Professional Documents
Culture Documents
CS-75 Solved Assignment 2012
CS-75 Solved Assignment 2012
com
Connect on Facebook :
http://www.facebook.com/pages/IgnouSolvedAssignmentscom/346544145433550
Course Code
CS-75
Course Title
Intranet Administration
Assignment Number
BCA (6)-75/Assignment/ 12
Maximum Marks
25
There are five questions in this assignment. Answer all the questions. You may use
illustrations and diagrams to enhance your explanations.
1 ) Assume a software company consisting of a LAN with a total of 100 computers in two
adjoining buildings. If you are a Network Security professional for this company, design a
security policy for your company. What points would you consider while formulating the
policy and at what levels would you implement the policy? Also specify the hardware and
software requirements for ensuring security.
Security Design Policy:
To design a secure LAN following types of treats will be kept in mind by me:
www.ignousolvedassignments.com
www.ignousolvedassignments.com
Theft of ADP Assets: the unauthorized/unlawful removal of data, hardware, or software from
government facilities
Viruses and Related Threats
"Computer viruses are the most widely recognized example of a class of programs written to
cause some form of intentional disruption or damage to computer systems or networks.
Physical Threats
Electrical power problems are the most frequent physical threat to LANs, but fire or water
damage is the most serious.
Physical threats include the following:
Electrical Power Failures/Disturbances
Hardware Failure
Fire/Water Damage
Other Physical Threats
Security Methods:
Assignment of LAN Security Officer. The first safeguard in any LAN security program is to
assign the security responsibility to a specific, technically knowledgeable person. This person
must then take the necessary steps to assure a viable LAN security program.
Security Awareness and Training. Technical training is the foundation of security training.
These two categories of training are so interrelated that training in security should be a
component of each computer systems training class. Proper technical training is considered to be
perhaps the single most important safeguard in reducing human errors the mistakes of
otherwise well-meaning employees.
Personnel Screening. The personnel screening process should also address LAN repair and
maintenance activities, as well as janitorial and building repair crews that may have unattended
access to LAN facilities.
Separation of Duties. People within the organization are the largest category of risk to the LAN.
Preventive Maintenance. Hardware failure is an ever present threat, since LAN physical
components wear out and break down. Preventive maintenance identifies components nearing
the point at which they could fail, allowing for the necessary repair or replacement before
operations are affected.
Written Procedures. It is human nature for people to perform tasks differently and
inconsistently, even if the same person performs the same task. Procedures should be tailored to
specific LANs and addressed to the actual users, to include the "do's" and "don't's" of the main
elements of safe computing practices, such as: access control (e.g., password content), handling of
floppies, copyrights and license restrictions, remote access restrictions, input/output controls,
checks for pirated software, courier procedures, and use of lap-top computers. Virus Safeguard.
Operational Safeguard.
www.ignousolvedassignments.com
www.ignousolvedassignments.com
This is a network that is not available to the world outside of the Intranet. If the Intranet
network is connected to the Internet, the Intranet will reside behind a firewall and, if it allows
access from the Internet, will be an Extranet. The firewall helps to control access between the
Intranet and Internet to permit access to the Intranet only to people who are members of the same
company or organisation.
An Extranet is actually an Intranet that is partially accessible to authorised outsiders. The actual
server (the computer that serves up the web pages) will reside behind a firewall. The firewall
helps to control access between the Intranet and Internet permitting access to the Intranet only to
people who are suitably authorised
The Internet is a global system of interconnected computer networks. It is not controlled by a
central entity and therefore relies on network devices and accepted conventions and protocols to
relay the data traffic until it gets to its destinations..
4) What are the different protocols available in Wireless Application Protocol (WAP)
Stack? Explain the purpose of each protocol.
Architecture of the WAP Protocol Stack
The following diagram illustrates the general architecture of the WAP protocol stack:
Application Layer (WAE)
Session Layer (WSP)
Transaction Layer (WTP)
Security Layer (WTLS)
Transport Layer (WDP)
Bearers (GSM, CDMA)
The WAP stack consists of the following layers:
WAE :WIRELESS APPLICATION ENVIRONMENT
The Wireless Application Environment (WAE) defines the following functions:
Wireless Markup Language (WML). WML is an XML-based markup language for the visual
display of WAP-based contents. Once HTML and WML will converge into XML, many
compatibility problems, during conversion from HTML to WML, will cease to exist.
WML Script. A script language, very similar to JavaScript.
Wireless Telephony Application (WTA, WTAI). Telephony services and Programming
interfaces.These are specifications for data formats, including images, telephone directories,
calendar information, and so on.
WSP WIRELESS SESSION PROTOCOL: The Wireless Session Protocol (WSP) implements
an interface for connection-oriented and connectionless session services. The connectionoriented session service operates using the protocol of the transaction layer. However, the
connectionless session service uses a secure or non-secure datagram service.
www.ignousolvedassignments.com
www.ignousolvedassignments.com