07.47

Lab 8.1.3 Security Local Data and Transmitted Data

Sonya Leoni
06491/2008

Part 1
Step 1: secure bobs files folder
Step 2: test joes access to bobs files
Part 2
Step 1: identify a secure web page
Step 2: examine secure access to an untrusted source warming

Lab 8.2.1 planning for access lists and port filters
Step 1: Restrict Client A to one subnet
You are asked to restrict client A to only the subnet to which it is currently attached. Client A needs to be able to access server A. but it does not need to accsess the internet or server B. where would you place the access list?
Router
Interface
Allow or Deny?
Input or output filter?
Why?
Router 2
0/0 dan 0/1
deny
input
Karena hanya untuk mengekses server yang berada di internal jaringan dan tidak bisa untuk eksternal jaringan atau jaringan luar
Step 2: Restrict client A access to server A but allow access to server B the internet
You are asked to restrict client B from accessing server B needs internet access and access to server B. where would you place the access list?
Router
Interface
Allow or Derry?
Input or output filter?
Why?
Router 1 dan 3
0/0 dan 0/1
allow
output
Karena diizinkan untu mengakses jaringan internal dan eksternal

Step 3: Allow only client A to access the routers using only SSH
You have been asked to secure access to the routers for only client A. which will be the management PC for those routers. You want to limit access to only SSH from Client A and prevent telnet access. Where would you place the access list?
Router
Interface
Input or output filter?
Port
Allow or Deny?
Why?
Router 1
0/0 dan 0/1
input
0
deny
Jaringan internal
Router 2
0/0 dan 0/1
output
0
allow
Jaringan eksternal
Router3
0/0 dan 0/1
output
0
allow
Jaringan eksternal

Lab 8.2.5 Researching an Anti-X Software Product
Step 1: identify three products
Company
Product
smadav
Smadav
morphic
Morposh
Avira
Avira

Step 2: Compare pricing
Company
Product
Price
microsoft
Windows
Rp.1.500.000

Linux
free
aple
machintosh
Rp.5.000.000

Lab 8.3.1 Interpreting a service level agreement
Step 1: review typical customer needs
Step 2: Analyze a sample SLA and identify key components
a.       Read over the sample SLA that follows and answer these questions regarding content, ISP responsibilities, and customer requirements.
b.      According to this agreement, can the ISP be held liable for damage to equipment owned by the customer [Client] or data loss that occurs due to accidental actions by ISP vendor staff or other persons? bisa
c.       What are some examples of One Time Services included in the SLA? E-mail service, electronic interchange, online accounting, secure remote workerr support, remote indtrumentation and control system, and backup and recovery service.
d.      What are some examples of On going Services included in the SLA? E-mail service, online acounting
e.       When will regular downtime maintenance be scheduled and how many business days notice must the ISP give of any scheduled downtime? Banyak jam dalam satu hari dan banyak hari dalam senulan.What does the ISP’s network monitoring system do when an error condition is detected? What is the stated availability of the Systems Administrators in the event of a system failure? What is “usage monitoring” and how does the ISP provide this service? Dengan memantau kerja sistem
f.        Regarding problem severity and ISP response time, what is the difference in response between “Level 1 – normal business hours” and “Level 3 – normal business hours”? pada level satu baru mendeteksi problem dan pada level 3 sudah ada pengontrolan
g.      On what factors are the penalties for service outages based?  Provides an estimate for the cost to the customer for a service outage for each of the services the customer wants covered by an SLA.

0 komentar: