CourseLover

(12)

$10/per page/Negotiable

About CourseLover

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Algebra,Applied Sciences See all
Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Engineering,Health & Medical,HR Management,Law,Marketing,Math,Physics,Psychology,Programming,Science Hide all
Teaching Since: May 2017
Last Sign in: 189 Weeks Ago, 4 Days Ago
Questions Answered: 27237
Tutorials Posted: 27372

Education

  • MCS,MBA(IT), Pursuing PHD
    Devry University
    Sep-2004 - Aug-2010

Experience

  • Assistant Financial Analyst
    NatSteel Holdings Pte Ltd
    Aug-2007 - Jul-2017

Category > Architecture and Design Posted 20 Jul 2017 My Price 10.00

to make small ppt

Hello there

I attached file which has 2 small topic. could you please to do ppt with explaining . i don't know how much slides will be enough do as you like.

 

thanks

Routing Protocol Considerations

                As we go higher up the OSI design structure, it is prudent to formulate certain design considerations in the sphere of routing. Routing considerations have gained more attention in recent times when it comes to the public Internet. Regardless of this newfound interest, there are specific areas that need serious consideration. The most vital are of routing is with regards to the security of the routing model (Hartpence, 2011). The reason is because routing protocols can be attacked with intent to achieve specific objectives such as traffic redirection, router DoS, and unwarranted route prefix origination among others. Attackers may, for example, configure and modify existing routers, introduce rogue routers, and may send malformed packets to a routing process.

For a company like The Hashtag Agency that is interested providing business intelligence to clients, routing considerations are highly essential. The company would need to use routing to secure their networks and applications so as to smoothly run their devices. The routing protocol must communicate with other routers (Macfarlane, 2006). It must have the ability to tell of the routines it knows of as well as the systems linked to other routers. Moreover, it must also be able to evaluate the best route to use. It should also be able to adapt to changes in the network as this will affect whether or not it can forward packets. The Hashtag Agency will need to overcome the routing risks outlined above in a number of ways. First, the company must secure the routers so as to mitigate the configuration modification of its routers. It will not simply secure the router but all the complimentary systems like TFTP servers. It can also make use of routing system message authentication to block the introduction of rogue routers from damaging the protocol. Moreover, Hashtag can counter excess packets by using DoS countering techniques. Lastly, it can use route analytics technology to as a best practice policy as it will provide the information needed to understand all the routing protocol information to create a dynamic and accurate routing topology.

                                                                Security considerations

                It is important to ensure that the security of Hashtag users is high to protect confidential information belonging to the users. Intensive testing of the Hashtag system will be done to look out for areas that are weak and vulnerable to attacks. For the infrastructure security of the system, all the devices which are connected to the network like wireless, firewall and core routing devices will regularly be assessed to protect the integrity of the architecture. Additionally, for new programs or users being added into the system, access should be granted approaches can be used to ensure on the security include authentication, authorization, and accounting. For authentication, access to the system should only be for users or groups who are authorized. There should also be some restriction for user privilege to ensure that low-level users only have access to essential parts of the system for security purposes. Accounting should be done to make sure that there is a record of people who access the system and detect any form of malicious activities. All the information in the system should be encrypted to ensure that in the case of any malicious attack; the attackers will not be able to access the system information.

                Another way that could be used to ensure the security of Hashtag system is through the use of a firewall which will create a barrier between an internal network that is secured and one which is not secured. The firewall should also be able to monitor the users who access the system remotely to prevent any form of attack.

 

 

Answers

(12)
Status NEW Posted 20 Jul 2017 01:07 PM My Price 10.00

----------- He-----------llo----------- Si-----------r/M-----------ada-----------m -----------Tha-----------nk -----------You----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------acq-----------uis-----------iti-----------on -----------of -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll

Not Rated(0)
Relevent Questions