WEEK 12-13 SESSION: PRESENTATION & EXAM

These 2 weeks consisted only of the presentation, each student had to go up in front of the class and give a presentation on what kind of Network Configuration they designed for the company Acme PLC and they had to calculate how much each piece of hardware will cost. There was no right or wrong answer only different methods.

Below contain’s each slide from my presentation:

We have an upcoming exam on the 22nd June which will cover infosec and various other things we covered in the week. we went through potential questions that could come up in the exam:

Question 1

You visited the Infosec Expo and attended a specialist seminar on behalf of  LSBU a university in a major city. The institute requested you write a report on your visit there. Summarise your main findings with special regard to these issues:

  • BYOD, BYOX or COPE which of these was trending the most at the event?
  • Enterprise apps – what are the major threats
  • The Internet of things – should the institute be worried?

    You should reference any seminars you attended or literature you acquired.

Question 2

The use of videoconferencing is a major trend in business communications. This question focuses on the value it adds to enterprise operations.

Question 3

Communicating data from a transmitter to a receiver is one of the major challenges of enterprise network management.

Question 4

Data transmission in network communications occurs at the physical layer through the use of electromagnetic waves.

Question 5

This question is concerned with data link control and multiplexing

Question 6

This question focuses on the operation of the Internet, the network that hosts the e-commerce and m-commerce of the enterprise.

probably not going to be a next time………..

WEEK 11 SESSION: INFOSECURITY EUROPE VISIT

There was no Lecture or Tutorial session this week so instead, we were instructed by Paul and Patrice to attend an special Security Exhibition which is held once a year called Infosecurity Europe (infosec for short). The main aim of sending us there was to gather information for an exam question related to the exhibition itself and the secondary aim for me personally was to research on potential employers to work with when i graduate from university.

Whilst i was at Infosec, myself accompanied by a small group of classmates (Valdo Carvalho, Abdual Hassan & Yordan) conducted informal interviews with the aim of finding potential answers to the exam questions set to us.

This was the exam question set to us (see below):

Exam Question 1 – what you must consider after the event

You visited the Infosec Expo and attended a specialist seminar on behalf of El SBU a university in a major city. The institute requested you write a report on your visit there. Summarise your main findings with special regard to these issues:

  • BYOD, BYOX or COPE which of these was trending the most at the event?
  • Enterprise apps – what are the major threats
  • The Internet of things – should the institute be worried?

 

Myself and my group spoke to 12 different companies making references to the exam question and they each gave there own unique interpretive answer. (Below are the names of the 12 companies that were interviewed and the recordings).

 

Absolute Computrace

Absolute Computrace allows organizations to persistently track and secure all of their endpoints within a single cloud-based console. Computers and ultra-portable devices such as netbooks, tablets, and smart phones can be remotely managed and secured to ensure—and most importantly prove—that endpoint IT compliance processes are properly implemented and enforced.

 

Cisco Security

 

Communication Security

 

iBoss Network Security

iboss Web security solutions deliver comprehensive protection 
across HTTP and SSL traffic and applications, securing all devices, including mobile, whether on- or off-network

 

Juniper Networks

Juniper Networks, Inc. is an American manufacturer of networking equipment founded in 1996 by Pradeep Sindhu. It is headquartered in Sunnyvale, California, USA. The company designs and sells high-performance Internet Protocolnetwork products and services. Juniper’s main products include T-seriesM-seriesE-seriesMX-series, and J-seriesfamilies of routersEX-series Ethernet switches and SRX-series security products. Junos, Juniper’s own network operating system, runs on most Juniper products.

 

Network Behavior

 

Professional Security System

 

Protect what matters

 

Serverchoice

In a world where the internet, mobile and the cloud have become central to everything we do, the importance of IT security has become paramount. The need for a company to protect itself against the various cyber threats, both established and emerging, has never been greater.

ServerChoice have invested heavily in our security measures. This naturally includes our world-class infrastructure, but also extends to our staff. We have created a ‘Security First’ company culture that underpins everything we do. ServerChoice are ISO 27001 accredited and we were one of the first companies in the UK to achieve PCI DSS v3.0 Level 1 Service Provider status, meaning our data centres and cloud platforms are compliant to the highest level achievable.

 

Vasko

 

Vormetric

Vormetric addresses industry compliance mandates and government regulations globally by securing data in physical, virtual and cloud infrastructures, through: Data Encryption, Key Management, Access Policies, Privileged User Control, and Security Intelligence.

 

Websense

Websense, Inc. is a global leader in protecting organizations from the latest cyberattacks and data theft. Websense® TRITON® comprehensive security solutions unify web security, email security, mobile security and data loss prevention (DLP) at the lowest total cost of ownership. Tens of thousands of enterprises rely on Websense TRITON security intelligence to stop advanced persistent threats, targeted attacks and evolving malware. Websense prevents data breaches, intellectual property theft and enforces security compliance and best practices. A global network of channel partners distributes scalable, unified appliance- and cloud-based Websense TRITON solutions.

 

on an informal note, here’s a few pictures and videos taken around infosec:

 

DSC_0110[1] DSC_0112[1] DSC_0113[1] DSC_0116[1] DSC_0128[1] DSC_0130[1] DSC_0131[1] DSC_0137[1]

 

Till next time……….

 

 

 

 

 

WEEK 10 SESSION: CISCO PACKET TRACER COURSEWORK/PRESENTATION

In this session, my primary objective was to work on the coursework using Cisco Packet Tracer.

Coursework Spec:

ITIM Weeks 9-13 tutorial instructions

This task is going to take up the rest of your tutorial time, Weeks 9, 10 and 12. InfoSec is week 11 (no tutorial) and Week 13 is presentation time. This work will feed into your presentation.

Your task is to design a new network for Acme PLC. They are starting with a three floor building, furniture, electricity and no IT infrastructure at all.

They are looking to you to come up with a solution :- Internet, wi-fi, printing, applications, network equipment, VOIP, cloud, etc. (use your imagination).

Ground floor

  • Reception area with receptionist.
  • CEO’s office, Chief accountant’s office, CIO’s office, Head of HR’s office, network equipment room.

First floor

  • Three offices with 6 desks in each.

Second floor

  • One office with 6 desks and one meeting/conference room where meetings and presentations take place.

You should keep a detailed budget as you work toward your draft network design. There is no ideal answer to this problem. Each student will have a different answer.

 

In my version which i will make into a presentation, I have created a Ground Floor, First Floor, Second Floor:

 

GROUND FLOOR

ground floor

 

The Ground Floor contains 5 PC’s belonging to the Receptionist, CEO, Head of Human Resources, CIO, and the Chief Accountant. They are all connected to the Ground Floor Switch which is also connected to the Printer. The Ground Floor also contains an Land-line phone and a WI-FI receiver which is also connected to the switch. The WI-FI receiver is installed on every floor so that external devices can connect to it (e.g. Tablet and PDA shown in the diagram). The switch is also linked to the router which is linked to the main ACME PLC server which also implements the intranet.

 

FIRST FLOOR

first floor

The First Floor contains 3 office with 6 desks in each so I created another switch and added 2 Printers instead of one due to the amount of PC’s and to slice the network traffic in half. i also too the liberty of adding a DCHP server so it can assign IP Address’s to any device connecting to the network. Also i added a WI-FI receiver on the floor so that external devices can connect to the network.

 

SECOND FLOOR

second  floor

 

The second floor has it’s own switch which is connecting 6 PC’s. This floor will contain an office with up to 6 PC’s and a separate office only for conference meetings. I added a printer to this floor as well and well as another additional WI-FI receiver. I decided to Install a home VoIP (Voice Over Internet Protocol). The advantage to VoIP phone calls is that unlike regular long-distance calls, calls made through a VoIP phone service are free – there are no fees beyond the cost of your Internet access. To complement this i also added another IP Phone to act as a “Conference Phone” which can also be used.

I took the liberty of installing a Proxy Server. It is a server that sits between a client application, such as a Web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server. I decided to use this because since this a organisation, they are going to want to see what goes in and out of  there intranet, plus the organisation might want to prevent there employees from accessing specific websites.

 

I personally think it’s not bad for a first try, i tried to base my idea on an image of a topology I found on Google:

chap5-net

 

But the only thing I couldn’t really find was the firewall (you can imagine i wasn’t very happy with that). I will incorporate this into my Presentation when i present this to Paul in week 13. I actually enjoyed making this topology once i got the hang of it and I hope to use this in the future.

 

 

Till Next Time……………

WEEK 9 SESSION: Cisco Packet Tracer Coursework

Right now i am practicing for my coursework on how to use Cisco Packet Tracer:

ITIM Weeks 9-13 tutorial instructions

This task is going to take up the rest of your tutorial time, Weeks 9, 10 and 12. InfoSec is week 11 (no tutorial) and Week 13 is presentation time. This work will feed into your presentation.

Your task is to design a new network for Acme PLC. They are starting with a three floor building, furniture, electricity and no IT infrastructure at all.

They are looking to you to come up with a solution :- Internet, wi-fi, printing, applications, network equipment, VOIP, cloud, etc. (use your imagination).

Ground floor

Reception area with receptionist.
CEO’s office, Chief accountant’s office, CIO’s office, Head of HR’s office, network equipment room.
First floor

Three offices with 6 desks in each.
Second floor

One office with 6 desks and one meeting/conference room where meetings and presentations take place.
You should keep a detailed budget as you work toward your draft network design. There is no ideal answer to this problem. Each student will have a different answer.

 

more to come soon…………

WEEK 8 SESSION: VIDEO CONFERENCING/CISCO PACKET TRACER

In the lecture we did a recap on the dry run of the Video Conference we done a couple weeks ago. What Paul did was he recorded the entire thing so that if we wanted to make any edit’s, we could edit it and then re-post it up on Moodle. we also examined the risks and thought up solutions and measures that could be in place to eliminate that risk:

  • Make sure system is up to date
  • Investigate Wi-Fi
  • Warnings about wi-fi => 10 seconds delay on the tablet tethered to phone, phone was blackberry.
  • Tablet and android apps can’t see full text iPhone can.
  • Make sure the meeting is recorded at all times.
  • If people have been logging in twice it will cause problems such as confusing them as a presenter.
  • Presenters looking at projector instead of laptops and desktops
  • Should say when questions can be answered in the conference
  • Screen sharing does not work in google chrome
  • If the presenter machine crashes the webcam and microphone will have to be enabled again
  • Some presenters ran away
  • Always put up phone number so people can contact us
  • Links don’t work on mobile phone
  • Sharing someone’s screen has to be investigated
  • Have the closing message prepared before closing.

Here is the link for the video we did of the Dry Run Video Conference (unedited): http://connect.lsbu.ac.uk/p4xl8868bjv/?launcher=false&fcsContent=true&pbMode=normal

In the tutorial, we started using a new software called Cisco Packet Tracer. Cisco Packet Tracer is a powerful network simulation program that allows students to experiment with network behavior and ask “what if” questions. As an integral part of the Networking Academy comprehensive learning experience, Packet Tracer provides simulation, visualization, authoring, assessment, and collaboration capabilities and facilitates the teaching and learning of complex technology concepts.

The weeks leading up to Week 13, we are going to use Cisco Packet Tracer for our coursework/presentation. What we did for the duration for the tutorial session was experiment with it and looking for tutorials on the program itself and YouTube.

What i did first was create a Topology using a Network Switch  which was linked up to 5 different PC’s:

Packet Tracer 1

Then I assigned each PC an IPV4 Class-3 address:

IPV4

Then I pinged each PC using the command line:

PING PING 2 PING 3 PING 4 PING 5

Till next time…………………