Design a secure network for a corporate environment

Assignment Help Computer Networking
Reference no: EM133566818 , Length: word count:3500

R/617/3034 Advanced Computer Networks, OTHM Level 6 Diploma in Information Technology

Aim: This unit supports learners to develop a critical understanding of relevant and modern concepts in networking technologies within the IT industry. This unit also introduces learners to the detection of threats and vulnerabilities in physical and IT security, and how to manage risks relating to organisational security.

Learning Outcome 1: Understand the concepts of servers, clients, and processes.

Learning Outcome 2: Be able to create a client/server model in a Linux system with User Datagram Protocol (UDP), Transmission Control Protocol (TCP) and Application Layer protocols.

Learning Outcome 3: Be able to design and configure a secure network for a corporate environment.

Scenario

Global ISP is a leading high-end systems integrator with a proven background in complex, advanced integrated security systems. Global ISP excels in delivering innovative solutions to complex and technically challenging problems to clients in both the government and commercial sectors. By December 2018, it had over 290,000 customers across the UK. Global ISP is now expanding further and recently they have secured a contract of creating a new technology hub in Huddersfield, UK. You are in charge of a pool of network analysts who will be designing a range of network systems in the project.

Your line manager Alex Wood has asked you to provide upskilling training to this group of analysts. You have the following tasks for your new assignment with the company.

Task 1 - Report Instructions
You need to create a report that will cover the following:

a. First part of the report covers the concepts of servers, clients, and processes. You will start by, explaining the client and server environment and the communication between clients and servers. Then you will define the terms: Process ID (PID), Parent Process ID (PPID) and ‘init'. The first part will be concluded with a comparison of the operation of parent processes and child processes.

b. Second part of the report covers Linux server basics. Start this section by explaining the features of Linux server configurations. To finish this section you need to explain the concepts of UDP and TCP systems.

c. To conclude the report, critically evaluate Network Security protocols that are relevant to Global ISP. Conclude the report with a critical analyse of the purpose and requirements of a secure network for Global ISP where they face imminent threats from hackers who want to use DDoS attack to bring its services down. Also, as you are aware that Global ISP systems are prone to phishing attacks, you should include concerning issue in your analysis.

Task 2 - Lab demonstration

All analysts have completed the mandatory academic part of the training and now they are ready to start practical part of their work. You have planned to demonstrate them how to plan, design, setup and configure a secure Linux based network system.

Instructions

a. Build and implement DNS server in Linux using UDP and TCP.

b. Design a secure network for a corporate environment that will protect Global ISP from imminent hacker attacks.

c. Configure Network Security for a secure network in a corporate environment. (Your lab instructor may give you additional security concerning scenarios.)

Reference no: EM133566818

Questions Cloud

Under what circumstances are each most effective : How do you distinguish teacher-directed and learner-directed activities in the classroom? Under what circumstances are each most effective?
Identifying deficiencies in quality : Suggest three initial steps an organization should take upon identifying deficiencies in quality.
What behaviors signs or symptoms might a child manifest : What behaviors/signs or symptoms might a child manifest after experiencing sexual trauma? Include at least three behaviors please and cite a reference.
Explain how Transtheoretical Model : Explain how the Transtheoretical (Stages of Change) Model is different for the scenario when compared to the HBM.
Design a secure network for a corporate environment : R/617/3034 Advanced Computer Networks, OTHM Level 6 Diploma in Information Technology - develop a critical understanding of relevant and modern concepts
Cause of Susan injuries : When analyzing if the state's failure to post warning signs the cause of Susan's injuries, how would you analyze the question of actual cause?
How you would reduce the risk for poor data integrity : Explain how you would reduce the risk for poor data integrity and eliminate duplicate data.
What would your choice of test depend on : What would your choice of test depend on? For the test you select, explain your design and your comparison groups. Would the hypothesis be directional
Understand the proper use of albuterol : Which statement by the client indicates they understand the proper use of albuterol??

Reviews

Write a Review

Computer Networking Questions & Answers

  Design a wireless network for your home network

Define the termcomputer-based information systems. In your definition, discuss three types of information systems, the audience or level of management served by each, and how the systems benefit the organization.

  Explaining pretty good privacy and s-mime

It is essential to encrypt it, by using solutions like PGP (Pretty Good Privacy), S/MIME (Secure Multi-Purpose Internet Message Exchange), and steganography. Research these different mechanisms.

  Investigate a tcp issue that is causing acknowledgments

How would TCP handle this problem since the sender retransmitted the unacknowledged TCP segment.

  Basic concepts of networking design

BN106 - Networking Fundamentals - Melbourne Institute of Technology - Recognize network topologies, media types and network components

  Analyze the networking needs of business

Allocate the unreserved public IPv4 addresses to different states in Australia based on the Internet users in those states. The number of Internet users

  The physiology behind your assigned fad diet

The physiology behind your assigned fad diet - Does the physiology support the diet claims?

  Explain the basic components and media of network systems

Explain the basic components and media of network systems and summarize current networking standards and how standards bodies and the standardization process impact networking technology.

  Explain advantages of using a gantt chart over a pert chart

Examine the advantages of using a Gantt chart over a PERT chart and vice versa. Determine when it is appropriate to use one over the other. Justify your response.

  The cio asks you to describe why you believe it is

you are the information security officer at a medium-sized company 1500 employees. the cio asks you to explain why you

  Risk management principles

This is the first of three assignments that will be completed for this three-assignment project, ending with a final paper in Week Four.

  Consider a situation where two microcontroller

Consider a situation where two microcontrollers are connected with a CAN network. Computer 1 generates 8-bit data packets that must be sent to Computer 2, and Computer 2 generates 8-bit data packets that must be sent to Computer 1

  Design entire cabling system for medical instrument

You have been asked to design the entire cabling system for a medical instrument manufacturer's new central warehouse. The company already has three buildings within two city blocks.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd