Designing More Sophisticated Security On Their Routers And Switches Essay

Designing More Sophisticated Security On Their Routers And Switches Essay

Length: 983 words (2.8 double-spaced pages)

Rating: Better Essays

Open Document

Essay Preview

My initial assignment was to enable and configure more sophisticated security on their routers and switches. However, after a week of twiddling I grew extremely frustrated and asked my manager to be moved to a different task. I’m glad I did, because the tasks they gave afterwards were interesting and challenging, but not frustrating. The tasks were mainly code clean up and ease of life improvement in the codebase. I found these to be a good warm up to the codebase.
After one month I was finally given my own project. I wasn’t completely on my own as I had help from a coworker. The codebase used special files to package together the OS for the cisco’s routers and switches. However, these files are extremely old and haven’t been cleaned up in a long time. So my task was to program a tool that could maintain those files automatically. The tool would have to be able parse and load all the information from the files as well as analyze and optimize the packaging. The program is far from completion but has come a long way. My coworker is taking over my work for me since I will be leaving in less than a month. Meanwhile I’ve been assigned to improve the already existing OS packaging tool. So far I’ve added syntax to specify and create empty directories on the OS.
For the most part I’ve been allowed to work on my own. I don’t have an explicit supervision or mentoring to guide me. I’m on my own for most of my work, however, if I ever need to I can go speak to any of my coworkers for advice. My coworkers all very helpful and try to provide help wherever they can. I appreciate that they aren’t breathing down my neck and watching my every move. They treated me well and allowed me work with them as though I was their peer. Furthermore, Cisco pr...


... middle of paper ...


...ng about how professional software development worked. I was constantly thrown off by how complicated it is to set up an environment; managing several builds; and how slow and tedious testing can be. I spent the majority of the time learning about how to use their tools. In the end though I did figure out (with help from my coworkers) how to develop software professionally.
A few of my coworkers had degrees in electrical engineering. I found this incredibly surprising. A lot of them learnt programming on their own with a few classes here and there. Originally I was planning on taking a minor in computer science so I could improve my programming skills, but after this internship, I feel like I don’t have to. I can just learn most of the material on my own.
Overall this has been an extremely satisfying internship. However, next time I’ll choose to live closer to work.

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Essay on Types of Routing and Date Retransmitting Hardware and Devices

- There are many types of routing or data/packet retransmitting hardware and devices that networks can utilize for security purposes. Some use one or a combination for data transfer. However, each poses a level or type of vulnerabilities, additional unwanted threats, and countless types of risk. The quintessential design is to provide a means to controlling the flow of packet transfer. The main function of the switch, router, gateways, or hubs is having the ability to process and forward data packets on the network....   [tags: gateways, hubs, switches]

Better Essays
673 words (1.9 pages)

Process Control Systems ( Pcs ) Essay

- SCADA, or often referred as Process Control Systems (PCS) is interpreted as an overall collection of control systems that measures, reports, and changes processes SCADA is the acronym of Supervisory Control and Data Acquisition, which is a communication technology scheme for collecting data from distant facilities and also controlling them on control systems. In the beginning SCADA system was locally introduced, and it has been applied to larger and wide-area systems as the information technology evolves....   [tags: SCADA, Process control, Security]

Better Essays
1781 words (5.1 pages)

A Noval Approach For Interfacing Switches on Gloves With Pic Micro Controller Implementation

- Now a days there is a trend in using wireless keyboard and mouse. The wireless user interface technology is vast changing and many day to day objects are being transformed into user interface so that it can be easy for us. In this paper we propose a system which uses gloves for interacting with the personal computer. In addition to keyboard, mouse interface is also included in the Glove. To verify the proposal prototype is created. This proposes that when a person presses the switches on fingertip mouse movement also inputting character can be done....   [tags: Gloves, Tactile Switches, Pic Micro Controllers]

Better Essays
1086 words (3.1 pages)

Freedom is More Valued than Security Essay

- “Some tourists think Amsterdam is a city of sin, but in truth it is a city of freedom. And in freedom, most people find sin.” This might sounds like a section from a travelling guide, but it also describes why we as a society cannot gain complete freedom. Complete Freedom requires all negative repercussions from individual’s actions to be unpunished, making it impossible to allow any form of justice into the community, turning it into a den of criminals. Due to that, a government with security force to help regulate rules is necessary to keep the whole country going without breaking down....   [tags: Freedom vs Security]

Better Essays
1434 words (4.1 pages)

The Security Of A Security Essay

- Abstract This paper focusses on the analysis of the importance of the security baselines by critically looking at the significance of this security baselines on the computer operating system, application system, and various computer network components. This paper, therefore, strives to provide the organizations that do not have security guidelines in place reasons to adopt them by clearly laying down the benefits that will trickle down to them and the security risks they will be protected against....   [tags: Computer security, Security, Information security]

Better Essays
1420 words (4.1 pages)

Essay on An Audit Of The Network Security Audit

- We have conducted an audit of the Network Security Audit. This audit was conducted under the authority of Article VII, Section 5 of the Garland City Charter and in accordance with the Annual Audit Plan approved by the Garland City Council. Objective The objective of this audit is to: A. Provide management with an independent assessment relating to the effectiveness of physical controls in place to prevent unauthorized access to sensitive material. B. Provide management with an evaluation of the IT’s administrative controls that sets tone of an organization, influencing the controls consciousness of its people....   [tags: Security, Information security, Computer security]

Better Essays
1335 words (3.8 pages)

IT Security Essay

- Denial of service (DoS)- This type of attack occurs when a hacker overloads a server or network device with numerous IMCP (Internet Control Message Protocol) ping requests, such that it is unable to respond to valid requests. By updating to the latest service pack and applying security patches, you can minimize the threat of DoS attacks by reducing the vulnerabilities in the TCP/IP network protocol. Although disabling ICMP can remove valuable troubleshooting tools, it can effectively remove the possibility of DoS attacks....   [tags: Cyber-security, Enterprise Security]

Better Essays
3468 words (9.9 pages)

Homespun to Sophisticated: Place as Transformer Essay example

- Homespun to Sophisticated: Place as Transformer Works Cited Missing It is common in the transcendental philosophy to associate the act of transcending with a place. Philosophers, artists, and writers fled to Niagara Falls and the White Mountains in search of sublime scenery that would connect them with God. One of the leading Transcendentalists, Ralph Waldo Emerson, states that "Nature deif[ies] us with a few and cheap elements" (Emerson, 27). The essential communion between man and nature, through something he calls the "Oversoul," enables man to transfer the world into the consciousness, thereby uniting himself with God....   [tags: Philosophy Philosophical Papers]

Free Essays
2822 words (8.1 pages)

Essay Information Security

- Introduction The first thing that we must consider about Information Security is that there is not a final destination at which we can arrive. IT Security is an ongoing set of processes and activities that requires attention and expertise on a daily basis. It is important to understand that systems are not secured by themselves and it is our responsibility to maintain and improve them periodically as required. It is of vital importance to establish the appropriate mechanisms and requirements in order to support the company’s CIA triad....   [tags: IT Security]

Better Essays
2693 words (7.7 pages)

Network Security Essays

- Network Security Installing firewall or anti-virus software on enterprise workstations can help prevent some of the security problems the Internet can cause; but not everything. By understanding the different Open Systems Interconnect (OSI) levels and security threats involved with each one of them, it is easier to plan a strategy to combat security problems. Purpose and Scope To cover all areas I have listed the network security measures that are associated with each level of the Open Systems Interconnect (OSI)....   [tags: Security Network Technology]

Free Essays
980 words (2.8 pages)