for the first time, users input the randomly generated password and then they must input their own password using a complexed password. If the user ever forgets the password at any time, administrators are able to reset it through the ‘Active Directory Users Computers’ tool. Figure 3: Example of Password Policy within GPMC To prevent users from using too much disk space on the network, administrators are able to allocate limited disk space to users and by applying prompts when this space is nearly used up. By putting this in place, administrators can calculate how many users will be on the system multiplied by how much hard disk space each user will be allocated. This total will be the minimum amount of disk space required for all users in each new academic year. Administrators will be able to ensure the server can physically hold all the users data without completely running out or running low of disk space. To achieve this, administrators will need to locate the allocated hard drive and apply a quota, limiting users on how much space they can use. Individual users can have separate entries in the quota, allowing them to have a lesser or a greater share of disk space. This would be useful for tutors who may need greater disk space to store course material etc. When the network is running, administrators may be required to monitor the networks resources to ensure it exceeds the users demands. The tool required is called the ‘Performance Console’ which is found under Administrative Tools. This tool appears in the form of a graph although it has three counters as a default (Memory:Pages/Second, PhysicalDisk: Average Disk Queue Length and Processor: % Processor Time), additional counters can be easily added or removed accordingly. A college administrator may add counters to monitor network bandwidth, server utilisation (memory, cpu performance, disk performance etc). To help administrators monitor the server, counter logs and alerts can be applied. This can enable administrators to proactively identify when system resources run too low or to identify possible hardware failures/malfunctions. Any one of these problems could result in a degraded performance or total server failure. Figure 5: Example of the Performance Console The college network may be required to support remote users, allowing them to access the college network whilst being in a different location eg working from home, from another campus etc. This can be achieved through the use of a Virtual Private Network (VPN). The user will be able to access the college’s network through the use of the internet whilst achieving the required security and data encryption. The network’s firewall must have exceptions to allow authenticated users to access the network whilst preventing unauthorised access. Once the network is running effectively, the next challenge administrators will face is maintaining the security and the efficiency of the network. This can be achieved by deploying server updates and hotfixes as provided by Microsoft. The server can be updated with the use of ‘Automatic Updates’, which can be found within the ‘All Programs’ menu under the start button. Updates can be downloaded either straight away or scheduled to download at a certain day/time. This could be configured to download when the network is at its quietest time (eg 10pm). This would ensure that the update would not effect the overall performance during busy periods. Also, updates for the users computers may be required. Instead of administrators physically installing them on every computer on the network, this could be downloaded on the server as an *msi file and automatically installed via a group policy. So the next time users within the network log onto the network, they will automatically be downloaded installing the updates from the server with no intervention required.

Wednesday, January 22, 2020

Future of an Illusion by Sigmund Freud Essay -- Future Illusion Sigmun

Future of an Illusion by Sigmund Freud In his book Future of an Illusion, Sigmund Freud utilizes his method of psychoanalysis on religion by comparing the relationship between human and religion to that of a child and his parents. Freud effectively demonstrates that religion is a product of the human mind. After exposing religion as a an illusion, Freud concludes that humanity will be better off when it has forgone religion. This paper will argue that Freud's assertion that religion is an illusion is correct because of it's blatantly traceable evolution through the history of the human civilization and psyche.   Ã‚  Ã‚  Ã‚  Ã‚  The first argument that Freud makes in his assault on religion regards civilization. Freud argues that human civilization arose as a result of mankind's needs to protect itself from nature. "It was precisely because of these dangers with which nature threatens us that we came together and created civilization." (Freud, 19) As a result of the need for organization and manpower to prepare defenses against nature, the instincts of man had to be controlled. He furthers this argument by saying that two human traits, laziness and the unwilling nature of the masses to listen to reason, are responsible for the necessity of the rule of law. Freud then describes the various methods of oppression that can be employed by civilization to halt instinctual privation. The most important of which he points out as being religion.   Ã‚  Ã‚  Ã‚  Ã‚  The main reason that Freud ranks rel...

Tuesday, January 14, 2020

Malicious Attacks

Malicious attacks basically seek to exploit vulnerabilities in a network. These threats can be passive or active and have very negative consequences. The difference between active and passive attacks are that active attacks makes changes or modifications to the data or attempt to gain some type of access to the network, while passive attacks do not make changes to the system at all. According to Solomon, 2012, there are many malicious attacks and threats that can be carried out against the network, some of which are identified below: -Brute force attacks are one of the most tried and true attack methods where the attacker uses a software program to try all possible combinations of a password, security code or user ID, until one of them is successful. -Hijacking is another type of attack that involves the attacker taking control of a session between two machines and masquerades as one of them. This can involve man-in-the-middle, browser or session hijacking. Social engineering is another common attack where the attacker tricks the user in carrying out actions for them; for example, the attacker may obtain the user’s login credentials by posing as an IT Specialist which would then help the intruder gain access to the network. -Computer viruses act like a biological virus, where it infects the host program and could cause the host program to replicate itself to other computers. Some of these viruses have become smarter with the capability to combat malware-detection programs by disabling their detection functions. Trojan horse is a malware program that masquerades as a useful program They use their outward appears to trick users into running them; they look like programs that perform useful tasks but actually hid malicious code. -Rootkits are newer types of malware that modifies or replaces one or more existing programs to hide traces of attacks. -Spyware is a type of malware that specifically threatens the confidentiality of information. It does this by gathering information about a user through an Internet connection without the users’ knowledge. The impacts of all of the above attacks could damage or disrupt the system. It could also cause security privileges to be escalated to allow the intruder to access, modify or even delete private data. Additionally, as a result of any intrusion on the network, users would experience PC slowness, crashes and just no access at all to necessary resources. Malicious software is a major threat to the network, internal attackers, equipment theft and denial threats can pose even more of threat. Internal ttackers reside within the company and could be a cybercriminal, which is why it’s important to monitor the threats constantly and carefully. Equipment theft can also pose a serious threat because if equipment ends up in the wrong hands, confidential information could be exposed like account numbers or access codes. Lastly, Denial threats make assets or resources unavailable or unusable by flooding a specific port on a server rendering authorized users no access to import resources, wh ich could be a severe impact. If there is a vulnerability in the network or organization, then there is a possibility of a threat. If the vulnerability can be eliminated or addressed, the risks of attacks or threats are greatly decreased. Some common vulnerabilities are listed below according to Radack, 2013: -In the user domain where the user lacks the awareness of security policies or accidental violation of acceptable use policy in the user domain. -In the workstation domain there could be weaknesses in installed software and where unauthorized users could access the system. In the LAN domain, transmitting private data unencrypted, unauthorized network access and where malicious software can be spread -In the LAN-to-WAN domain there could be exposure and unauthorized access of internal resources to the public and loss of productivity due to internet access. -In the remote access domain is where brute-force attacks occur on access and private data and data leakage from remote access or lost storage devices. In the system and application domain there could be unauthorized physical or logical access to resources and weaknesses in server operating system or application software. -With VoIP there could be default manufacturer passwords still in place, insecure class-of-service settings and trunk access group restriction settings. The impact of any vulnerability is of course the possibility of a threat succeeding. A vulnerability is considered a weakness and any weakness in a network or organization will quickly be exploited by an attacker. The attacker is able to obtain information in all seven domains if one domain is not fully protected. For example, if a brute-force attack is deployed on a network and successful, it could affect users access to resources. Users could be in accordance with security policies and following correct protocol in order to protect the network as much as they can but if the brute-force attack is indeed successful, they efforts are thwarted. This is why it’s important to address each and every possible vulnerability in the seven domains of a network. If users are equipped with the right security tools; workstations are secure with strict access control policies; LAN servers are secured with various standards and guidelines; LAN-to-WAN security should maintained while allowing users as much access as possible; WAN domain has confidential encryption of data transmission; remote access domain has security controls applied according to policies; lastly if the systems/application domain has security policies, procedures and guidelines implemented in the various applications or systems, all vulnerabilities would be addressed.

