Describe the specific security threats regarding topic chose

Assignment Help Computer Engineering
Reference no: EM133646719

Homework: Network Design Project

Question I. Assume that you are designing a network architecture for a complex enterprise with a diverse application, user community, and end-user device mix. This enterprise has exposure to the Internet in addition to providing remote access for employees to internal sites via a Virtual Private Network (VPN).

Question II. Choose a specialty topic from Module: (Cellular Security, Cloud Security, Optical Wireless Security, RFID Security, Industrial Security, Bluetooth Security, or Internet of Things (IOT) Security). Sample references are included in Blackboard. Note that any other topic besides these must be approved in advance by the instructor.

Question III. Create a network diagram for the fictitious Liberty Beverages Corporation using any diagramming tool you wish (e.g., Visio, MS Paint, application) for the diagram- but be sure to paste a standard image (e.g., JPG, PNG) of it in the final report. Include at least the following elements:

1. Remote devices used by employees and vendors
2. Demilitarized Zone (DMZ) facing externally
3. Firewall(s)
4. IDS/IPS solution
5. SIEM
6. Components integrated from chosen specialty topic

Question IV. Describe and define the following security threats with at least a paragraph each. Also describe what makes each vulnerability a threat and impact to the business.

1. Denial of Service (DOS) and Distributed Denial of Service (DDOS) attacks
2. Worms, virus, Trojan horses, and other malware.
3. Man-in-the-middle (MITM) attacks
4. Rootkit injections
5. Misconfiguration of remote mobile devices

Question V. Document how five or more components and measures in the network architecture, as well as host-based measures, address the security threats from the previous step. The components could be a combination of software or hardware in nature - such as firewalls,
IDS/IPS, routers, switches, anti-virus/malware software, full-disk encryption (FDE) and encryption in transit, remote device management software, etc.

Question VI. Describe in three or more paragraphs the specific security threats regarding the specialty topic you chose. These are in addition to those from step IV.

Question VII. Describe in three or more paragraphs the security controls (and their rationale for inclusion) that you will implement to mitigate against the security threats of the chosen specialty.

Question VIII. Beyond the network design, what additional procedural/governance measures do you recommend to address security concerns (e.g., training, procedures, policies)? Describe in two or more paragraphs at least one measure.

Question IX. Describe in one or more paragraphs how biblical principles come to bear with your proposed design and approach. Include specific scriptural references.

Reference no: EM133646719

Questions Cloud

How is leadership different from power : How is leadership different from power? What are the similarities and differences among the five bases of power?
Identify a specific information system for data mining : Identify a specific information system for data mining and explain an issue that the system might encounter when dealing with big data.
Identifying a training program : Business case through a detailed memo to your HR Director (or other relevant leader) for how a training program can support the organization's strategic goals.
What tasks are necessary before the project can closed : What additional tasks are necessary before the project can be closed? Outline how this can be used by future project teams during the planning stages.
Describe the specific security threats regarding topic chose : Describe the specific security threats regarding the specialty topic you chose. Describe the security controls that you will implement to mitigate.
What is agreement that you are surprised that nfl owners : What is one agreement that you are surprised that the NFLPA agreed on and why? What is one agreement that you are surprised that the NFL owners agreed on.
Variety of payment models for healthcare services : Select one of the payment methodologies covered (new or traditional) and share an external resource that describes or aligns with that system.
General manager of hamiltons hardware : Imagine that you are the general manager of Hamilton's Hardware. Consider whether employee monitoring would be a useful control technique
Discuss the value of a professional career portfolio : In this paper I will discuss the value of a professional career portfolio that includes important factors such as teaching philosophy.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a piece two values from the user

Write a piece two values from the user, the length of the of code that accepts output about how interested you in path and rating for the park.

  What would help the tactical analyst in the data mining

What would help the tactical analyst in the data mining of relevant information and transitioning that information into actionable intelligence

  Research any three different wireless network protocols

Research any THREE different wireless network protocols in details and pay specific attention to how they are used as well their strengths and weakness.

  Discuss scope of a cloud computing audit for your business

Describe in 500 words discuss the scope of a cloud computing audit for your business. The response must be typed, double spaced.

  Design a circular node list adt that abstracts a circularly

Design a circular node list ADT that abstracts a circularly linked list in the -same way that the node list ADT abstracts a doubly linked list.

  Describe the type of organization or business challenge

An evaluation of key business drivers that motivate organizations to consider implementing Cloud Computing technology. Also include an example of a type.

  How erm integrated with an organization overall strategy

Discuss strategy and how ERM can be integrated with an organization's overall strategy. Prepare a research paper on some of the various issues, protocols.

  Explain fully how you obtained your solution

Without using a computer decrypt the following ciphertext which has been encrypted using an affine substitution cipher.

  Explain why using h-mac is more secure than mac

In a 3 page paper, complete the following: Compare the differences between MAC and H-MAC. Explain why using H-MAC is more secure than MAC

  Define the structure and syntax of an html page

Discuss two types of pages supported by ASP .NET. How is an ASP.NET application created? How does an ASP.NET application differ from a desktop application? define the structure and syntax of an HTML page.

  If most critical infrastructure in the united states

CMIT 495 University of Maryland If most critical infrastructure in the United States is owned by the private sector, what responsibility does the DoD have

  Define overview of loops and a coding fragment sample

Because of your recent work as a software development contractor, you are hired to present an overview of C# programming to a new group of contractors.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd