Delivery in day(s): 4
Networking Question Assignment Brief
This networking question assignment brief in which we discuss on network address translation technology, security controls in IT environment.
Network address translation (NAT) is a method to remap one IP address space into another space by modifying network address information in Internet Protocol datagram packet headers while in transit across a traffic routing device.
Please use an example to illustrate how packets are sent and received by using NAT technology and explain why NAT technology can provide a degree of security.
Cloud computing means storing and accessing data and programs over the Internet instead of on your computer's hard drive. In general terms, security controls in cloud computing are similar to the security controls in any IT environment. However, because of the operational models and technologies used to enable cloud service, cloud computing may present threats that are specific to the cloud environment.
Please explain three cloud specific security threats, together with suggested countermeasures.
It is well known that, the wireless network of a Wi-Fi network is not confined to a cable as in a traditional network but instead is broadcast through the air. Recently, public Wi-Fi hotspots can be found everywhere, such as airports, hotels and coffee shops. Users can log onto the Internet with their mobile device. Along with convenience, public Wi-Fi hotspots can also provide an easy way for some attackers, like identity thieves and cybercriminals, to attack the wireless network or the users.
Please state two kinds of attacks that may occur in public Wi-Fi networks and provide an effective way for users to address the security issues when they access public Wi-Fi on their computer or mobile device
Network access control (NAC) is an umbrella term for managing access to a network. NAC authenticates users logging into the network and determines what data they can access and actions they can perform. NAC also examines the health of the user’s computer or mobile device (the endpoints).
Please explain four major access control models and briefly explain how to implement access control.