Reference no: EM133646719
Homework: Network Design Project
Question I. Assume that you are designing a network architecture for a complex enterprise with a diverse application, user community, and end-user device mix. This enterprise has exposure to the Internet in addition to providing remote access for employees to internal sites via a Virtual Private Network (VPN).
Question II. Choose a specialty topic from Module: (Cellular Security, Cloud Security, Optical Wireless Security, RFID Security, Industrial Security, Bluetooth Security, or Internet of Things (IOT) Security). Sample references are included in Blackboard. Note that any other topic besides these must be approved in advance by the instructor.
Question III. Create a network diagram for the fictitious Liberty Beverages Corporation using any diagramming tool you wish (e.g., Visio, MS Paint, application) for the diagram- but be sure to paste a standard image (e.g., JPG, PNG) of it in the final report. Include at least the following elements:
1. Remote devices used by employees and vendors
2. Demilitarized Zone (DMZ) facing externally
3. Firewall(s)
4. IDS/IPS solution
5. SIEM
6. Components integrated from chosen specialty topic
Question IV. Describe and define the following security threats with at least a paragraph each. Also describe what makes each vulnerability a threat and impact to the business.
1. Denial of Service (DOS) and Distributed Denial of Service (DDOS) attacks
2. Worms, virus, Trojan horses, and other malware.
3. Man-in-the-middle (MITM) attacks
4. Rootkit injections
5. Misconfiguration of remote mobile devices
Question V. Document how five or more components and measures in the network architecture, as well as host-based measures, address the security threats from the previous step. The components could be a combination of software or hardware in nature - such as firewalls,
IDS/IPS, routers, switches, anti-virus/malware software, full-disk encryption (FDE) and encryption in transit, remote device management software, etc.
Question VI. Describe in three or more paragraphs the specific security threats regarding the specialty topic you chose. These are in addition to those from step IV.
Question VII. Describe in three or more paragraphs the security controls (and their rationale for inclusion) that you will implement to mitigate against the security threats of the chosen specialty.
Question VIII. Beyond the network design, what additional procedural/governance measures do you recommend to address security concerns (e.g., training, procedures, policies)? Describe in two or more paragraphs at least one measure.
Question IX. Describe in one or more paragraphs how biblical principles come to bear with your proposed design and approach. Include specific scriptural references.