Access over 20 million homework & study documents

System Access

Content type
User Generated
Subject
Computer Science
Type
Homework
Rating
Showing Page:
1/4
Running head: SYSTEM ACCESS 1
System Access
Name
Institution

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/4
SYSTEM ACCESS 2
System Access
Network traffic monitoring is an important part of the responsibilities of the information
technology security of an organization to prevent unauthorized access to its network. One of the
benefits of monitoring the performance of a network is that intrusion that can cause substantial
damages can easily be detected and protocols for securing the network will be implemented
immediately. According to Biswas (2014), there are several proprietary systems such as the
Monitoring Analysis and Response System (MARS) from Cisco and Intrusion Detection
System/Internet Protocol System (IDS/IPS) and packet sniffing software that can be used to
analyze the pattern of the traffic of the network. Although all these systems perform the same
function, the methods used to achieve their purposes differ.
One of such method is to connect a hub to the device that is used as the broadcast domain
from the server to the switches in the network. This method will enable the administrator to
monitor and analyze all traffic on the terminal where the sniffing device is installed. An
additional method for examining network traffic is address resolution protocol (ARP) spoofing.
This method is preferred in non-critical environments that require network traffic information
between devices connected to it. To achieve the evaluation of the performance, a network sniffer
is installed on the machine that sends all information regarding traffic to designated server. A
final method is the remote packet capture system (RPCAP) that involves the inclusion of a user
program that collects data for analysis remotely (Biswas, 2014). The advantage of over this
method over other is the possibility to collect performance data remotely without interfering with
system usage.
Pilli, Joshi & Niyogi (2010) stated that the importance of the OSI model in discussions
regarding network traffic can be observed in four of its seven layers where data is transmitted

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/4

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 4 pages?
Access Now
Unformatted Attachment Preview
Running head: SYSTEM ACCESS 1 System Access Name Institution SYSTEM ACCESS 2 System Access Network traffic monitoring is an important part of the responsibilities of the information technology security of an organization to prevent unauthorized access to its network. One of the benefits of monitoring the performance of a network is that intrusion that can cause substantial damages can easily be detected and protocols for securing the network will be implemented immediately. According to Biswas (2014), there are several proprietary systems such as the Monitoring Analysis and Response System (MARS) from Cisco and Intrusion Detection System/Internet Protocol System (IDS/IPS) and packet sniffing software that can be used to analyze the pattern of the traffic of the network. Although all these systems perform the same function, the methods used to achieve their purposes differ. One of such method is to connect a hub to the device that is used as the broadcast domain from the server to the switches in the network. This method will enable the ad ministrator to monitor and analyze all traffic on the terminal where the sniffing device is installed. An additional method for examining n ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Just the thing I needed, saved me a lot of time.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Documents