Design and Implement the security of the network

Assignment Help Other Subject
Reference no: EM133044445

MOD002703 Advanced Network Security Principles - Anglia Ruskin University

Assessment - Case Study

ASSESSMENT ELEMENT - CASE STUDY

Callister Inc. is new in Manchester and has opened a branch in Cambridge. The company has designed its network, but the design has several security flaws. They have approached Anglia Ruskin University with a consulting contract where brilliant students in MSc in Cyber Security students will design, implement and document a proper security solution that can accommodate the requirements of the company.
This document describes the current state of the network as well as the security requirements of Callister Inc. Finally, it describes the final deliverables for this assignment.

Topology and Initial Configuration
The company has headquarters in Manchester and a branch in Cambridge.

The network is structured as follows:

• PUBLIC NETWORK: This network is outside Callister Inc. management and should not be changed. It has a HTTPS server, accessible through the URL, a PC representing a teleworker (i.e. belongs to the company but works remotely), a PC representing an outsider to the company, a DNS server that is used by devices belonging to the PUBLIC NETWORK, and a DHCP server to provide IP address to devices connected to the PUBLIC NETWORK. The ISP router belongs to the PUBLIC NETWORK and therefore should not be modified (assume that ISP has been configured properly).
• DMZ: This is the demilitarised zone of Callister Inc. and contains all servers that are public to internal and external areas. This is under the management of the company and should be considered within your security design. It contains the company's web server, an email server and, a DNS server that is used by users

of MANCHESTER HQ and CAMBRIDGE BRANCH. The DMZ servers are known externally through their external IP addresses and internally through their internal IP addresses, which means that static NAT has been configured in the DMZ_NAT router to perform this translation. All external devices trying to communicate with the DMZ servers need to use the public (external) IP addresses.

• MANCHESTER HQ: This is the internal network of the Manchester headquarters and is also under the management of the company. The Manchester_NAT router is the one implementing NAT translation, which means that all the devices connected to Manchester_NAT use private IP addresses to communicate internally between them but when connecting to devices on the other side of Manchester_NAT they will use the public IP address assigned by the dynamic NAT translation.
• CAMBRIDGE BRANCH: This network has all devices of the Cambridge branch that are under the management of Callister Inc. The Cambridge_NAT router implements NAT translation to allow devices connected to it to communicate to the rest of the devices. All the devices connected to Cambridge_NAT use private IP addresses to communicate internally between them but when connecting to devices on the other side of Cambridge_NAT they will use the public IP address assigned by the dynamic NAT translation.

The following configurations have already been made for you:
• IP addresses of all devices as well as hostnames
• NAT in the Manchester_NAT, Cambridge_NAT and DMZ_NAT routers. It is recommended not to modify anything of the existing configuration on those routers unless consulted with the module tutor. Assume that NAT is working properly.
• Static routing, please note that because of NAT, connectivity tests between devices that are in the same network should be done using the private IP address whilst connectivity between devices in different networks should be done using the public IP address. Figure 1 and Table 1 show the IP addresses configured in each device interface.

Security Analysis
As part of the consulting job Callister Inc. needs you to write a security analysis of their current network and come up with the security mechanisms needed to achieve basic network security. You must write a technical document that describes the security mechanisms you would recommend the company to implement supporting your decision with references to best practices and/or industry recommendations. The CCNA Security curriculum or the slides of any other security module from your course cannot be used as references but you can use white papers from Cisco or other similar documents.
Your analysis must consider the following mechanisms:

• Securing the network devices for administrative access (including AAA).
• Zone-based policy firewalls (only required in Manchester).
• Intrusion Prevention Systems.
• Layer 2 security.
• Virtual Private Networks (to communicate Manchester and Cambridge).

FOR SIMPLICITY PURPOSES YOU ARE NOT REQUIRED TO SECURE THE DMZ_NAT,
Cambridge_NAT NOR Manchester_NAT routers.

The analysis must be thorough and can include the addition of new elements to the networks that belong to the company. If your security analysis is incomplete, then this will also have an effect on your final configuration.

Assessment
Students must submit the security analysis by week 7 of the teaching semester as a formative assessment so they can receive feedback from the module tutor.

