Reference no: EM132380036
Semester Project
Assignment- CYBR 515 Harry and Mae's Incorporated
Purpose: To give you experience designing a secure network infrastructure.
Directions: You have been selected as a consultant to design a secure network for Harry and Mae's . To complete this project, read the scenario below and submit the required milestones when they are due. You may use any resources, including books, the Internet, and other appropriate sources to complete this project. Remember to cite your sources. The project is complete when you have submitted all five milestones.
Please note that this scenario is based on a fictitious company, and any similarity to a real company or real people, present or past, is coincidental and unintentional.
The written description of the case is also available on that site and attached to the assignments in the class. Please refer to it for details on the case.
The requirement:
Your job as a consultant is to document the existing network, identify current vulnerabilities, and propose a redesign that addresses the vulnerabilities and provides for security best practices to minimize future problems. Your deliverables are listed below. Good luck.
Assignment Milestone 2:
This week you will design improvements to the network infrastructure that incorporate encryption. You will also design improvements to the wireless networks. Use the information from your studies and feedback from previous assignments, to help you with this process.
Revise your original Visio diagram to depict any changes that you propose to make. Then, summarize your recommendations for change in a Microsoft Word document.
Original Visio diagram is attached as "Milestone1"
You may use any appropriate sources for your requirements. Remember to cite your sources.
The following questions are useful to you while you are creating your design. You should think about them while you are revising your diagram and summarizing your recommendations. Please do not provide answers to them as part of your deliverables.
1. Have I uncovered additional vulnerabilities since Milestone 1?
2. How should I prioritize the known vulnerabilities?
3. Can vulnerabilities be addressed through reconfiguration, or will I need additional hardware and software?
4. How can encryption address known vulnerabilities?
5. What security features are not currently in use?
6. What is the impact of using every means to encrypt the network and secure wireless access?
Your diagram should contain any revisions to the original network infrastructure that are required to improve security.
Attachment:- Milestone.rar
Attachment:- Milestone-Summary.rar