Monday, January 6, 2020

Alcoholism And The Consumption Of Alcoholic Liquor

Over eighty percent of the world’s population over the age of eighteen has consumed an alcoholic beverage sometime in their lives. Of which, fifty-six percent of them have consumed an alcohol this month (http://www.niaaa.nih.gov/). â€Å"Alcoholism is an addiction to the consumption of alcoholic liquor. Alcoholism is considered to be a mental illness that results in alcohol dependency† (Webster Dictionary). Statistics state that there were 2.5 million deaths worldwide; and 88,000 deaths in the United States that were alcohol-related. Alcohol is a serious drug that can cause serious damage. Alcohol is a drug that affects the mind and the body. Almost 2,000 people, in the United States, under the age of twenty-one die in car crashes in which underage drinking was involved annually. Nearly half of all violent deaths involving teens involve the use of alcohol (www.psychcentral.com ). It is believed that the drinking age from eighteen to twenty-one will reduce fatalities and limit addiction. Alcoholism is an illness and causes permanent damage to your brain cells. This is the main reason why I believe the legal drinking age in the Bahamas should be twenty-one instead of eighteen. A person’s brain is not fully developed until they reach the age of twenty-five. This three year time difference between eighteen and twenty-one will give a person’s brain more time to develop and be able to handle the effect of alcohol better (www.urmc.rochester.edu). Alcohol consumption can causeShow MoreRelatedDuring the late 19th century and early 20th century the United States saw many political reforms1100 Words   |  5 Pagesalmost seven gallons of pure alcohol a year. Prohibition was a period of time in which the average citizen broke the law because alcohol was a major part of citizens’ lives and the restrictions on the sale, transportation, and manufacturing of alcoholic beverages illegal. The urbanized North and Midwest were against Prohibition and the rural West and South supported the ban of alcohol. Even though that the issue of Prohibition was a regional issue across the nation, there were supporters and anti-ProhibitionistsRead MoreEssay about Alcoholism1398 Words   |  6 Pages quot;Alcohol is a socially acceptable, legal drug that is consumed by the majority of Americans without problems to themselves or others (Milgram xiii).quot; Misuse of alcohol can lead to alcoholism, one of the most widespread and complex problems in America. The reasons some people become dependent on alcohol and others do not are unknown. Many health problems are associated with chronic alcohol abuse, including damage to the liver, brain, or central nervous system. nbsp;nbsp;nbsp;nbsp;nbsp;AlcoholRead MoreThe English Liquor Is A Liquor Brand Produced By Miller Products1227 Words   |  5 PagesEnglish liquor is a malt liquor brand produced by Miller Products that was established in 1964. Malt liquor is a strong lager or ale in which sugar, corn or other aides are added to the malted barley to boost the total amount of fermentable sugars and consequently boost the concluding alcohol concentration without creating a heavier or sweeter taste. Malt liquor is beer with a much higher alcohol content which contributes to higher alcohol addiction. Legally, it often includes any alcoholic beverageRead MoreAlcoholism Is The Addiction Of Alcoholic Liquor Or The Mental Illness1012 Words   |  5 PagesWhat is alcoholism? It is the addiction of the consumption of alcoholic liquor or the mental illness, as well as mental behavior, resulting from alcohol dependency. As you take your first sip, alcohol enters your bloodstream. According to the 2015 National Survey on Drug Use and Health, 15.1 million adults ages eighteen and older had alcohol use disorder. Also according to the 2015 National Survey on Drug Use and Health, an estimated 623,000 adolescents ages between twelve and seventeen had alcoholRead MoreThe Effects Of Alcoholism On A Young Girl Nichole Struggling With The Effects And Consequences Of Alcoholism1346 Words   |  6 Pageshave ever seen. The documentary demonstrated a young girl Nichole struggling with the effects and consequences of alcoholism. Alcoholism is an excessive intake of alcohol consistently causing withdrawal when the intake of it reduces or stops completely. (cite this?) Alcohol is one of the most commonly abused substances in today s society. It is also the most underestimated. Alcoholism causes a wide range of long- term effects as well as short- term effects which could potentially be fatal if youRead MoreYouth Addiction Alcohol : Causes And Concerns1544 Words   |  7 Pagesalcohol consumption. Unl ike in the early 1900’s when alcohol was heavily regulated – alcohol was even banned in the United States from 1919 – 1933 due to prohibition – it is now normal for anyone above the legal drinking age to walk into a liquor store and buy as much alcohol as desired with no restrictions or regulations. Alcohol has changed the way we live our lives. It is now widely believed that alcohol makes socializing easier and has even become a tradition to serve and drink alcoholic beveragesRead MoreAlcohol Death And Its Effect On Family Life1625 Words   |  7 PagesLong time ago, wine and liquor has adhere to the life for the people not only in the United States but others countries. Wine and liquor is considered such as alcohol drink which is moderate amount of it and gives the person a sense of pleasure, harmony, forget the difficulties and hardships of life. However, thousands of alcohol-death case happened every year and more than 1/3 of adult people drank alcoh ol to cause themselves in a high-risk situation.So, the long-term alcohol into the body willRead MoreAlcoholism a Social Problem?1593 Words   |  7 Pages and participating in activities that previously involved alcohol or drug use. Relapse, as a social problem, would be a debatable if people drank alcohol in a responsible manner, however according to the National Institute on Alcohol Abuse and Alcoholism (2002), more than half of the adult U.S. population drank alcohol in the past 30 days. Interestingly, approximately 5% of the total population drank heavily, while 15% of the population binge drank. From 2001–2005, there were nearly 80,000 deathsRead MoreWhy Canada Needs A New Alcohol Strategy952 Words   |  4 Pageswho had smoked a cigarette. Of the students who drank, 30 per cent had binged. Binge drinking is defined as five or more drinks at a single sitting. There are many risks alcohol poses, but the major ones include, drunk driving, increased risk of alcoholism , learning and memory impairment, sexual assault/abuse and suicide. Adults are drinking harmful amounts of alcohol, putting them at high risks of health. According to stats Canada, nearly 20 per cent of Canadians are heavy drinkers. One in four CanadiansRead MoreThe Role of Alcohol in A Streetcar Named Desire Essay1674 Words   |  7 Pagesbefore a person must accept the consequences for their own actions? Tennessee Williams delves into the theme of alcohol dependence throughout his play, A Streetcar Named Desire. Throughout the play, both Blanche and Stanley seem to rely heavily upon liquor. Alcohol is used as both a crutch and an excuse for poor behavior in A Streetcar Named Desire, and has become even more prevalent in today’s society. Throughout A Streetcar Named Desire, Blanche Dubois, the protagonist, frequently uses alcohol