Design and Implement the security of the network
Once you are happy with the security mechanisms to implement you must configure them in the topology. The use of Packet Tracer is permitted, and the initial topology is provided in Canvas Element 010 assessment literacy page.

Testing the security of the network

Finally, you must provide a test plan of the security mechanisms. Your test plan doesn't need to include screenshots and it should just indicate the test that needs to be done to verify that the security mechanism is working properly. Table 3 shows an example on how to do the test plan, please note that show run must NOT be used as a command to verify a protocol.

Attachment:- Network Security Principles.rar

Reference no: EM133044445

Questions Cloud

Explain the concept of business communication : Explain the concept of business communication and describe formal and informal methods of communication along with changing role of technology
General data protection regulation : What is The General Data Protection Regulation (EU) 2016/679 (GDPR) regulation in EU law on data protection?
Prepare the journal entries : Prepare the journal entries that the company's accountant would prepare in 2020, assuming the errors are discovered while the 2020 books are still open
Describe the specific options the organization implemented : Select an multinational Organization and considering the following questions: Assignment
Design and Implement the security of the network : Design and Implement the security of the network - Once you are happy with the security mechanisms to implement you must configure them in the topology
Evaluation of the accounting method : Part 1: Prepare a report You are the financial manager for Perfect Plants. Use the financial statements provided for Perfect Plants Pty Ltd to assist you in pre
How much would each monthly payment be : A couple is wanting to purchase a home for $65,000. If the base payment was made each month for the 15 years, how much would each monthly payment be
Explain a list of specific work activities : Briefly explain a list of specific work activities that are enjoyed doing. About 4-5. Next, explain that what we think your boss would need to do, using motivat
Describe the exit-voice-loyalty-neglect model : Describe the exit-voice-loyalty-neglect model in terms of specific workplace examples. Which response do you believe is most detrimental to organizational

Reviews

len3044445

12/9/2021 10:23:12 PM

We need to write analysis of a particular companys security. We will be given a packet tracer topology, We have to analyze and implement few security devices such as firewalls, IPS, layer 2 security, Passwords if required for required devices, VPNs. You can see what all we need to implement in the below attachment. - The main thing is in analysis part( carries 30%) we need to explain the security policies connecting to company and explain why we need to implement these policies and where we need to place them in the packet tracer. - After analysis, If the analysis is correct, then we can move ahead with testing and implementation.

Write a Review

Other Subject Questions & Answers

  Different types of research methodologies

Critically discuss the different types of research methodologies used in the health sciences. How would you apply one of these research methods in your places of workplace?

  For each assignment you will use the muse link to complete

for each assignment you will use the m.u.s.e. link to complete the lab.in this lab you will see the time progression of

  Read article and write summary about what you have read

Go to Workforce Magazine's website: Read an article from the site and write a summary about what you have read - in your own words.

  Examples of any of these persuasive techniques

Persuasive authors use specific sentence structures, punctuation and quotations to support their opinions. Record three examples of any of these persuasive techniques.

  Create a parallel structure when listing items

Create a Parallel Structure When Listing Items. Place quotation marks around a phrase when you want an exact term. Many search engines have "wild cards" (usually an asterisk) to find plurals and other forms of a word.

  Why is a csr program important

Choose one of Forbes' "10 Most Admired Companies" and read the company's annual CSR report. Why is a CSR program important?

  Example require deductive or inductive logic

Imagine your child is trying to prove that she did not steal chocolate chip cookies from the cookie jar, so she makes this argument: “There are no chocolate stains on my hands, so I couldn’t have stolen the cookies.” Does this example require deducti..

  The concept of refers to criminal intent or the guilty mind

Under the concept of , institutional custodians acted as parental substitutes with far-reaching powers over their charges.

  Describes how you would present the findings of the studies

A summary of the research articles and describes how you would present the findings of the studies for each of the five components.

  Which of the given would be automatic stabilizers

Which of the following would be automatic stabilizers? Is there a stigma attached to automatic stabilizers and are they what are sometimes referred to.

  Define critical issues that police managers have encountered

Discuss the critical issues that police managers have encountered historically and compare them to today's critical issues of immigration, use of force.

  Lesson implementation and reflection

Implementation of a social studies lesson can be quite different from how a science lesson would be taught.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd