Thursday, September 3, 2020

How to Get a Girlfriend in College and Keep Her

Step by step instructions to Get a Girlfriend in College and Keep Her Dating is one of the fundamental concerns understudies have (other than concentrating obviously), and some of the time it turns into a genuine battle. How to discover a sweetheart? How to establish a decent connection with her? How to make this relationship work? These are key inquiries that may happen in your mind. We will attempt to respond to these inquiries in our guide on the most proficient method to meet a young lady and manufacture a relationship with her that will be in reality profound for both of you. Find Inner Confidence Make the principal move Many folks feel anxious and act abnormal around young ladies. Its ordinary in light of the fact that not every person has the solidarity to approach and converse with a young lady. More often than not we can see a person in a secondary school or school who is gazing in profound respect at a young lady from a separation. That appears to be frightening to spectators. If it's not too much trouble dont do that. On the off chance that you saw a young lady who you find appealing in the class or in the library or some other spot, come up to her. Or on the other hand, discover her via web-based networking media and text her if youre modest. Its the most troublesome part since it infers leaving your usual range of familiarity, however its really a fundamental advance. Else, you can trust that a young lady will come up to you first for quite a while. Give her that you really exist. Dont pay attention to it as well Be certain and consider this circumstance a piece of your background. You don't have anything to lose, regardless of whether she dismisses you. Dont make a show out of the entire circumstance. In the end, she is only an individual as well. Along these lines, take a full breath, quiet your nerves and come up to present yourself. Dont attempt to imagine like you dont care and approach her in the purpose of interest or weariness as it were. A ton of folks do that to conceal their emotions and afterward ponders â€Å"How to get a young lady to like you?† Actually, after such a move, its entirely difficult to change a young ladies conclusion. First Meeting Its difficult to assess the ideal situation for an associate. In motion pictures, we can see wonderful scenes of a young lady in school dropping books down and a person getting her out. Despite the fact that it may transpire, dont really rely on such a circumstance. There are a great deal of spots where you can meet a young lady in school. You can begin with a commendation or a joke. Or on the other hand essentially present yourself in an amiable way. Dont gaze at her like youre an insane man. Grin and address her about: School courses Educators Motion pictures and shows Most loved books Side interests Companions Focus on the themes she has a ton to state on. For instance, in the event that you are discussing the new magnifying lens that you have purchased, and a young lady is simply gesturing her head in answer, attempt to change the subject. Get some information about her day or what she is doing toward the end of the week. The best thing for you will be to take her telephone number or discover her via web-based networking media. On the off chance that you dont talk face to face, yet by means of telephone or instant messages rather, you will feel less restless. Create Trust The more you converse with a young lady and fabricate trust with her, the more profound relationship you can create with her. Its about being straightforward as well as about creation her vibe agreeable and safe with you. Give her that she can inform you concerning her concerns and you can offer her significant guidance. Abstain from keeping insider facts and make your expectations understood. A great deal of young ladies are not prepared for genuine connections, so you need to comprehend and welcome that. Dont conceal your sentiments. Tell her how you feel. Alert: Remember that deceiving your accomplice is the primary motivation behind why couples split up. Be a Good Listener On the off chance that a young lady feels that she can impart her mysteries to you and talk uninhibitedly about everything on the planet, its a decent sign. Be a decent audience. Focus on what she educates you regarding her loved ones, examining and work. The more you think about her, the better correspondence you will have. Attempt to recall noteworthy data and give her that you get her and can identify with her issues. Be Positive Nobody likes testy people. At the point when you talk about your issues excessively, it establishes an awful connection with everybody around you. Its greatly improved when an individual you speak with can feel that you are happy to have this discussion right now. Keep a positive state of mind and attempt to perk up a young lady if shes having an awful day. In contrast to the cantankerous feline, you wont appear to be charming when you are not feeling acceptable. Put forth an Attempt At the point when you have a relationship, you need to place some push to make it last and keep from burning to the ground. At the point when you constantly lack the capacity to deal with discussion or dates, it makes you resemble an individual who doesnt care. A relationship is a consistent trade off. You need to comprehend that dealing with your calendar to discover time for your better half is as basic as giving her opportunity to be all alone. An individual needs to possess space and energy for different things other than an accomplice. For instance, the group of friends of her companions or family. Discover a harmony between being excessively meddling and excessively unconcerned. Be pleasant, certain and mindful. These are the most fundamental parts of a long and profound relationship.

Saturday, August 22, 2020

Motivation in the Ministry of Business

Question: Examine about the Motivation in the Ministry of Business. Answer: Presentation Inspiration alludes to the inward drive, which impacts the conduct of an individual concerning accomplishment of set objectives. Various scientists have examined the job inspiration plays in the accomplishment of the organization. They have confirmed that companies that have an elevated level of inspiration will in general perform better than firmswhose laborers have a low persuasive level. The human asset the board assumes a key job in boosting the inspirational levels in the association, which brings about improved execution and profitability. The low-performancedegree in the open division is a developing worry since themajority of the staff individuals stay unmotivated (Buelens, 2007, p67). Inspiration is essential in the open division associations since it would go about as a significant job in upgrading the profitability and productivity of the whole association. Issue Statement The degree of resolve of open division workers in Guyana is impressively low. In this way, themajority of the staff individuals can't address the issues of the shoppers to satisfacton. This adds to the failure of the open firms to accomplish the set objectives and destinations. Inspiration is, therefore,essential for the achievement of errands and targets. It assumes a focal job in the exhibition of associations in the open area. It offers a methods for improving execution with no vital checking or pushing of the included people to meet the set targets and objectives. Therefore, it is a proficient methods for improving yield with no wastage of assets or workforce. The objective of associations is to convey administrations that fulfill the need of the customers. The comprehension of the idea of inspiration is key to the gathering of these set objectives. In that capacity, through the utilization of the techniques and methodologies of inspiration, the workers can be situated towards adjusting their destinations to those of the association. The inspiration is especially basic for associations in the open segment where administration conveyance includes large numbers of cooperations between client care and the customers. The inspiration of these workers in the open part will support the associations productivity and yield while expanding consumer loyalty. The administration should, along these lines, grasp techniques of improving the inspirational degree of the workers in the open part with the goal that they can upgrade their degree of rivalry. Research Questions and Objectives What are factors lead to elite in open division, for example, Ministry of Business, Guyana. 1. To investigate the idea of inspiration in the open part. 2. To recognize any flaws or shortcomings and qualities in the present inspiration techniques utilized in the open area. 3. To give adjustments to relieving the shortcomings while upgrading the qualities of the present strategies for inspiration. 4. To research the materialness of the basic inspirational hypotheses and the going with approaches in the open part. 5. To evaluate the related effect of theapplication of the various speculations and techniques as an inspirational strategy. Key Debates on Motivation in the Public Sector As indicated by Dur and Zoutenbier (2014, p1), the pace of representative apathy in the open area is exceptionally high. Albeit the vast majority of the workers in the open division are philanthropic in nature, their degree of apathy increments as they acquire involvement with their occupations. The techniques for inspiration utilized in the open part are in this manner treated in an unexpected way. Buelens (2007, p65) underpins this view by bringing up that representatives in the open area are increasingly centered around serving others. In any case, Burton (2012, p25) contrasts the perspectives on the two essayists by expressing that paying little heed to the area that representatives work, they all need inspiration which may shift contingent upon the individual inclinations of the representatives. The chief of associations in the open segments should, in this way, work to guarantee that they distinguish the helpers of their representatives so asto maintain them spurred in control to acknowledge efficiency. The strategy for inspiration, hence, differs relying upon the individual characteristics of the workers yet not the sort of the firm. ORiordan (2013, p11) bolsters Burtons ideologyby calling attention to that individuals in a similar field are frequently spurred by similar factors whether or not they serve in the open division or not. She further calls attention to that the contrast between workers in the open segments is thatthey are centered around the prosperity of each individual from the general population w hile those in the other part are centered around the prosperity of the people they serve. Debate exists concerning whether workers in the open part ought to be roused through money related or non-financial strategies. Non-money related inspirational strategies include the acknowledgment, professional stability, set of working responsibilities, confidence, and self-completion. They fall under both the inborn and extraneous persuasive techniques. Inborn inspiration applies where representatives driving themselves to give their best busy working in order to land happy with their positions for their capacity to finish doled out assignments true to form. Extraneous inspiration, then again, includes representatives being pushed by the pioneers at the work environment. The money related inspirational techniques primarily lie under the outward kind since it includes pay increment and financial motivators. As indicated by Dur and Zoutenbier (2014, p16), inherent persuasive techniques are the best strategies in the open part. The authors bolster their contention by bringing up that the representatives in the open part are altruists. They, thusly, don't require to be given motivators, for example, fiscal awards to spur them. Being allowed a chance to serve the open more is imperative to them than accepting motivations. They, nonetheless, repudiate their perspective by expressing that the workers in the open area are languid. They, in this manner, must be pushed around to finish doled out errands. ORiordan (2013, p11) then again holds an alternate standpoint with respect to the subject. She expresses that the people that lean toward working in the open part do so on account of the points of interest its offers. These incorporate factors, for example, work lastingness, benefits and the conviction that open part employments are anything but difficult to adjust than when occupied with different occupations. Along these lines, the open part workers are spurred through outward techniques. Different scientists, for example, Burton (2012, p25) contend that both characteristic and outward techniques could be utilized in the open segment contingent upon the interests and individual qualities of the people. People that are keen on impetuses ought to be inspired through theuse of outward inspiration. Those that look for work fulfillment should, however,be propelled through characteristic persuasive procedures. Persuasive Theories Diverse persuasive hypotheses have been created throughout the years to direct supervisors on the best way to spur workers in the open segment. The speculations can be bunched into three classifications specifically: need hypotheses, subjective hypotheses and open help inspiration (Karic, 2014, p25). The classifications contrast on their concentration in persuading representatives. Need hypotheses are inspirational speculations that attention on distinguishing the requirements of the workers and trying to fulfill them with the point of persuading them. One of the need speculations is Maslows Hierarchy Theory. In this hypothesis, workers needs are assembled into stages or levels. The administration in all segments needs to recognize the level that their representatives are in with the goal that they can plan to persuade them to buckle down through gathering their requirements (Karic, 2014, p26). Need hypotheses further incorporate McGregors Theory X and Y. These are two speculations that hold negating data in regards to workers needs. They are both dependent on suppositions. Hypothesis X contends that everybody be languid and inclines toward not to work. In this manner, they just work to pick up cash. Directors in broad daylight administration, in this manner, ought to propel representatives by giving them impetuses. Supervisors that accept representatives are propelled by the accomplishment of their work should, in any case, use Theory Y. For this situation, the chiefs ought to inspire their representatives through acts, for example, giving them more obligations (Karic, 2014, p27). Intellectual hypotheses, then again, recognize the social procedures that are utilized to decide the suitable persuasive strategy. One of the psychological speculations is Vroom VIE Theory. It isolates thebehavioral process into three classifications to be specific: valence, hope, and instrumentality. His hypothesis decides the suitable inspiration technique by surveying the desires for the representatives, their requirements and the distinction of remunerations for various exhibitions (Karic, 2014, p29). Objective Setting Theory is likewise another intellectual hypothesis. The objectives of an association ought to be clear, troublesome however feasible (Karic, 2014, p30). Thusly, it persuades representatives to buckle down towards the objectives. This is not normal for circumstances where the representatives are advised to put forth a valiant effort. Such guidelines cause representatives to unwind and along these lines low-level yield. The hypothesis further prescribes the directors to remember representatives for the objective setting process. Accordingly, it starts workers to make theirown objectives and in this manner enthusiastically take an interest in their satisfaction. The Public Service Motivation Theory, conversely, centers around open area representatives as it were. This hypothesis guarantees that workers in the open division are unique in relation to those in different areas (Rynes, Colbert and Brown,2002, p149174) it additionally futher discloses that endeavors to deal with the representative conduct around government offices or the open part by concentrating on the money related angle might not have the positive wanted result and could bring about rather a negative effect. The inspirational systems for workers in the open area is along these lines diverse relying upon

Friday, August 21, 2020

How can societal marketing concept be used to influence children to eat a healthier diet

Current Issues in the Persian Gulf - Essay Example Also, it has limited outside access, fabricated an airstrip and expanded military nearness on the island. Moves that make inlet to be an upset district is certainly not an ongoing turn of events, nor is it news for the Washingtoni. The tremendous oil saves in the area make the level of influence in the inlet a worry for US strategy producers. The US has been continually associated with the bay locale, and this is reliable with the western security arrangement. Since the finish of World War 2, US has guaranteed that inlet district picks up security and access to oil conservation increasesii. Washington approaches in the bay are not for US to access water, yet for sure guarantee that there is dependability of the oil advertise in the locale. This is on the grounds that oil stuns may adversely influence oil costs in the US. Geopolitics and vitality security are not just the components that draw in US in the Gulf area. The American journey for guaranteeing strength in vitality costs has been affected by ideological contemplations on the idea of US power. During the virus war, US procedure was to battle socialism that was upheld by the Soviet Union. The breakdown of socialism in the inlet and end of soviet risk caused the US to rethink their procedures. The significant worry of the US and other universal networks in the Gulf is to guarantee there is soundness and security. This will lessen chance in vitality showcases around the globe and urge financial specialists to put resources into this regioniii. US and Iran connection is a positive development as there will be universal management of atomic program, and thusly endorse in Iran will be elevated. This will expand the expectations for everyday comforts in the locale and guarantee there is solidness in the area. This connection is an import step where exchange is utilized as opposed to conveying troops in the district. Conveying troops in the Gulf area will surely expand hazard than lessens these dangers. Iran

Friday, June 5, 2020

The Healers Essay - Literature Essay Samples

Theodore Roosevelt once stated that â€Å"In any moment of decision, the best thing you can do is the right thing. The worst thing you can do is nothing.† Often, illusions of comfort blockade the mind and sway an individual’s ability to clearly see the moral path that should be taken. In the novel The Healers, Ayi Kwei Armah presents readers with a moral dilemma that will either unite or destroy the Asante empire. Densu, the protagonist throughout the story, is forced to choose between two worlds. One world will potentially exterminate the Asante empire because of greed and power, and the other world will slowly heal the empire with patience and inspiration. Densu is faced against these two driving forces; Ababio, his evil and manipulative guardian, and his inclination to live simply as a Healer. Throughout this novel, Armah accentuates how traditions, values, and life cannot be conceded or mediated through his continuous examples of how greed, fraud, and deceit can des troy and divide a community. Armah provides us with an animated tale with a simple, yet complex plot about manipulation versus inspiration, imagination versus destruction, and unity versus disunity. Critical changes occurred during this time period due to the colonization of Britain in Ghana and the regular fighting between the Asante, the Fanti and the Assen empire. Armah consistently hints throughout the story that the destruction of the 19th century African community lies within their inability to be able to recognize the whites invading force for what it was; greed and deceitfulness. Densu’s guardian, Ababio, is a driving force behind the manipulation and the destruction within the Asante society. Ababio, who desires for material goods rather than the overall wellness of his community, seeks to destroy Densu after he declined to follow the courts manipulative rule over the Asante empire. Ababio states, â€Å"We shall be on the side of the whites. That is where the power lies. We have chosen power bec ause we find impotence disgusting.† Densu, who is a young, reflective leader in the Asante empire, must choose between two straightforward paths; fall to his guardian’s evil ploys or join a reflective group called â€Å"The Healers.† Preferring the work of the ascetic Healers rather than the manipulative world of the Royalty, Densu must overcome Ababio and the Royalty in order to unify his community. Armah uses Ababio to portray good versus evil throughout the novel. Densu continuously chooses to pursue the the path of inspiration and healing because they promote the unity of the body, of the mind, and of the society. Armah demonstrates the power of enlightenment through Densu to accentuate the influence of inspiration over manipulation. Armah demonstrates throughout the novel the importance of unity and life within a community by giving countless examples of how disunity and death have divided the Asante empire. Although Densu has the opportunity to become the next elected crowned king, he compassionately chooses to continue his life as a Healer. Densu understands the importance of life when he affectionately chose not to kill the tethered bird in the final contest of the festival season games. By choosing to not kill the bird, Densu displayed how these games are a representation of division and disunity within his community because of the strong emphasis that the games have on individual competition. Because of Densu’s actions, Armah displays that unity cannot be achieved by using force and manipulation. Instead, Armah expresses the society’s need for the reflective community called the Healers. The Healers great goal is to unify not only their community, but black people as a whole. Armah persistentl y reaches out to the African community and emphasizes that good things take time. Armah constantly calls the African community to take action and to voice their concerns when greed and division arise. Armah provides the audience with the reflective community called the Healers in order to inspire the people of African decent to defend what is truly important to themselves and within their society: unity and patience. Densu’s mentor, Damfo, is the leader of the reflective community that calls themselves the Healers. Damfo is a positive driving force for Densu and because of this, Densu is able to discern which path is morally right. Damfo explains to Densu that it is possible to view the world and its experiences through understanding rather than greed and deceitfulness. Damfo assists people in seeing, hearing, and knowing themselves so that the individual may understand and act truly. Armah continuously reminds his audience the importance of tradition, values, and life by giving his audience a character like Damfo, who strives for unity and wholeness within his community. Damfo and his community of the Healers are against the colonization of Britain because many of the traditions and values that the Asante Empire believes to be true are constantly being compromised and invaded by new religious beliefs and ideologies. Because of these new religious beliefs and ideologies, Armah believes tha t the African community is dividing and is fragmented. Armah argues that the African community is fragmented and segregated because the disunity between the Healers and the royalty has prevailed because of the colonization of the British. Armah demonstrates his beliefs by giving examples of how the British are the sole reason for the initial division in Africa. Armah continuously demonstrates that the overall recovery in Africa to unity, patience, and health will test the limits of time if people continue to allow greed, self-interest, and corrupt ideologies and people to rule Africa that continually promote separation and division. Slavery, which is an idea often related to the cause and kickoff of a segregated world, encouraged the disrespect to human life. Because of the impact slavery had on the Asante empire, it negatively influenced the people of Asante by encouraging an environment that glorified death and violence. Ababio, who encouraged the whites to invade and enslave the people of their tribe, states â€Å"If you didn’t know it before know it now. Every royal family is also a slave family. The two go together. You don’t get kings without slaves. You don’t get slaves without kings.† Armah persistently demonstrates how the disrespect of human life has a direct correlation to the division of Africa. Because of this division, Armah calls for a society without kings and slaves. Through the Healers, he hopes to inspire and unify Africa once again through a society founded on respect between Africa’s people. Armah accentuates the severity of life by using Asamoa Nkwanta, who is apart of the royal family, as a special challenge for Damfo. Because of fragmentation and disunity in his community, Damfo, who believes the royals are corrupt exploiters, is skeptical about his decision to heal Asamoa Nkwanta because of his association with the royal family. Damfo’s ability to help Asamoa Nkwanta understand and question the corrupt practices of the society allows for Damfo to come closer in helping achieve the goals of the Healers. Damfo explains the Healers goals by stating, â€Å"This is seed time, far from harvest time. Healing is work, not gambling [] If we healers are here to do the work of helping to bring our people together again, we need to know such work is the work of the community.† Once Asomoa Nkwanta was healed in his mind and his attitude, he recognized flaws throughout the Asante society; the holding of slaves and the sacrificial slaying of slaves are Asante practice s which are disrespectful of human life. Because of Asomoa Nkwanta’s choice to follow the healers and recognize the faults in the Asante society, the royal family betrays him. Armah demonstrates how the rulers in Asante society, for whom the welfare of the society should be dominant, become lost and destructive in their greed for power. Armah continuously gives examples of how this greed and desire for power are the key provoking problems that are leading to the division of the Asante empire. In this novel, evil and greed can often prevail in the short term and hold the Asante society hostage. In hopes to free the Asante society of evil and greed, the healers main method of healing is inspiration and patience. By using the healers as a method of inspiration to his audience, Armah ultimately calls the community and people of African decent to lead persistently and diligently while aiming to have a healthy and successful society. Armah continuously prompts his audience to remember the importance of traditions, values, and human life through an animated tale about a divided community. Ayi Kwei Armah eloquently weaves together not only a story of division, but also a lesson of patience and respect. Using beautiful, yet simplistic language, Armah captures the conflict between individuals and large-scale groups by providing examples of people who are scattered in the mind and geographically. Ayi Kwei Armah exposes the cause of division in Africa: self-importance, greed for power, and deceit. It was through these causes that allowed Armah to communicate the importance of life, traditions, values, and patience. Work Cited Armah, Ayi Kwei. Healers, The. Nairobi: East African House, 1978. Print.

Sunday, May 17, 2020

Organizational Behavior, Mintzbergs Managers - 3841 Words

Introduction The theory our group will be discussing and explaining in depth is the leadership styles of top management using Mintzberg’s managerial roles. Mintzerg named ten different roles, all separated into three categories. The first category is interpersonal. This includes figurehead, leader, and liason. The second category is informational which includes monitor, disseminator, and spokesperson. The last category is decisional which includes entrepreneur, disturbance handler, resource allocator, and negotiator. These roles are all used in the leadership styles of top management and we will find throughout research which roles are most frequently used and which seem to be the most effective. We have selected five companies in†¦show more content†¦The spokesperson role takes information from inside the organization and relates it to the public. Good disseminators and spokespersons need to have good communication skills in order to interact with company heads as well as the public. A successful spokesperson needs to be able to speak during conferences with confidence and also be able to maintain a consistent relationship with the media. If a manager is both a spokesperson and disseminator, they are excellent in communicating both inside and outside of the company. The decisional category includes four roles: entrepreneur, disturbance handler, resource allocator, and negotiator. The entrepreneur role is one in which managers take initiative and seek out opportunities that will both benefit the organization as well as create innovation. These managers work on major projects and are proactive in accomplishing goals as well as bettering the organization. The disturbance handler role refers to managers who are responsible in taking action when problems or disturbances occur. Every organization faces conflict, most of which are sudden and unexpected. The disturbance handler steps in to handle this conflict and attempts to resolve and correct the problem so that the organization can continue successfully. Organizations Identification/ Introduction and Descriptions Disney The Disney Company was founded by its namesake Walt Disney on October 16, 1923. In 1923, WaltShow MoreRelatedDifferent Types of Organizational Structure1406 Words   |  6 Pagesbelieve that not all organizations are alike. Henry Mintzberg explains five distinct organizational structures one should consider when determining coordination of an organization; simple structure, machine bureaucracy, professional bureaucracy, divisionalized form, and adhocracy. (Mintzberg, 1981) pg. 103. Simple structure as Mintzberg points out is, â€Å"not much more than one large unit consisting of one or a few top managers.† (Mintzberg, 1981) pg. 105. Machine bureaucracy is, â€Å"the offspringRead MoreDifferent Theories Of Management, By Henri Fayol And Henry Mintzberg1121 Words   |  5 Pagestheories of Management, include Henri Fayol and Henry Mintzberg. This section of this paper provides an overview of functions, roles and skills required of a manager. What is Management? Management can define as the process of reaching organisational goals by working with and through people and other organisational resources. (Management Innovation, 2008). According the Fayol theory, there are five primary roles of a manager. The five roles of a manager put forward by Henri Fayol may not fully expressRead MoreComparison of Management View Points by Henri Fayol vs. Henry Mintzberg 888 Words   |  4 PagesLike the two sides of a penny, Henri Fayol vs. Henry Mintzberg (Anon., 2010) Henri Fayol and Henry Mintzberg both have their own views on management. Of which, each man came up with their own management frameworks. This essay will take a closer look and compare the different management frameworks developed by Fayol and Mintzberg. A mining engineer and director in France, Henri Fayol, the vital early contributor to classical school of management theory believes that basic management and skills canRead MoreStrategic Management Position For Hilton Resorts892 Words   |  4 Pagesstrategic plan for the organization. In a management position for Hilton Resorts, this is especially important for employees to understand the aims and objectives set and the steps they will take to achieve them. As a company our first efforts for organizational improvement efforts as described by Wells (1998) are: †¢ Creating a vision of the organization’s future †¢ Developing a set of guiding principles (behavioral norms necessary to achieve that vision) †¢ Clarifying the mission, or core purpose, ofRead MoreCritiquethe Manager’s Job: Folklore and Fact1532 Words   |  7 Pages | | |1:00Pm | Individual Critique The Manager’s Job: Folklore and Fact By Henery Mintzberg Summary †¢ Does anyone can fully expound what is manager’s job? The purpose of the article is to explore this question based on our bias and the essence of the managerial work. From a academic viewpoint, management can be divided into four elementsRead MoreMintzberg; S Decisional Roles1625 Words   |  7 PagesTo inaugurate this essay, a simple introduction of the manager interviewed and her company will be given. Ms YKL who accepted the interview works in Company BSB. Company BSB operates in the private and service sector with the size of 20-99 people. It provides digital marketing services. Ms YKL holds a position as a senior manager for Publishers amp; Partners, it is a term used in the Digital Marketing industry. Publishers amp; Partners team also means product team and this team will negotiate andRead MoreCritiquethe Managers Job: Folklore and Fact1547 Words   |  7 Pages| | 1:00Pm | Individual Critique The Manager’s Job: Folklore and Fact By Henery Mintzberg Summary †¢ Does anyone can fully expound what is manager’s job? The purpose of the article is to explore this question based on our bias and the essence of the managerial work. From a academic viewpoint, management can be divided into fourRead MoreManagement1653 Words   |  7 Pagesmore important in modern market. The key to survival and building of future dominance is getting much more information than competitors. Managers from its literal meaning are the persons who manage others. Therefore, organizations need good managers to help them coordinate team work and solve problems effectively and efficiently. According to Mintzberg(1973), managers have three roles which are informational roles, interpersonal roles and decisional roles. This essay focuses on Mintzberg’s informationalRead MoreMintzberg’s Theories On Organizational Configuration2139 Words   |  9 PagesTheories On Organizational Configuration According to Mintzberg, every organized human activity – from the making of pottery to the placing of a man on the moon – gives rise to two fundamental and opposing requirements: the division of labour into various tasks to be performed and the coordination of those tasks to accomplish the activity. Structure is simply the way in which an organization divides labor into distinct tasks and achieves coordination of these tasks. According to Henry Mintzberg, organizationsRead MorePower And Politics Organization Theory974 Words   |  4 Pagesthrough family and schools. Ordinary people such as scholars hesitate to talk about power. It is often equated with force brutality, unethical behavior, manipulation, connivance, and subjugation. Power and Politics organization theory was derived from the â€Å"modern† structural organization in the 1970’s to its present today. In the â€Å"modern† structural, organizational economics, and systems/environment theories of organization, organizations are assumed to be rational institutions with its primary purpose

Wednesday, May 6, 2020

Drinking Age Essay - 677 Words

Drinking Age When teen-agers turn 18, they are told that they are adults and are sent into the world. They go to college, get a job, marry or join the military. They do grown-up things like vote, pay taxes and become parents. But they cant go to the pub for a beer because when it comes to liquor, they are still just kids. Wheres the fairness in the 21-and-older drinking law? First, it is necessary to question this law. Why is 21 the magical age that makes one intelligent and mature enough to consume alcohol? Surely, some adults abuse alcohol and some teenagers would be perfectly able to drink responsibly. This seemingly arbitrary number is associated with adulthood, as if the day a person turns 21 they know everything and†¦show more content†¦When they have the opportunity to drink, they do so in an irresponsible manner because drinking by these youth is seen as a badge of rebellion against authority and a symbol of adulthood. Clearly, this kind of devious attitude does not encourage responsible drinking. While young people in foreign countries learn to regard moderate drinking as an enjoyable social activity, young Americans view it as something they have to sneak around to do. If 18 year olds do not have legal access to even a beer in a public place, they are ill equipped to deal with the responsibilities that come with drinking when they do have the right. The drinking age should be lowered because the current age has no real basis. With a lowered drinking age, fewer problems will be present. Safe drinking needs to be taught, along with drinking in moderation. All of the arguments for having a raised drinking level or retaining the current one are weak. The problems that make a drinking age limit necessary are better solved through a lowered drinking level. Tightening the laws on underage drinking is wrong, as laws will still be broken and people 20 years, 364 days and younger will continue to consume alcohol. The answer to the problem of underage drinking is not to add more restrictions, rather, it is simple: get rid of the underage part. With the thrill of breaking the law gone and the access to the bar granted, people, especially collegeShow MoreRelatedLowering the Drinking Age1523 Words   |  7 Pages According to Andrew Herman, â€Å"Each year, 14,000 die from drinking too much. 600,000 are victims of alcohol related physical assault and 17,000 are a result of drunken driving deaths, many being innocent bystanders† (470). These massive numbers bring about an important realization: alcohol is a huge issue in America today. Although the problem is evident in Americans of all ages, the biggest issue is present in young adults and teens. In fact, teens begin to feel the effects of alcohol twice asRead MoreNot Lowering The Drinking Age989 Words   |  4 PagesLowering the Drinking Age There are many different views on drinking alcohol, especially underage drinking. Everyone has different views on the drinking age. Some think it should be lowered and others believe that it should be raised. Then some believe that it should remain the same at the age of twenty-one years old. Keeping the alcohol consumption age at twenty-one limits the dangers of not only those under twenty-one, but other people in the community. Lowering the drinking age will cause moreRead MoreDrinking Age1395 Words   |  6 Pagesis good or bad, helpful or hurtful. Some debates are simple with no major side effects such as would drinking gatorade or water better maximize the performance of athletes. Other debates involving drinking are not as simple, these debates involve alcohol drinking age. Both arguments can have different viewpoints, the difference is the significance in the argument. What should the legal drinking age in the United States be? Consuming alcohol has been done for many years. Unlike a typical beverageRead MoreDrinking Age1012 Words   |  5 PagesDrinking Age The drinking age was moved from 18 to 21 for a reason. The higher drinking age of 21 has saved many lives, helped reduce the amount of underage drinking, and therefore should not be lowered. Many studies from a large variety of sources have proven higher drinking ages have a positive effect on society. Alcohol is harmful to the development of younger people. Research has shown that an adult is less likely to bingeRead MoreLowering the Drinking Age1223 Words   |  5 Pagesâ€Å"What we’re doing now to prevent underage drinking isn’t working; it’s time to try something else.† Although many people argue that the National Minimum Drinking Age Act of 1964, which lowed the drinking age from eighteen to twenty one, was a good idea. David J Hanson a professor in the State University of New York believed that something needs to be done to make the United States a safer place to live. Is it fair that people in the United States can serve in the military, vote in elections, serveRead MoreThe Debate Of The Drinking Age959 Words   |  4 PagesThe drinking age has always been twenty-one in the United States, whenever it has been questioned on why twenty-one and not eighteen. The scientific answer has always been because the eighteen-year-old brai n is not fully developed yet. See what I have a hard time understanding is why eighteen-year-olds are considered adults at the age of eighteen, but we can’t have a drink. At eighteen you are allowed to buy cigarettes, join the army, change your name. I just don’t understand why at eighteen youRead MoreMilitary Drinking Age1983 Words   |  8 PagesDrinking Age of the Military: Should it be Lowered Jason M. Stoudt DeVry University The drinking age in the military is currently set at 21 years old as it is set for the rest of the country. There has been an age old statement widely used by those in the military, â€Å"If I am old enough to fight and die for my country, I should be old enough to drink†. The debate is out there that the drinking age should be lowered for all young adults from 18 years old to 21 years old. The idea behind the factRead MoreLowering The Drinking Age Of The Age981 Words   |  4 PagesHowever, there are those who remain persistent in their requests to drop the drinking age to a slightly lower option. Opposition to the legal drinking age of twenty-one has shown to have some support from mostly younger groups of people, without much validation as to why a lowered drinking age would be beneficial to our country as a whole. Yet, there are still some interesting arguments for those in favor of dropping the age at which it is legal to drink to eighteen. Consider how many young adults chooseRead MoreBinge Drinking vs the Drinking Age Essays829 Words   |  4 PagesEnglish 101 March 13, 2013 Binge Drinking VS the Drinking Age Presidents of college campuses around the nation face issues of underage drinking and binge drinking on a regular basis and realizes that it is a danger and a problem. â€Å"Alcohol consumption is the third leading cause of death in the U.S., a major contributing factor to unintentional injuries, the leading cause of death for youths and young adults, and accounts for an estimated 75,000 or more deaths in the United States annually† (WechslerRead MoreBinge Drinking And The Minimum Legal Drinking Age3264 Words   |  14 PagesKarzhova Marina Erin Beaver English Composition II 5 November 2014 Binge Drinking and the Minimum Legal Drinking Age In the year 1984, President Ronald Reagan enacted a law that increased the minimum drinking Age all U.S states to 21 years. As a result, it is believed that the mortality rates due to road accidents reduced from 5,000 in the 80’s to 2, 000 in 2005 (Dean-Mooney). However, the issue of binge drinking remains unsolved with learning institutions having to deal with it every semester. In

