Demonstrate concepts related to basic cryptography

Assignment Help Other Subject
Reference no: EM133622076

Network Security

Title - Network Security Implementation using ACL, IPS and VPN

Learning Outcome 1: Develop an in-depth understanding of fundamental concepts and challenges in data and network security
Learning Outcome 2: Demonstrate concepts related to basic cryptography
Learning Outcome 3: Critically evaluate threats to data and network security; design and implement security solutions using networking IOS

Introduction

For this coursework, you are required to implement network security. You must reflect/validate the network security services and produce an associated 3000 words report. You need to complete this assignment as an individual. Please provide a detailed walk-through snippet of secure network and services. The quality of walk-through snippet will influence the weighting of assignment marks.

Assume that you are working as a Network Security Engineer at Equinox IT Solution, Ltd in London. The Equinox IT solution, Ltd was subject to security breaches in the past, which caused financial lose and effected the organization reputation as well. This time the organization is focusing on robust Network Security implementation to protect confidential data in transit. It will also be helpful for security auditing. You have been asked to implement and test network security of Equinox IT Solutions Company. The network topology of EIS is given below:

Equinox IT Solution Network Topology

Your main task is to design and implement network security with direct link to Internet/Wide Area Network (WAN) in a series of Block Tasks. You should be able to design and implement Site-to-Site VPN Tunnel, ACL and IOS based Intrusion Prevention System (IPS) along with basic device hardenings to secure organisation Local Area Network (LAN) using appropriate network simulation environment. The organisational network enable integration with IPsec VPN that allow strong encryption to ensure confidentiality and integrity. The network and security services can be designed using well known network simulators.

Assignment Tasks:
Your work must be presented in the form of a Project Report and be no longer than 3000words (excl. references, figures, tables and appendices) plus a facing page that includes the executive summary. This should be typed on A4 paper and use a font size Arial 11 single spacing. For completeness, you may if you wish include additional material in an appendix but this will not contribute to the marks.

Portfolio Task(s):

Block A: Network Architecture and Communication
1. Implement basic device hardening with the following services fully running and functional, DNS Server, Web Server and Sys log Server.
2. Allocate and distribute the IP addresses to network and end devices according to given design both static configuration and dynamic configuration via DHCP server.
3. Implement and configure Dynamic Routing using RIPV2/OSPF protocol to demonstrate effective routing on WAN network between internal and external site. It is preferred to use OSPF.
4. Configuring appropriate VLAN trunking for multiple VLAN'S to segment the traffic in separate broadcast domain for security reasons.
5. Design and implement fully functional Inter-Vlan routing using IEEE 802.1Q encapsulation standard to demonstrate connectivity between business sites.

Block B: Secure Operations and Service Delivery
1. Configure Access Control List (ACL) on routing device to implement the Security Policy to restrict the network access according to the organisation policy. (Reasonable assumptions can be made).

2. Implement and configure a Site-to-Site IPsec VPN to comprehensively encrypt the traffic traveling over WAN network between internal and external site network. Evidence must be provided on how the VPN Tunnel provide the integrity and confidentiality for the IP packets traversing in and out of network.

3. Implement IOS based Network Intrusion Prevention System (IPS) and test its efficiency in your deployment to secure internal network.

4. Implement a firewall and configure relevant rules in the context of the given scenario. Evidence the functionality and provide a narrative elaborating on the rationale behind the location on the network.

Block C: Research & Development
1. Zero Trust is a network security model, based on a strict identity verification process. The framework dictates that only authenticated and authorized users and devices can access applications and data. At the same time, it protects those applications and users from advanced threats on the Internet. Considering the context of case study and practical implementation of block A and B, please discuss and critically analyse the Zero Trust Network Security Model. You should refer to your security implementation in given network for the sake of discussion and back up your findings with credible references to demonstrate critical research on the topic.

2. With reference to the case study, critically discuss how IPsec VPN can be used to achieve security. Identify the level of reliability and critically discuss the cryptographic mechanism of IPsec.

Create a single report for each of the three (3) block tasks described in the previous section. You should record and analyse all the steps followed to complete the installation configuration of network security services. Although a certain flexibility of the way you construct your report, an indicative structure is given below:

Report Structure:
1. Executive Summary
2. Block A: Architecture and Communication
2.1 Configure IP connectivity and device hardening
2.2 Configure servers DNS, WEB, SYS-Log.
2.3 Configure Dynamic Routing (RIPV2) and Inter-Vlan Routing/Trunking
3. Block B: Secure Operations and Service Delivery
3.1 Implement ACL on Routing device
3.2 Implement Site-To-Site IPSec VPN
3.3 NIPS implementation and testing
3.4 Firewall configurations
4. Research & Development
4.1 Zero Trust Network Security Framework
4.2 Overview of VPN reliability
4.3 Cryptographic mechanism of IPSec
5. Conclusion and Future Work

Reference no: EM133622076

Questions Cloud

General standards-implied standards-specific standards : The employer is likely guilty of violating OSHA's: directed standards. general standards. implied standards. specific standards.
How the role of the organization has changed over time : Brief history and role of the National Collegiate Athletic Association. Consider how the role of the organization has change over time and where it may go next.
Engagement rate is significantly lower than expected : You notice that engagement rate is significantly lower than expected. Twitter's analytics tool shows you that few people have viewed or interacted with post.
How many viewed second language learners : The asset-based approach contrasts with the deficit-based model that once dominated how many viewed second language learners.
Demonstrate concepts related to basic cryptography : Develop an in-depth understanding of fundamental concepts and challenges in data and network security and Demonstrate concepts related to basic cryptography
Agreeableness is important predictor : Your job analysis has suggested that agreeableness is an important predictor of how well someone can work in a team environment.
Explain how assistance from the city would benefit economy : Explain how assistance from the city would benefit the: Local economy; city tax revenue; the facility's standing in the league; and city identity.
Quality framework in line with philip crosby principles : Has tasked you with redesigning the organisation's project quality framework in line with Philip Crosby's principles.
What you learn about african-americans during reconstruction : What did you learn about African-Americans during Reconstruction that you did not know before? What elements of do you believe should be required learning?

Reviews

Write a Review

Other Subject Questions & Answers

  Describe a recent challenge within religious institutions

Describe a recent challenge within religious institutions, your chosen institution, and the family system. Citing three to five scholarly sources, provide

  Describe the use of hcg bath on patient

IRB is an important step in research. State the required components one should look for in a project to determine if IRB submission is needed.

  What was the defining moment that you were a member

Showcase the beginning of your involvement. What got you interested? Who was the first person to show you? What was the defining moment that made you believe.

  Evaluate the effects of their chosen outliers

The neural tube defect encephalocele is a "sac-like protrusion" of the brain (Centers for Disease Control and Prevention, 2016).

  How is a natural law of nature different from a natural law

how is a "natural law of nature" different from a "natural law in ethics"? How does a person discover what the natural tendencies and functions are for humans?

  Specific examples of the multiscale nature of the human body

Discuss three important considerations when trying to develop a model for a physiological system. THEN Why do we need to consider modeling at different spatial and temporal scales? Explain with specific examples of the multiscale nature of the human ..

  Was participation voluntary or involuntary

Was participation voluntary or involuntary? Provide a definition of "group" and explain how and why your group qualifies in meeting that definition

  Defie united states resettle refugees from african nations

Why should the United States resettle refugees from African nations

  What will you tell bob about the nature

What will you tell Bob about the nature and purpose of the evaluation and its potential consequences? Why?

  Different segments of society disproportionately

Chronic diseases affect different segments of society disproportionately because of the lack of collective action people in the communities take toward reducing health disparities

  What was the russian communist state

What differences were there between what was the Russian communist state and the Chinese communist state? Has communism changed in China during the past

  What is accessible population for this research project

What is the target population of this research project? What is the accessible population for this research project?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd