Class Activity Chapter 2 NURUL ANIS

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

LAB EXCERSICE 1:

SECURITY POLICIES AND PROCEDURE Duration: 2


Hours

Learning Outcomes
This Tutorial encompasses activities 1

By the end of this tutorial session, you should be able to:


1. Explain the Security Policy

Activity Outcome:
Answer Security Policy Questions

In In this activity, you as a network administrator at Infinity Design Solution Sdn. Bhd. must
answer questions concerning security policy to strengthen the security in the network
1. List the person(s) responsible for each piece of network equipment that is used in your
classroom (for example, routers, switches, and wireless access points).

Routers:
● Network Administrators: Network administrators are typically responsible for
configuring and managing routers. They handle tasks such as setting up
routing tables, managing IP addresses, and ensuring proper connectivity
between different network segments.
Switches:
● Network Administrators: Similar to routers, network administrators usually
handle the configuration and management of switches. They configure
VLANs, manage port settings, and ensure proper traffic flow within the local
network.
Wireless Access Points (WAPs):
● Network Administrators: Network administrators are responsible for
configuring and maintaining wireless access points. They set up wireless
security, manage SSIDs (Service Set Identifiers), and troubleshoot
connectivity issues in the wireless network.
Firewalls:
● Security Team or Network Administrators: Firewalls are critical for network
security. In larger organizations, a dedicated security team may manage the
firewall rules and configurations.
2. List the person(s) responsible for the computers that are used in your classroom.
 IT Support Team
 Classroom Technology Coordinators
 Teachers and Faculty
 System Administrators
 Student Technology Assistants
 Asset Managers
 Network Administrators
 Security Team

3. List the person(s) responsible for assigning permissions to use the network resources.
 Network Administrators
 System Administrators
 Security Team
 Data Owners
 User Account Administrators
 Group Administrators
 Helpdesk or IT Support Staff
 Auditors and Compliance Officers
 End Users:
 Resource Owners
 Access Control Administrators

4. Which Internet web sites do you have permission to access?


5. What type of Internet web sites are not permitted to be accessed in the classroom?
1. Inappropriate Content: Educational institutions often block websites that contain
explicit adult content, violence, hate speech, or other materials that are deemed
inappropriate for students.
2. Gaming and Entertainment: Websites related to online gaming, social media, or
entertainment platforms may be restricted to prevent distractions during class and to
ensure that students stay focused on their studies.
3. Streaming Media: Streaming video and music websites, such as YouTube, Netflix,
or Spotify, may be restricted to conserve bandwidth and prevent students from
accessing non-educational content during class time.
4. Social Networking: Social networking sites like Facebook, Twitter, and Instagram
may be blocked to minimize distractions and maintain a productive learning
environment.
5. File Sharing and Torrenting: Websites associated with peer-to-peer file sharing
and torrenting are often blocked to prevent the unauthorized distribution of
copyrighted material and to maintain network security.
6. Gaming Websites: Online gaming websites, especially those with multiplayer or
chat features, may be blocked to prevent students from engaging in gaming
activities during class.
7. Proxy and VPN Sites: Proxy and Virtual Private Network (VPN) websites may be
blocked to prevent students from bypassing network restrictions and accessing
restricted content.
8. Phishing and Malicious Websites: Websites known for hosting phishing scams,
malware, or other malicious content are typically blocked to protect the security of
the school's network and devices.
6. List activities that could damage the network or the computers attached to the network
with malware.

1. Downloading Suspicious Files: Downloading files from untrusted or questionable


sources, especially executable files (.exe), can introduce malware to a computer and
potentially propagate it across the network.
2. Opening Email Attachments: Opening email attachments from unknown or
suspicious senders can lead to the execution of malware. Malicious attachments are
a common vector for malware distribution, such as ransomware and Trojans.
3. Clicking on Phishing Links: Clicking on links in phishing emails or on malicious
websites can lead to drive-by downloads of malware. Phishing sites often mimic
legitimate websites to deceive users.
4. Installing Unauthorized Software: Installing software from unofficial sources or
without proper authorization can introduce malware. Employees or users should only
install software approved by the network administrators.
5. Using Outdated or Unpatched Software: Running outdated operating systems or
software with known vulnerabilities can make computers susceptible to malware
attacks. Regular software updates and security patches are essential.
7. Should anyone, other than the network administrator, be allowed to attach modems or
wireless access points to the network? Please explain why or why not.
 it is not advisable to allow anyone other than the network administrator or authorized
IT personnel to attach modems or wireless access points to a network. Here's why:
1. Security Concerns: Unauthorized access points or modems can create security
vulnerabilities in the network. They may not be properly configured with security
settings, making it easier for malicious actors to gain unauthorized access to the
network.
2. Interference and Congestion: Unapproved wireless access points can interfere with
the existing network infrastructure and cause performance issues. Overlapping
wireless channels can lead to signal interference and congestion, resulting in a
degraded network experience for users.
3. Management and Configuration: Proper configuration and management of network
devices are critical for network stability and security. Unauthorized access points or
modems may not adhere to network policies and best practices, making it difficult to
monitor and maintain the network effectively.
4. Compliance and Regulations: In many industries and organizations, compliance
with specific regulations or standards (e.g., HIPAA, PCI DSS, GDPR) is required.
Unauthorized devices can lead to non-compliance and potential legal or regulatory
consequences.
5. Network Stability: The network administrator is responsible for ensuring the stability
and reliability of the network. Unauthorized devices can introduce instability,
misconfigurations, and conflicts that disrupt network operations.

You might also like