Network Security Plan and Implementation Report for GB

Question: Network Security Plan and Implementation Report for GB. Answer: Introduction Banking sector is one popular area where computer networks and IT systems are extensively used. Banks make use of IT network capabilities to improve their business outcomes and ensure efficiency in all their operations. In this report the network security implementation is analyzed for The Golden Bank (GB). The network security aspects are explored for security planning and for ensuring robust and adequate security measures are implemented in their systems. GB network is wide and big and faces lot of issues in maintaining and managing their IT network infrastructure. This is because the existing network found in their HQ, operations and branch offices use different protocols which are viewed as a security challenge since some of the native protocols are more vulnerable to latest attacks and viruses. Company Overview GB Headquarters is based in Tivoli which has 80 employees. There are two remote branch offices, one at Greenland and the second one at Faroe. In addition to this the operations building is located 60 Kms away from Tivoli and a warm backup storage site located 100 Kms away from Tivoli. In addition to this, there are 28 branch offices all connecting to operations office using frame relay or DSL links. All these 28 branch offices are similar in spread. GB also has 28 ATM machines which use SNA protocols to communicate with operations. Some file servers still run primitive IPX/SPX protocols and some of them use TCP/IP. The HQ and operations office and warm backup site use T3 leased line, HQ connects with Greenland and Faroe with T1 leased line. The warm site backup office is used for off-site data storage and this is done regularly to ensure protection. The bank also provides connectivity to outside vendors. The bank uses CISCO 2600 multiservice platform routers, has network attached sto rage (NAS), a combination of windows and Linux servers and desktops running Windows 8 OS. Each branch office, the operations office, remote offices and warm backup site has a LAN running on 10Base-T Ethernet, the LAN in HQ runs on 100Base-T Ethernet. Frame relay networks are used by branch offices and vendor to connect to operations center. Problems faced by GB: GB network is dependent on IPX/SPX, SNA and frame relay networks which the board feels is a bottleneck for further business growth. Further, GB is already pending huge amount of money in maintaining existing IT network and infrastructure with very less room for expansion. The bank also plans to expand its existing branch offices by 30% in which case the network must be scalable and flexible to accommodate more data volumes efficiently. GB also desires to have an efficient and high performing WAN/LAN with zero problems during their business operations. The scope of this report is to explore traditional WAN based solutions for managing all systems and LANs in GB through IP addressing, and to plug vulnerabilities in their servers, network devices and to protect all systems IT network infrastructure of GB from attacks and hackers. The security plans are explored and discussed for their importance in securing data and customer services in GB. Security plans and security measures will be implemented across all areas of GB operations to, Protecting all servers - web servers and database servers, NAS, servers in other offices/branches which connect to the operations center. Protection will also include individual systems and LANs at warm backup site, two remote offices, operations office and the LANs and individual systems found in all the 28 branch offices. Securing the network links between offices using appropriate encryption, decryption methods as needed. Providing redundancy at warm backup site for ensuring latest data is available from all the other offices to ensure business continuity. Positioning firewalls, proxies, DMZ, IDS/IPS, for protecting individual network devices, routers, switches, etc. Develop security implementation planning and test security vulnerabilities in the network. Network Design and Assumptions made The GB network consists of different networks all of them connected through some common routers and protocols. In order to secure the network in GB, the following general aspects are analyzed (Daya, 2008). They include, Network architecture for each network, security aspects on internet and so on. Types of attacks on servers, computers, networks, applications and data While access is provided on internet, the security measures to be implemented Understand the existing security, hardware, software, etc. GB requires cost effective high speed WAN links with accuracy between their offices. The internet can be considered as a network carrier, but since it is an open public network, GBs network packets on the internet are vulnerable to attacks. The option of VPN connectivity between operations center and branch office is considered instead of frame relay, because VPN (Ferguson Huston, 1998) can establish a more secure network compared to fame relay nets. A WAN network is essential for GB to connect all their sites and branch offices, ATMs and remote sites. WAN has the ability to connect multiple LANs (Rouse, 2007). The sites of GB are distributed however their database is centrally maintained and managed. At the same time, the data available on remote servers are also secured by real time backup at the warm backup site. In order to implement security measures at all LANs and WAN links along with devices, servers and individual computers, the top-down network design approach (Oppenheimer, 2011) is considered. The top-down approach begins with upper layers of the OSI model and moves down to further layers. In this approach the sessions layer and data transport layer is considered. The approach also takes into account GBs group structure, organization structure along with user and service authentication principles in order to fulfill certain controls in the network are fulfilled. The secured network for GB is designed to fulfill business goals that include, Improve productivity and communications along with providing data security to the organization. Reduce operational costs incurred for telecommunications and maximize business outputs Ensure information in the organization is highly protected for all employees in all locations of GB The network must also fulfill future information needs (Wen, 2001) and technical goals which is summarized as, Scalability: Scalability refers to the ability of the network to continue to function efficiently in spite of drastic changes in data flow volume or size. For good network performance in peak loads, scalability is important. Availability: Services and the network must be available at all time to users. Performance: Performance of a network is highly important to ensure GBs transactions are made efficiently and the network is able to work in its full capacity. Security: In enterprise networks, security is highly crucial particularly in enterprise networks because the computers keep connecting with other sites and also to the internet. Concerns related to security must be integrated in network design stages itself. It is important to devise a security plan and policies for the company to address the risks in deploying a secure project. The security plan must determine the consequences of an attack and make plans accordingly. The performance, availability and scalability are handled by the redundancy provided by T1 and T3 links between GBs offices and remote branches. Security is planned by establishing firewall and IDS at the periphery of the network and in internal LAN respectively. Security measures for user authentication and data encryption, establishing VPNs for connecting branch offices are considered in ensuring network security. Network Design and Architecture GB has one headquarters, two remote offices, an operations office, a warm site for offsite backup, remote offices and branches. Each office has a LAN with multiple users, routers for transferring packets and firewalls for authentication. The main router is located at operations site and warm site backup. This is the CISCO Immersive Tele-presence system as it can manage multiple protocols. The WAN plan for GB is shown in figure 1 with routers, firewalls and LAN at each location. All data passes through the main router in operations and routed to respective offices. For example, if any one branch office sends a packet to HQ, it is routed through main router. Figure 1: The WAN plan for GB Since, the entire LAN and WAN for GB is a TCP network, the router uses RIP protocol (Hendrick 1988) for routing packets from any one LAN to other LAN or subnet. For routing correctly RIP must be enabled in all routers. In the figure, the network addresses must be included in routing and interfaces participating in the WAN must be specified. This is done using the RIP command. RIP Version 2 is used to define routing tables in router. The network command is used to define connected subnets on routers. Subnets are included in routing updates because HQ has four subnets namely Finance, Accounting, Management and Administrative users. In addition to this each branch, remote offices, operations office and warm backup site, ATMs, outside support vendors are also available. RIP command must specify all IPs in each office and must also include network devices. In the GB networks, classful networks are also available in the form of outside support vendors. Classful network refer to IPs that use the GB network in addition to their existing IPs. Certain default routing updates are summarized in the network (Antoniou 2007) perimeter to establish a DMZ. RIP is used mainly to update routing tables automatically which is done as below: A router for example at remote office 1 (Faroe) may experience changes to an entry update in its routing table to include a new route. When the table in Faroe router is updated, this information is sent to other routers in the WAN to update tables automatically for this change In this way data packets across different locations in WAN is routed to their respective destinations Therefore RIP is used to define routing tables in routers in GB. IP addressing Network address in CIDR format is used for GB as it is a private IP. The private address 10.0.0.0 for GB will be subnetted across its locations by taking 3-bits as below: Number of subnets = 8 (23) Total number of hosts = 221 2 = 2097150 Subnet mask will be 255.254.0.0 The above is defined to expand the network in future. Table 1 shows the start and end IPs along with their broadcast address. Network Address First Address/n Last Address/n Broadcast Address 10.0.0.0 10.0.0.1/11 10.31.255.254/11 10.31.255.255 10.32.0.0 10.32.0.1/11 10.63.255.254/11 10.63.255.255 10.64.0.0 10.64.0.1/11 10.95.255.254/11 10.95.255.255 10.96.0.0 10.96.0.1/11 10.127.255.254/11 10.127.255.255 10.128.0.0 10.128.0.1/11 10.159.255.254/11 10.159.255.255 10.160.0.0 10.160.0.1/11 10.243.255.254/11 10.191.255.255 Table 1: GBs IP addressing scheme followed for their locations In the above table since HQ needs 80 IPs, the start address will be 10.160.1.1 and end with10.243.255.254. The router steps are given below: Router Network Address = 10.160.0.0/11 Password: gbwan Router Configuration Steps hostname hq hq(#) config t hq(config) interface fa0/1 hq(config-in) ip address 10.160.0.1 255.243.0.0 hq(config-in) no shutdown For VLAN Routing Branch office with Operations (one branch) operations(config) int fa0/0.1 operations(config-in) ip address 10.0.0.1 255.248.0.0 operations(config-in) no shutdown operations(config-in) encapsulation dot1q 2 VLAN Configuration for one branch vlan 2 name branch1 Likewise all 28 branch offices are defined, along with two remote offices at Faroe and Greenland. As each branch office, remote offices, and operations office have servers they must be defined in router. Similarly the warm back up site has network attached storage which must be taken into account in the routing table. Network Security Plan The main objective is to plan WAN security for GB due to increased threats and their use of old and obsolete protocols and systems. The network security plan is made by ensuring there is no disruption to their existing network and business operations. The following aspects are considered in GBs security plan: Identify all assets in GB along with the risks and vulnerabilities posed by each element Developing security policies and procedures for implementation Implement antivirus software in all systems (servers, PCs, etc) Testing and implementing security procedures in all GB locations Data confidentiality, privacy and integrity are highly important in WAN security. Confidentiality: In confidentiality, information contained in the network is private. The data stored in servers in GB networks is meant for private use and must be protected. Integrity: Data integrity is an important network security aspect as data is prevented from getting modified or corrupted by attackers. Non-repudiation: Ensures users will not deny using GB network. The above five aspects are highly important to be considered in order to have effective secured network system (Dowd, 1998). Physical security measures such as controlled user access by authentication process, establishing access levels in system and encryption are implemented (Oppenheimer 2011). User and access control measures will be implemented across all services, databases, servers and VPNs. The security aspects of RIPv2 protocol is also examined (Davis, 2006). Two authentication methods are available with this protocol namely plain-text and message digest 5 (MD5) (Khalid, et al., 2008). In routers plain-text is the default method, but they must be configured using MD5 because this method encrypts the password in router and secures the table. Hence, if a hacker is able to get access to physical environment the WAN can become unsecured (Parziale, et al., 2006). WAN authentication will occur when updates are received by a trusted source or router. Hence, in routers authentication ensures the entry of corrupt or malicious update, or denial of service (DoS) attacks (Rivest, 1992). Therefore, MD5 algorithm is used for authentication. From the above, the network security plan for GB network will consist of, A security plan consisting of standards, guidelines, policies, implementing IDS, procedures for managing incidents and so on are developed (Winkler, 2011). Security policies are defined for the entire GB network, which includes, accessing internet, user policies, privacy matters, etc (FCC, 2012). Developing the implementation strategy which outlines steps of the plan for action in GB. Gain support from management. Network security strategies and implementation is an organization wide activity. This must be supported by IT, business and all employees in GB. Training to staff, technical training to IT staff in managing the plan must be imparted. Finally the security systems are implemented. Implementing network security technology In the WAN firewalls are implemented in the periphery of the network to prevent outside attacks and when users access the internet. A general implementation of a firewall for GB is shown in figure 2. Firewalls are used in periphery of GB network and positioned at different places in the network to prevent IP address that do not meet the specified criteria in routing tables. Since GB network uses the internet for VPNs, security measures such as port address translation (PAT) are implemented to stop attacks from outside. Figure 2: An implementation of firewall Further, the main CISCO router will ensure packet filtering, and IDS is used in GB to enhance security of data because this is an additional layer of security to prevent attacks that pass through perimeter firewall. The positioning of IDS for GB is illustrated in figure 3. Figure 3: Use of IDS along with firewall for network security Network services in GB must be analyzed for its implications for users (Zwicky, 2001). For instance, if a user has database server access, the user must be examined for web server and access to file server. Security areas are classified as trust and untrusted areas. For instance, the internet is an untrust area. In GB network DMZ zones are defined to show if the network is fully secure or insecure. The DMZ zone will provide access to untrusted users, i.e., users gaining access from internet. Normally, web and mail servers fall in DMZ zone. Database servers, authentication servers, file servers and storage systems fall in the protected zone for GB. Virtual LANs (VLAN) are implemented to ensure protection of servers. The protocols implemented in GB for network management are ICMP, RCP, TCP/IP and SNMP for monitoring availability, utilization and latency in WAN (Leskiw, 2005). In addition to this the other protocols used in configuring network security and consistency include WMI, HTTP, UDP MD5, RIP v2. The next step is to define ACLs. For example, In ACL Administration is not allowed to access Management and Accounting Using extended list ip access-list extended vlan_administration deny ip 10.8.0.0 0.7.255.255 10.64.0.2 0.31.255.255 deny ip 10.8.0.0 0.7.255.255 10.64.0.3 0.31.255.255 int fa0/0.2 ip access-group vlan_administration out Faroe not allowed to access warm site ip access-list extended vlan_faroe deny ip 10.32.0.0 0.7.255.255 10.64.0.2 0.31.255.255 permit ip 10.32.0.0 0.7.255.255 10.64.0.3 0.31.255.255 int fa0/0.4 ip access-group vlan_faroe out The ACL is configured in GB for all the sites. The deny ip command will ensure the hosts belonging to administration and Faroe fulfill the access conditions as required by GB. Testing The next stage is testing. The network and system configurations are considered in testing (Thai, 2012). In addition to this network penetration tests are done to prevent malicious IP from entering the network. The entire security technology is tested using Universal Threat Management System (UTMS) and software tool named Endian FW is used to monitor network traffic and view malicious behaviour. Testing can also be done using tool named CISCO flow, which is also sued for trouble-shooting (Kunth, 2011). The final implementation for network security is illustrated in figure 4. Figure 4: Network security implementation in GB To test packet transfer from any user IP to another remote IP on the network, ping command is used. The remote IP will respond as shown in screenshotfigure 5. Figure 5: Ping command and response from staff IP The network packet flow is illustrated in figure 6 for GB. Figure 6: Network packet flow in GB The intrusions are monitored from packet flows using UTMS and monitoring software. Conclusions In this report, the redesign of GB enterprise network is explored for ensuring network security to protect their systems and infrastructure. The security solution is achieved through the implementation of network planning, security planning and implementation of secured network to connect their offices with the enterprise network. The existing infrastructure for GB is examined for threats, attacks and performance impact on the network. The redesign of the network is explored by considering different aspects of business and IT operations. The aspects of implementing a security policy and operating procedures are emphasized. The security solution is shown in figure 1 to show the positioning of firewalls, routers and connectivity between different locations. The secured network is implemented using standard protocols with adequate scope for expansion in future. The security implementation is demonstrated using UTMS and Endian FW monitoring and network management software to test the des igned network. References Antoniou, Stelios (2007). How to configure RIP Version 2. Daya, B., (2008), Network Security: History, Importance, and Future. Florida, USA: University of Florida Department of Electrical and Computer Engineering. Davis, David (2006). Cisco administration 101: Know the basics about RIPv2. Dowd, P.W., (1998), Network security: it's time to take it seriously. Computer , 24-28. FCC (2012), Cyber Security Planning Guide. Federal Communications Commission. Ferguson, P. G. Huston, (1998), What is a VPN? Cisco Systems. Hedrick, C. (1988). Routing Information Protocol RFC1058. Network Working Group, Rutgers University. Khalid, S., T. Hatim, A. Elzoghabi and S. Mohammad (2008), Performance Evaluation of Secured Versus non-secured EIGRP Routing Protocol. Proceedings of SAM. pp.174-178. Kunath, A. (2011), Enterprise Network Testing . Indianapolis : Cisco press. Leskiw, Aaron (2015), Techniques for Monitoring WAN Links. Oppenheimer, Priscilla, (2011), Top-Down Network Design. 3rd ed. IN, USA: Cisco Systems Inc. Parziale, Lydia, David T. Britt, Chuck Davis, Jason Forrester, Wei Liu, Carolyn Matthews and Nicholas Rosselot (2006). TCP/IP Tutorial and Technical Overview. 8th ed. USA: IBM Corporation.

Network Security Plan and Implementation Report for GB

Question: Network Security Plan and Implementation Report for GB. Answer: Introduction Banking sector is one popular area where computer networks and IT systems are extensively used. Banks make use of IT network capabilities to improve their business outcomes and ensure efficiency in all their operations. In this report the network security implementation is analyzed for The Golden Bank (GB). The network security aspects are explored for security planning and for ensuring robust and adequate security measures are implemented in their systems. GB network is wide and big and faces lot of issues in maintaining and managing their IT network infrastructure. This is because the existing network found in their HQ, operations and branch offices use different protocols which are viewed as a security challenge since some of the native protocols are more vulnerable to latest attacks and viruses. Company Overview GB Headquarters is based in Tivoli which has 80 employees. There are two remote branch offices, one at Greenland and the second one at Faroe. In addition to this the operations building is located 60 Kms away from Tivoli and a warm backup storage site located 100 Kms away from Tivoli. In addition to this, there are 28 branch offices all connecting to operations office using frame relay or DSL links. All these 28 branch offices are similar in spread. GB also has 28 ATM machines which use SNA protocols to communicate with operations. Some file servers still run primitive IPX/SPX protocols and some of them use TCP/IP. The HQ and operations office and warm backup site use T3 leased line, HQ connects with Greenland and Faroe with T1 leased line. The warm site backup office is used for off-site data storage and this is done regularly to ensure protection. The bank also provides connectivity to outside vendors. The bank uses CISCO 2600 multiservice platform routers, has network attached sto rage (NAS), a combination of windows and Linux servers and desktops running Windows 8 OS. Each branch office, the operations office, remote offices and warm backup site has a LAN running on 10Base-T Ethernet, the LAN in HQ runs on 100Base-T Ethernet. Frame relay networks are used by branch offices and vendor to connect to operations center. Problems faced by GB: GB network is dependent on IPX/SPX, SNA and frame relay networks which the board feels is a bottleneck for further business growth. Further, GB is already pending huge amount of money in maintaining existing IT network and infrastructure with very less room for expansion. The bank also plans to expand its existing branch offices by 30% in which case the network must be scalable and flexible to accommodate more data volumes efficiently. GB also desires to have an efficient and high performing WAN/LAN with zero problems during their business operations. The scope of this report is to explore traditional WAN based solutions for managing all systems and LANs in GB through IP addressing, and to plug vulnerabilities in their servers, network devices and to protect all systems IT network infrastructure of GB from attacks and hackers. The security plans are explored and discussed for their importance in securing data and customer services in GB. Security plans and security measures will be implemented across all areas of GB operations to, Protecting all servers - web servers and database servers, NAS, servers in other offices/branches which connect to the operations center. Protection will also include individual systems and LANs at warm backup site, two remote offices, operations office and the LANs and individual systems found in all the 28 branch offices. Securing the network links between offices using appropriate encryption, decryption methods as needed. Providing redundancy at warm backup site for ensuring latest data is available from all the other offices to ensure business continuity. Positioning firewalls, proxies, DMZ, IDS/IPS, for protecting individual network devices, routers, switches, etc. Develop security implementation planning and test security vulnerabilities in the network. Network Design and Assumptions made The GB network consists of different networks all of them connected through some common routers and protocols. In order to secure the network in GB, the following general aspects are analyzed (Daya, 2008). They include, Network architecture for each network, security aspects on internet and so on. Types of attacks on servers, computers, networks, applications and data While access is provided on internet, the security measures to be implemented Understand the existing security, hardware, software, etc. GB requires cost effective high speed WAN links with accuracy between their offices. The internet can be considered as a network carrier, but since it is an open public network, GBs network packets on the internet are vulnerable to attacks. The option of VPN connectivity between operations center and branch office is considered instead of frame relay, because VPN (Ferguson Huston, 1998) can establish a more secure network compared to fame relay nets. A WAN network is essential for GB to connect all their sites and branch offices, ATMs and remote sites. WAN has the ability to connect multiple LANs (Rouse, 2007). The sites of GB are distributed however their database is centrally maintained and managed. At the same time, the data available on remote servers are also secured by real time backup at the warm backup site. In order to implement security measures at all LANs and WAN links along with devices, servers and individual computers, the top-down network design approach (Oppenheimer, 2011) is considered. The top-down approach begins with upper layers of the OSI model and moves down to further layers. In this approach the sessions layer and data transport layer is considered. The approach also takes into account GBs group structure, organization structure along with user and service authentication principles in order to fulfill certain controls in the network are fulfilled. The secured network for GB is designed to fulfill business goals that include, Improve productivity and communications along with providing data security to the organization. Reduce operational costs incurred for telecommunications and maximize business outputs Ensure information in the organization is highly protected for all employees in all locations of GB The network must also fulfill future information needs (Wen, 2001) and technical goals which is summarized as, Scalability: Scalability refers to the ability of the network to continue to function efficiently in spite of drastic changes in data flow volume or size. For good network performance in peak loads, scalability is important. Availability: Services and the network must be available at all time to users. Performance: Performance of a network is highly important to ensure GBs transactions are made efficiently and the network is able to work in its full capacity. Security: In enterprise networks, security is highly crucial particularly in enterprise networks because the computers keep connecting with other sites and also to the internet. Concerns related to security must be integrated in network design stages itself. It is important to devise a security plan and policies for the company to address the risks in deploying a secure project. The security plan must determine the consequences of an attack and make plans accordingly. The performance, availability and scalability are handled by the redundancy provided by T1 and T3 links between GBs offices and remote branches. Security is planned by establishing firewall and IDS at the periphery of the network and in internal LAN respectively. Security measures for user authentication and data encryption, establishing VPNs for connecting branch offices are considered in ensuring network security. Network Design and Architecture GB has one headquarters, two remote offices, an operations office, a warm site for offsite backup, remote offices and branches. Each office has a LAN with multiple users, routers for transferring packets and firewalls for authentication. The main router is located at operations site and warm site backup. This is the CISCO Immersive Tele-presence system as it can manage multiple protocols. The WAN plan for GB is shown in figure 1 with routers, firewalls and LAN at each location. All data passes through the main router in operations and routed to respective offices. For example, if any one branch office sends a packet to HQ, it is routed through main router. Figure 1: The WAN plan for GB Since, the entire LAN and WAN for GB is a TCP network, the router uses RIP protocol (Hendrick 1988) for routing packets from any one LAN to other LAN or subnet. For routing correctly RIP must be enabled in all routers. In the figure, the network addresses must be included in routing and interfaces participating in the WAN must be specified. This is done using the RIP command. RIP Version 2 is used to define routing tables in router. The network command is used to define connected subnets on routers. Subnets are included in routing updates because HQ has four subnets namely Finance, Accounting, Management and Administrative users. In addition to this each branch, remote offices, operations office and warm backup site, ATMs, outside support vendors are also available. RIP command must specify all IPs in each office and must also include network devices. In the GB networks, classful networks are also available in the form of outside support vendors. Classful network refer to IPs that use the GB network in addition to their existing IPs. Certain default routing updates are summarized in the network (Antoniou 2007) perimeter to establish a DMZ. RIP is used mainly to update routing tables automatically which is done as below: A router for example at remote office 1 (Faroe) may experience changes to an entry update in its routing table to include a new route. When the table in Faroe router is updated, this information is sent to other routers in the WAN to update tables automatically for this change In this way data packets across different locations in WAN is routed to their respective destinations Therefore RIP is used to define routing tables in routers in GB. IP addressing Network address in CIDR format is used for GB as it is a private IP. The private address 10.0.0.0 for GB will be subnetted across its locations by taking 3-bits as below: Number of subnets = 8 (23) Total number of hosts = 221 2 = 2097150 Subnet mask will be 255.254.0.0 The above is defined to expand the network in future. Table 1 shows the start and end IPs along with their broadcast address. Network Address First Address/n Last Address/n Broadcast Address 10.0.0.0 10.0.0.1/11 10.31.255.254/11 10.31.255.255 10.32.0.0 10.32.0.1/11 10.63.255.254/11 10.63.255.255 10.64.0.0 10.64.0.1/11 10.95.255.254/11 10.95.255.255 10.96.0.0 10.96.0.1/11 10.127.255.254/11 10.127.255.255 10.128.0.0 10.128.0.1/11 10.159.255.254/11 10.159.255.255 10.160.0.0 10.160.0.1/11 10.243.255.254/11 10.191.255.255 Table 1: GBs IP addressing scheme followed for their locations In the above table since HQ needs 80 IPs, the start address will be 10.160.1.1 and end with10.243.255.254. The router steps are given below: Router Network Address = 10.160.0.0/11 Password: gbwan Router Configuration Steps hostname hq hq(#) config t hq(config) interface fa0/1 hq(config-in) ip address 10.160.0.1 255.243.0.0 hq(config-in) no shutdown For VLAN Routing Branch office with Operations (one branch) operations(config) int fa0/0.1 operations(config-in) ip address 10.0.0.1 255.248.0.0 operations(config-in) no shutdown operations(config-in) encapsulation dot1q 2 VLAN Configuration for one branch vlan 2 name branch1 Likewise all 28 branch offices are defined, along with two remote offices at Faroe and Greenland. As each branch office, remote offices, and operations office have servers they must be defined in router. Similarly the warm back up site has network attached storage which must be taken into account in the routing table. Network Security Plan The main objective is to plan WAN security for GB due to increased threats and their use of old and obsolete protocols and systems. The network security plan is made by ensuring there is no disruption to their existing network and business operations. The following aspects are considered in GBs security plan: Identify all assets in GB along with the risks and vulnerabilities posed by each element Developing security policies and procedures for implementation Implement antivirus software in all systems (servers, PCs, etc) Testing and implementing security procedures in all GB locations Data confidentiality, privacy and integrity are highly important in WAN security. Confidentiality: In confidentiality, information contained in the network is private. The data stored in servers in GB networks is meant for private use and must be protected. Integrity: Data integrity is an important network security aspect as data is prevented from getting modified or corrupted by attackers. Non-repudiation: Ensures users will not deny using GB network. The above five aspects are highly important to be considered in order to have effective secured network system (Dowd, 1998). Physical security measures such as controlled user access by authentication process, establishing access levels in system and encryption are implemented (Oppenheimer 2011). User and access control measures will be implemented across all services, databases, servers and VPNs. The security aspects of RIPv2 protocol is also examined (Davis, 2006). Two authentication methods are available with this protocol namely plain-text and message digest 5 (MD5) (Khalid, et al., 2008). In routers plain-text is the default method, but they must be configured using MD5 because this method encrypts the password in router and secures the table. Hence, if a hacker is able to get access to physical environment the WAN can become unsecured (Parziale, et al., 2006). WAN authentication will occur when updates are received by a trusted source or router. Hence, in routers authentication ensures the entry of corrupt or malicious update, or denial of service (DoS) attacks (Rivest, 1992). Therefore, MD5 algorithm is used for authentication. From the above, the network security plan for GB network will consist of, A security plan consisting of standards, guidelines, policies, implementing IDS, procedures for managing incidents and so on are developed (Winkler, 2011). Security policies are defined for the entire GB network, which includes, accessing internet, user policies, privacy matters, etc (FCC, 2012). Developing the implementation strategy which outlines steps of the plan for action in GB. Gain support from management. Network security strategies and implementation is an organization wide activity. This must be supported by IT, business and all employees in GB. Training to staff, technical training to IT staff in managing the plan must be imparted. Finally the security systems are implemented. Implementing network security technology In the WAN firewalls are implemented in the periphery of the network to prevent outside attacks and when users access the internet. A general implementation of a firewall for GB is shown in figure 2. Firewalls are used in periphery of GB network and positioned at different places in the network to prevent IP address that do not meet the specified criteria in routing tables. Since GB network uses the internet for VPNs, security measures such as port address translation (PAT) are implemented to stop attacks from outside. Figure 2: An implementation of firewall Further, the main CISCO router will ensure packet filtering, and IDS is used in GB to enhance security of data because this is an additional layer of security to prevent attacks that pass through perimeter firewall. The positioning of IDS for GB is illustrated in figure 3. Figure 3: Use of IDS along with firewall for network security Network services in GB must be analyzed for its implications for users (Zwicky, 2001). For instance, if a user has database server access, the user must be examined for web server and access to file server. Security areas are classified as trust and untrusted areas. For instance, the internet is an untrust area. In GB network DMZ zones are defined to show if the network is fully secure or insecure. The DMZ zone will provide access to untrusted users, i.e., users gaining access from internet. Normally, web and mail servers fall in DMZ zone. Database servers, authentication servers, file servers and storage systems fall in the protected zone for GB. Virtual LANs (VLAN) are implemented to ensure protection of servers. The protocols implemented in GB for network management are ICMP, RCP, TCP/IP and SNMP for monitoring availability, utilization and latency in WAN (Leskiw, 2005). In addition to this the other protocols used in configuring network security and consistency include WMI, HTTP, UDP MD5, RIP v2. The next step is to define ACLs. For example, In ACL Administration is not allowed to access Management and Accounting Using extended list ip access-list extended vlan_administration deny ip 10.8.0.0 0.7.255.255 10.64.0.2 0.31.255.255 deny ip 10.8.0.0 0.7.255.255 10.64.0.3 0.31.255.255 int fa0/0.2 ip access-group vlan_administration out Faroe not allowed to access warm site ip access-list extended vlan_faroe deny ip 10.32.0.0 0.7.255.255 10.64.0.2 0.31.255.255 permit ip 10.32.0.0 0.7.255.255 10.64.0.3 0.31.255.255 int fa0/0.4 ip access-group vlan_faroe out The ACL is configured in GB for all the sites. The deny ip command will ensure the hosts belonging to administration and Faroe fulfill the access conditions as required by GB. Testing The next stage is testing. The network and system configurations are considered in testing (Thai, 2012). In addition to this network penetration tests are done to prevent malicious IP from entering the network. The entire security technology is tested using Universal Threat Management System (UTMS) and software tool named Endian FW is used to monitor network traffic and view malicious behaviour. Testing can also be done using tool named CISCO flow, which is also sued for trouble-shooting (Kunth, 2011). The final implementation for network security is illustrated in figure 4. Figure 4: Network security implementation in GB To test packet transfer from any user IP to another remote IP on the network, ping command is used. The remote IP will respond as shown in screenshotfigure 5. Figure 5: Ping command and response from staff IP The network packet flow is illustrated in figure 6 for GB. Figure 6: Network packet flow in GB The intrusions are monitored from packet flows using UTMS and monitoring software. Conclusions In this report, the redesign of GB enterprise network is explored for ensuring network security to protect their systems and infrastructure. The security solution is achieved through the implementation of network planning, security planning and implementation of secured network to connect their offices with the enterprise network. The existing infrastructure for GB is examined for threats, attacks and performance impact on the network. The redesign of the network is explored by considering different aspects of business and IT operations. The aspects of implementing a security policy and operating procedures are emphasized. The security solution is shown in figure 1 to show the positioning of firewalls, routers and connectivity between different locations. The secured network is implemented using standard protocols with adequate scope for expansion in future. The security implementation is demonstrated using UTMS and Endian FW monitoring and network management software to test the des igned network. References Antoniou, Stelios (2007). How to configure RIP Version 2. Daya, B., (2008), Network Security: History, Importance, and Future. Florida, USA: University of Florida Department of Electrical and Computer Engineering. Davis, David (2006). Cisco administration 101: Know the basics about RIPv2. Dowd, P.W., (1998), Network security: it's time to take it seriously. Computer , 24-28. FCC (2012), Cyber Security Planning Guide. Federal Communications Commission. Ferguson, P. G. Huston, (1998), What is a VPN? Cisco Systems. Hedrick, C. (1988). Routing Information Protocol RFC1058. Network Working Group, Rutgers University. Khalid, S., T. Hatim, A. Elzoghabi and S. Mohammad (2008), Performance Evaluation of Secured Versus non-secured EIGRP Routing Protocol. Proceedings of SAM. pp.174-178. Kunath, A. (2011), Enterprise Network Testing . Indianapolis : Cisco press. Leskiw, Aaron (2015), Techniques for Monitoring WAN Links. Oppenheimer, Priscilla, (2011), Top-Down Network Design. 3rd ed. IN, USA: Cisco Systems Inc. Parziale, Lydia, David T. Britt, Chuck Davis, Jason Forrester, Wei Liu, Carolyn Matthews and Nicholas Rosselot (2006). TCP/IP Tutorial and Technical Overview. 8th ed. USA: IBM Corporation.

Network Security Plan and Implementation Report for GB

Question: Network Security Plan and Implementation Report for GB. Answer: Introduction Banking sector is one popular area where computer networks and IT systems are extensively used. Banks make use of IT network capabilities to improve their business outcomes and ensure efficiency in all their operations. In this report the network security implementation is analyzed for The Golden Bank (GB). The network security aspects are explored for security planning and for ensuring robust and adequate security measures are implemented in their systems. GB network is wide and big and faces lot of issues in maintaining and managing their IT network infrastructure. This is because the existing network found in their HQ, operations and branch offices use different protocols which are viewed as a security challenge since some of the native protocols are more vulnerable to latest attacks and viruses. Company Overview GB Headquarters is based in Tivoli which has 80 employees. There are two remote branch offices, one at Greenland and the second one at Faroe. In addition to this the operations building is located 60 Kms away from Tivoli and a warm backup storage site located 100 Kms away from Tivoli. In addition to this, there are 28 branch offices all connecting to operations office using frame relay or DSL links. All these 28 branch offices are similar in spread. GB also has 28 ATM machines which use SNA protocols to communicate with operations. Some file servers still run primitive IPX/SPX protocols and some of them use TCP/IP. The HQ and operations office and warm backup site use T3 leased line, HQ connects with Greenland and Faroe with T1 leased line. The warm site backup office is used for off-site data storage and this is done regularly to ensure protection. The bank also provides connectivity to outside vendors. The bank uses CISCO 2600 multiservice platform routers, has network attached sto rage (NAS), a combination of windows and Linux servers and desktops running Windows 8 OS. Each branch office, the operations office, remote offices and warm backup site has a LAN running on 10Base-T Ethernet, the LAN in HQ runs on 100Base-T Ethernet. Frame relay networks are used by branch offices and vendor to connect to operations center. Problems faced by GB: GB network is dependent on IPX/SPX, SNA and frame relay networks which the board feels is a bottleneck for further business growth. Further, GB is already pending huge amount of money in maintaining existing IT network and infrastructure with very less room for expansion. The bank also plans to expand its existing branch offices by 30% in which case the network must be scalable and flexible to accommodate more data volumes efficiently. GB also desires to have an efficient and high performing WAN/LAN with zero problems during their business operations. The scope of this report is to explore traditional WAN based solutions for managing all systems and LANs in GB through IP addressing, and to plug vulnerabilities in their servers, network devices and to protect all systems IT network infrastructure of GB from attacks and hackers. The security plans are explored and discussed for their importance in securing data and customer services in GB. Security plans and security measures will be implemented across all areas of GB operations to, Protecting all servers - web servers and database servers, NAS, servers in other offices/branches which connect to the operations center. Protection will also include individual systems and LANs at warm backup site, two remote offices, operations office and the LANs and individual systems found in all the 28 branch offices. Securing the network links between offices using appropriate encryption, decryption methods as needed. Providing redundancy at warm backup site for ensuring latest data is available from all the other offices to ensure business continuity. Positioning firewalls, proxies, DMZ, IDS/IPS, for protecting individual network devices, routers, switches, etc. Develop security implementation planning and test security vulnerabilities in the network. Network Design and Assumptions made The GB network consists of different networks all of them connected through some common routers and protocols. In order to secure the network in GB, the following general aspects are analyzed (Daya, 2008). They include, Network architecture for each network, security aspects on internet and so on. Types of attacks on servers, computers, networks, applications and data While access is provided on internet, the security measures to be implemented Understand the existing security, hardware, software, etc. GB requires cost effective high speed WAN links with accuracy between their offices. The internet can be considered as a network carrier, but since it is an open public network, GBs network packets on the internet are vulnerable to attacks. The option of VPN connectivity between operations center and branch office is considered instead of frame relay, because VPN (Ferguson Huston, 1998) can establish a more secure network compared to fame relay nets. A WAN network is essential for GB to connect all their sites and branch offices, ATMs and remote sites. WAN has the ability to connect multiple LANs (Rouse, 2007). The sites of GB are distributed however their database is centrally maintained and managed. At the same time, the data available on remote servers are also secured by real time backup at the warm backup site. In order to implement security measures at all LANs and WAN links along with devices, servers and individual computers, the top-down network design approach (Oppenheimer, 2011) is considered. The top-down approach begins with upper layers of the OSI model and moves down to further layers. In this approach the sessions layer and data transport layer is considered. The approach also takes into account GBs group structure, organization structure along with user and service authentication principles in order to fulfill certain controls in the network are fulfilled. The secured network for GB is designed to fulfill business goals that include, Improve productivity and communications along with providing data security to the organization. Reduce operational costs incurred for telecommunications and maximize business outputs Ensure information in the organization is highly protected for all employees in all locations of GB The network must also fulfill future information needs (Wen, 2001) and technical goals which is summarized as, Scalability: Scalability refers to the ability of the network to continue to function efficiently in spite of drastic changes in data flow volume or size. For good network performance in peak loads, scalability is important. Availability: Services and the network must be available at all time to users. Performance: Performance of a network is highly important to ensure GBs transactions are made efficiently and the network is able to work in its full capacity. Security: In enterprise networks, security is highly crucial particularly in enterprise networks because the computers keep connecting with other sites and also to the internet. Concerns related to security must be integrated in network design stages itself. It is important to devise a security plan and policies for the company to address the risks in deploying a secure project. The security plan must determine the consequences of an attack and make plans accordingly. The performance, availability and scalability are handled by the redundancy provided by T1 and T3 links between GBs offices and remote branches. Security is planned by establishing firewall and IDS at the periphery of the network and in internal LAN respectively. Security measures for user authentication and data encryption, establishing VPNs for connecting branch offices are considered in ensuring network security. Network Design and Architecture GB has one headquarters, two remote offices, an operations office, a warm site for offsite backup, remote offices and branches. Each office has a LAN with multiple users, routers for transferring packets and firewalls for authentication. The main router is located at operations site and warm site backup. This is the CISCO Immersive Tele-presence system as it can manage multiple protocols. The WAN plan for GB is shown in figure 1 with routers, firewalls and LAN at each location. All data passes through the main router in operations and routed to respective offices. For example, if any one branch office sends a packet to HQ, it is routed through main router. Figure 1: The WAN plan for GB Since, the entire LAN and WAN for GB is a TCP network, the router uses RIP protocol (Hendrick 1988) for routing packets from any one LAN to other LAN or subnet. For routing correctly RIP must be enabled in all routers. In the figure, the network addresses must be included in routing and interfaces participating in the WAN must be specified. This is done using the RIP command. RIP Version 2 is used to define routing tables in router. The network command is used to define connected subnets on routers. Subnets are included in routing updates because HQ has four subnets namely Finance, Accounting, Management and Administrative users. In addition to this each branch, remote offices, operations office and warm backup site, ATMs, outside support vendors are also available. RIP command must specify all IPs in each office and must also include network devices. In the GB networks, classful networks are also available in the form of outside support vendors. Classful network refer to IPs that use the GB network in addition to their existing IPs. Certain default routing updates are summarized in the network (Antoniou 2007) perimeter to establish a DMZ. RIP is used mainly to update routing tables automatically which is done as below: A router for example at remote office 1 (Faroe) may experience changes to an entry update in its routing table to include a new route. When the table in Faroe router is updated, this information is sent to other routers in the WAN to update tables automatically for this change In this way data packets across different locations in WAN is routed to their respective destinations Therefore RIP is used to define routing tables in routers in GB. IP addressing Network address in CIDR format is used for GB as it is a private IP. The private address 10.0.0.0 for GB will be subnetted across its locations by taking 3-bits as below: Number of subnets = 8 (23) Total number of hosts = 221 2 = 2097150 Subnet mask will be 255.254.0.0 The above is defined to expand the network in future. Table 1 shows the start and end IPs along with their broadcast address. Network Address First Address/n Last Address/n Broadcast Address 10.0.0.0 10.0.0.1/11 10.31.255.254/11 10.31.255.255 10.32.0.0 10.32.0.1/11 10.63.255.254/11 10.63.255.255 10.64.0.0 10.64.0.1/11 10.95.255.254/11 10.95.255.255 10.96.0.0 10.96.0.1/11 10.127.255.254/11 10.127.255.255 10.128.0.0 10.128.0.1/11 10.159.255.254/11 10.159.255.255 10.160.0.0 10.160.0.1/11 10.243.255.254/11 10.191.255.255 Table 1: GBs IP addressing scheme followed for their locations In the above table since HQ needs 80 IPs, the start address will be 10.160.1.1 and end with10.243.255.254. The router steps are given below: Router Network Address = 10.160.0.0/11 Password: gbwan Router Configuration Steps hostname hq hq(#) config t hq(config) interface fa0/1 hq(config-in) ip address 10.160.0.1 255.243.0.0 hq(config-in) no shutdown For VLAN Routing Branch office with Operations (one branch) operations(config) int fa0/0.1 operations(config-in) ip address 10.0.0.1 255.248.0.0 operations(config-in) no shutdown operations(config-in) encapsulation dot1q 2 VLAN Configuration for one branch vlan 2 name branch1 Likewise all 28 branch offices are defined, along with two remote offices at Faroe and Greenland. As each branch office, remote offices, and operations office have servers they must be defined in router. Similarly the warm back up site has network attached storage which must be taken into account in the routing table. Network Security Plan The main objective is to plan WAN security for GB due to increased threats and their use of old and obsolete protocols and systems. The network security plan is made by ensuring there is no disruption to their existing network and business operations. The following aspects are considered in GBs security plan: Identify all assets in GB along with the risks and vulnerabilities posed by each element Developing security policies and procedures for implementation Implement antivirus software in all systems (servers, PCs, etc) Testing and implementing security procedures in all GB locations Data confidentiality, privacy and integrity are highly important in WAN security. Confidentiality: In confidentiality, information contained in the network is private. The data stored in servers in GB networks is meant for private use and must be protected. Integrity: Data integrity is an important network security aspect as data is prevented from getting modified or corrupted by attackers. Non-repudiation: Ensures users will not deny using GB network. The above five aspects are highly important to be considered in order to have effective secured network system (Dowd, 1998). Physical security measures such as controlled user access by authentication process, establishing access levels in system and encryption are implemented (Oppenheimer 2011). User and access control measures will be implemented across all services, databases, servers and VPNs. The security aspects of RIPv2 protocol is also examined (Davis, 2006). Two authentication methods are available with this protocol namely plain-text and message digest 5 (MD5) (Khalid, et al., 2008). In routers plain-text is the default method, but they must be configured using MD5 because this method encrypts the password in router and secures the table. Hence, if a hacker is able to get access to physical environment the WAN can become unsecured (Parziale, et al., 2006). WAN authentication will occur when updates are received by a trusted source or router. Hence, in routers authentication ensures the entry of corrupt or malicious update, or denial of service (DoS) attacks (Rivest, 1992). Therefore, MD5 algorithm is used for authentication. From the above, the network security plan for GB network will consist of, A security plan consisting of standards, guidelines, policies, implementing IDS, procedures for managing incidents and so on are developed (Winkler, 2011). Security policies are defined for the entire GB network, which includes, accessing internet, user policies, privacy matters, etc (FCC, 2012). Developing the implementation strategy which outlines steps of the plan for action in GB. Gain support from management. Network security strategies and implementation is an organization wide activity. This must be supported by IT, business and all employees in GB. Training to staff, technical training to IT staff in managing the plan must be imparted. Finally the security systems are implemented. Implementing network security technology In the WAN firewalls are implemented in the periphery of the network to prevent outside attacks and when users access the internet. A general implementation of a firewall for GB is shown in figure 2. Firewalls are used in periphery of GB network and positioned at different places in the network to prevent IP address that do not meet the specified criteria in routing tables. Since GB network uses the internet for VPNs, security measures such as port address translation (PAT) are implemented to stop attacks from outside. Figure 2: An implementation of firewall Further, the main CISCO router will ensure packet filtering, and IDS is used in GB to enhance security of data because this is an additional layer of security to prevent attacks that pass through perimeter firewall. The positioning of IDS for GB is illustrated in figure 3. Figure 3: Use of IDS along with firewall for network security Network services in GB must be analyzed for its implications for users (Zwicky, 2001). For instance, if a user has database server access, the user must be examined for web server and access to file server. Security areas are classified as trust and untrusted areas. For instance, the internet is an untrust area. In GB network DMZ zones are defined to show if the network is fully secure or insecure. The DMZ zone will provide access to untrusted users, i.e., users gaining access from internet. Normally, web and mail servers fall in DMZ zone. Database servers, authentication servers, file servers and storage systems fall in the protected zone for GB. Virtual LANs (VLAN) are implemented to ensure protection of servers. The protocols implemented in GB for network management are ICMP, RCP, TCP/IP and SNMP for monitoring availability, utilization and latency in WAN (Leskiw, 2005). In addition to this the other protocols used in configuring network security and consistency include WMI, HTTP, UDP MD5, RIP v2. The next step is to define ACLs. For example, In ACL Administration is not allowed to access Management and Accounting Using extended list ip access-list extended vlan_administration deny ip 10.8.0.0 0.7.255.255 10.64.0.2 0.31.255.255 deny ip 10.8.0.0 0.7.255.255 10.64.0.3 0.31.255.255 int fa0/0.2 ip access-group vlan_administration out Faroe not allowed to access warm site ip access-list extended vlan_faroe deny ip 10.32.0.0 0.7.255.255 10.64.0.2 0.31.255.255 permit ip 10.32.0.0 0.7.255.255 10.64.0.3 0.31.255.255 int fa0/0.4 ip access-group vlan_faroe out The ACL is configured in GB for all the sites. The deny ip command will ensure the hosts belonging to administration and Faroe fulfill the access conditions as required by GB. Testing The next stage is testing. The network and system configurations are considered in testing (Thai, 2012). In addition to this network penetration tests are done to prevent malicious IP from entering the network. The entire security technology is tested using Universal Threat Management System (UTMS) and software tool named Endian FW is used to monitor network traffic and view malicious behaviour. Testing can also be done using tool named CISCO flow, which is also sued for trouble-shooting (Kunth, 2011). The final implementation for network security is illustrated in figure 4. Figure 4: Network security implementation in GB To test packet transfer from any user IP to another remote IP on the network, ping command is used. The remote IP will respond as shown in screenshotfigure 5. Figure 5: Ping command and response from staff IP The network packet flow is illustrated in figure 6 for GB. Figure 6: Network packet flow in GB The intrusions are monitored from packet flows using UTMS and monitoring software. Conclusions In this report, the redesign of GB enterprise network is explored for ensuring network security to protect their systems and infrastructure. The security solution is achieved through the implementation of network planning, security planning and implementation of secured network to connect their offices with the enterprise network. The existing infrastructure for GB is examined for threats, attacks and performance impact on the network. The redesign of the network is explored by considering different aspects of business and IT operations. The aspects of implementing a security policy and operating procedures are emphasized. The security solution is shown in figure 1 to show the positioning of firewalls, routers and connectivity between different locations. The secured network is implemented using standard protocols with adequate scope for expansion in future. The security implementation is demonstrated using UTMS and Endian FW monitoring and network management software to test the des igned network. References Antoniou, Stelios (2007). How to configure RIP Version 2. Daya, B., (2008), Network Security: History, Importance, and Future. Florida, USA: University of Florida Department of Electrical and Computer Engineering. Davis, David (2006). Cisco administration 101: Know the basics about RIPv2. Dowd, P.W., (1998), Network security: it's time to take it seriously. Computer , 24-28. FCC (2012), Cyber Security Planning Guide. Federal Communications Commission. Ferguson, P. G. Huston, (1998), What is a VPN? Cisco Systems. Hedrick, C. (1988). Routing Information Protocol RFC1058. Network Working Group, Rutgers University. Khalid, S., T. Hatim, A. Elzoghabi and S. Mohammad (2008), Performance Evaluation of Secured Versus non-secured EIGRP Routing Protocol. Proceedings of SAM. pp.174-178. Kunath, A. (2011), Enterprise Network Testing . Indianapolis : Cisco press. Leskiw, Aaron (2015), Techniques for Monitoring WAN Links. Oppenheimer, Priscilla, (2011), Top-Down Network Design. 3rd ed. IN, USA: Cisco Systems Inc. Parziale, Lydia, David T. Britt, Chuck Davis, Jason Forrester, Wei Liu, Carolyn Matthews and Nicholas Rosselot (2006). TCP/IP Tutorial and Technical Overview. 8th ed. USA: IBM Corporation.