Description
you should answer the the questions according to the book (Guide to Networks) here is the the book link https://drive.google.com/open?id=1O8rPf72zBJeN-iBl... all question should be answers well it is very important work.
I will send you the book if you wish
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
I look forward working with you. good bye
Surname 1
Student’s Name
Instructor
Course
Date
INFORMATION TECHNOLOGY
Question 5
1. Protocols and configurations/equipment in the church network configuration
You need to specify how the members can connect to the network from their homes and
which ports they must use. Set up a server which is capable of connecting all the members from
their homes remotely based on the use of a preshared key, specific address and also specific
ports.The server should also be able to block any connection by which a member has tried to
access the network with an incorrect username or a wrong password and thus lock out attackers.
Set up a specific remote connection which can be given to the users to connect to the church
network.this reduces the support cost
and also it ensures that the members follow your
connection methods and protocols
2. Describe in detail all the protocols and configurations/equipment you will need to
accomplish this.
3. The actions and configurations I would recommend too highly secure the church’s network
and computers based on topics discussed in Chapter 8 is Use of intrusion detection and
prevention (IDS) software on the server to monitor the network and also to notify when there is a
suspicious activity. Use of firewalls the firewalls acts as a filter and between networks and
therefore monitor the network from the inside. Use of SIEM Security Information an Event
Management this can be used to evaluate data significantly for specific events that require
1
Surname 2
attention from IT specialists. Use of logon delay this may include time of the day where some
users can o...