Case study

User Generated

cenounxne

Computer Science

Description

Case 5-1: Planning Remote Access

Student solutions will vary depending on your designs. Students can use any remote access method or combination of remote access schemes. Students must demonstrate understanding of the principles of remote access connections and technologies and show that they have planned their designs carefully with the intention of satisfying the task’s requirements.
Student solutions must include an accurate and effective network diagram that shows the physical and logical topology of their network designs with the remote access solution they chose. Students diagrams must be technically correct and incorporate sound networking and security principles.
About the access controls in the requirements list: To demonstrate true understanding of remote access and network design/management, students must state that access to resources is managed through user accounts, file and folder permissions, and so forth. Students remote access solutions need address only how remote users connect to their regular user accounts on the corporate LAN, the type of authentication used, security measures, encryption and tunneling, and so on.

Case 6-1: Implementing Your Remote Access Solution

The solution students develop will be unique to their designs. For this part of the project, students should have updated at least the following sections of their security policies:
• Remote Access
• Violations and Penalties
• Acceptable Use
• Unacceptable Use
• Security User Awareness Training
• Internet and E-Mail
• Appendixes (updated diagrams and new risk analysis documentation)
• Revision History
• Responsibilities (determined who is responsible for maintenance, repairs, monitoring and emergencies for remote access systems), unless the design precludes this (such as having made a single department, manager, or so forth responsible for all aspects of the systems).
• References
• Illegal Activities
• User Accounts and Passwrods
• Physical Security

Case 4-2: Researching Security Products

Students can use the Tool Comparison Chart in Case04File01.doc as a reference for this project.




Unformatted Attachment Preview

Tool Comparison Chart Instructions Look over the examples in the following chart, and then simply run a Google search on “log file analysis tools.” You might want to revise your search terms to get more specific results. Visit several pages, and enter the information here. (More rows can be added as needed.) You can customize your search to look for specific tools, such as log file analysis tools for Snort, Apache Web Server, IIS, or any other tool you have integrated into your design. Remember that you’re looking for tools to use on your network design from Chapter 1. If a tool isn’t compatible with the Windows environment and you have designed an exclusively Windows-compatible network, the tool won’t be much use to you. If you already know you have an Apache Web server, a tool specifically for Apache is great, but a tool that’s compatible with Apache as well as other platforms is better. Those are the rules. Now go have some fun researching tools! Hint: You might want to customize this form for use on other product searches or perhaps find another tool comparison chart that gives more information. If so, remember to cite your sources and attach those pages. Tool Vendor Cost Notes Location Compatibility Updating AWStats Sourceforge Free (open source) Offers log file analysis of Web, e-mail, and some FTP servers. GUI or command-line interface; requires Perl version http://awstats.sourceforge.net All platforms Manual to new versions; plug-ins available to expand features Squid Multi Varied Listing of multiple tools and add-ons for Squid scripts—Web log analyzers, traffic analyzers, access, and more. www.squid-cache.org/Scripts/ Multi/varied Varied Logrep Itef!x Open source SSH, low overhead on clients, HTML reports logrep (Tip: If the actual address is too long, type an identifying name, and insert a hyperlink. Select the text, click Insert, Hyperlink from the Multi/varied Manual reinstall of new versions menu, and paste the address into the file or Web page address box or select the page from the list of recently used links. You can also browse for the file or link.)
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

looks like the documents have come in doubles,,let me try that again

Surname1
First Last Name
Instructor’s Name
Course
Date
Researching Security Products
Awstats
Awstats is a software tool that provides a graphical representation of statistics. These are statistics on
web, streaming and main or ftp servers. It shows all the information that is contained in a log. It works
through the command prompt. In order to process large log files Awstats uses a partial information
file. It analyses Apache log files, WebStar log files and IIS log files. AWStats is free. Updating
Awstats is manual for new applications. However, in order to acquire additional features, plug-ins are
used.

Squid
Squid is a proxy use for caching. It improves the response time of websites by allowing the
reuse of frequently used webpages. IT caches pages supporting HTTP, HTTPS and FTP. There
are numerous types of access controls that can be used on Squid. Therefore, it greatly accelerates the
bandwidth of a server. Squid can run on Windows, IOS and Linux OS. Squid is also used for routing
requests among servers to improve throughput.

Logrep

Logrep is used to display information from different log files. For example, once log files are
generated using a tool like Awstats. Logrep displays them in a way that is readable and easy
to interpret. The reports displayed by Logrep are HTML in format. It also uses graphs.
Logrep is supported by all platforms and formats. It keeps the records of all log files in a

Surname2

central repository. Moreover, it offers secure communication ...


Anonymous
Great study resource, helped me a lot.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags