Executive Summary of Thesis The paradigm centres on the research question of ‘What are the risks posed by Multifunctional Printers (MFPs) to data and network security?’ which pursues a scientific approach. This is underpinned by a quantitative methodology into the different risk factors with risk being defined as the potential of threat[s] to exploit a …
Routing is at the core of the internet; a demarcation point separates the public network from a customer’s private network whilst routing protocols determine how routers communicate with each other,
In an organization the potential loss of revenue and reputation due to a network outage or a data breach (Chemweno et al, 2015), are driving enterprises to consider adopting a Network Maintenance Plan.
Maintaining a secure network protects users and secures commercial interests in an enterprise even though a Risk Management Strategy’s focus is mainly on environmental factors and securing Edge Devices,
The driving force in implementing First Hop Redundancy Protocols (FHRP) in a Cisco centric High Availability Campus network design has been the reducing cost of Layer 3 devices and more importantly the potential loss of revenue in the event of a network outage to an Enterprise (Pavlik et al, 2014).
In multi-switching environments, the drive for backup link redundancy has introduced bridging loops into the network as frames are continuously forwarded.
In most cases a prudent approach would be to introduce the main theme of the strengths and weaknesses of Route Redistribution between different Autonomous Systems running different IGP (Interior Gateway protocols).
The modern internet is constructed around a concept of Autonomous Systems (ASes) that uses the Border Gateway Protocol (BGP) for routing traffic between ASes.
Interior Gateway Routing protocol is a protocol that “distributes routing information between routers belonging to an Autonomous System” (Moy, J., 1998) whereby computers or any device able to connect to the network can exchange data within their own domain and beyond by being routed externally through a border router.
LOGJAM A PRODUCT OF THE NSA? A group of university researchers have discovered a vulnerability affecting the Diffie-Hellman key exchange which makes it susceptible to an attack called Logjam.