Demonstrate concepts related to basic cryptography

Assignment Help Computer Network Security
Reference no: EM133468714 , Length: word count:3000

Network Security

Network Security Implementation using ACL, IPS and VPN

Learning Outcome 1: Develop an in-depth understanding of fundamental concepts and challenges in data and network security
Learning Outcome 2: Demonstrate concepts related to basic cryptography
Learning Outcome 3: Critically evaluate threats to data and network security; design and implement security solutions using networking IOS

Assignment Tasks:

Your work must be presented in the form of a Project Report and be no longer than 3000 words (excl. references, figures, tables and appendices) plus a facing page that includes the executive summary. This should be typed on A4 paper and use a font size Arial 11 single spacing. For completeness, you may if you wish include additional material in an appendix but this will not contribute to the marks.

Portfolio Tasks:

Block A: Network Architecture and Communication

Implement basic device hardening with the following services fully running and functional, DNS Server, Web Server and Sys log Server.

Allocate and distribute the IP addresses to network and end devices according to given design both static configuration and dynamic configuration via DHCP server.

Implement and configure Dynamic Routing using RIPV2/OSPF protocol to demonstrate effective routing on WAN network between internal and external site. It is preferred to use OSPF.

Configuring appropriate VLAN trunking for multiple VLAN'S to segment the traffic in separate broadcast domain for security reasons.

Design and implement fully functional Inter-Vlan routing using IEEE 802.1Q encapsulation standard to demonstrate connectivity between business sites.

Block B: Secure Operations and Service Delivery

Configure Access Control List (ACL) on routing device to implement the Security Policy to restrict the network access according to the organisation policy. (Reasonable assumptions can be made).

Implement and configure a Site-to-Site IPsec VPN to comprehensively encrypt the traffic traveling over WAN network between internal and external site network. Evidence must be provided on how the VPN Tunnel provide the integrity and confidentiality for the IP packets traversing in and out of network.

Implement IOS based Network Intrusion Prevention System (IPS) and test its efficiency in your deployment to secure internal network.

Implement a firewall and configure relevant rules in the context of the given scenario. Evidence the functionality and provide a narrative elaborating on the rationale behind the location on the network.

Block C: Research & Development

Zero Trust is a network security model, based on a strict identity verification process. The framework dictates that only authenticated and authorized users and devices can access applications and data. At the same time, it protects those applications and users from advanced threats on the Internet. Considering the context of case study and practical implementation of block A and B, please discuss and critically analyse the Zero Trust Network Security Model. You should refer to your security implementation in given network for the sake of discussion and back up your findings with credible references to demonstrate critical research on the topic.

With reference to the case study, critically discuss how IPsec VPN can be used to achieve security. Identify the level of reliability and critically discuss the cryptographic mechanism of IPsec.

Reference no: EM133468714

Questions Cloud

Summarize the source and discuss the research study : For all sources used in your Discussion you should: Summarize the source and discuss the research study that was conducted and what the findings were.
Wireless lan vulnerabilities assessment : LD7008 Wireless networks & Security, Northumbria University - Understand the global nature of WLAN standards and design.
Do judges know enough about the causes of criminal behavior : Do judges know enough about the causes of criminal behavior to accurately apply information from the EBS process to their attempts to tailor an appropriate
Symptoms you would look for when diagnosing disorder : Bulmia -describe the disorder. Tell what signs and symptoms you would look for when diagnosing the disorder.
Demonstrate concepts related to basic cryptography : LD7007 Network Security, Northumbria University - Develop an in-depth understanding of fundamental concepts and challenges in data and network security
Project information needs to be communicated to stakeholders : Evaluate what type of project information needs to be communicated to stakeholders. Propose the methods and steps used in creating a project communication plan.
What was the funding procedure for the facility : What was the funding procedure for the facility? How does it compare with other similar facilities? What makes this facility unique or innovative?
What do you think the reasons are for this increase : What do you think the reasons are for this increase? - Does the increase in incarceration rates align with the change in crime rates seen in the United States
Review the different models and frameworks : Review the different models and frameworks that can be used to facilitate change.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Read a breakdown of the corporate struggles of mergers

Read through a breakdown of the corporate struggles of mergers and acquisitions from a cybersecurity perspective.

  Encryption in investigations

Encryption in Investigations-Discuss in your own words the effects that encryption can have on incident response activities, and explain how the use of encryption technologies could prove to be detrimental to an investigation

  Write a page scenario in which a malware attack occurs

Detail the particular malware, the exploited vulnerability, and its attack vector in your scenario.

  The six principles of nclb

The six principles of NCLB

  What is the difference between authentication and

part 1 review questions what is the difference between authentication and authorization? can a system permit

  What are critical components for information security

What are critical components for information security - Cybersecurity program development for business: the essential planning guide. New Jersey, USA: Wiley

  What is the average or root mean square-speed

What is the average, or root mean square, speed (in m/s) of the CO2molecules in this container?

  Explain the business environment and identify the risk

Explain the business environment and identify the risk and reasoning. Review the essential elements of a security strategy

  Categories of electronic commerce

List and describe the three categories of electronic commerce as defined by the participants in the transactions.

  Determine where networks will go in the upcoming years

Networks have changed drastically over the last 30 years. With the first introduction of the 56k modem, which was about 3 typewriter pages per second.

  Collecting data on an existing firm actual short-run ouput

Suppose, after collecting data on an existing firm's actual short-run ouput, the following production function is found to match the data:

  Security controls based on anti-cybercrime techniques

Explain whether you believe adherence of regulations such as PCI are enough to protect a company from these types of breaches and why or why not and determine the types of monitoring that could be implemented to help quickly identify penetrations ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd