Designing a network architecture

Assignment Help Computer Engineering
Reference no: EM131582477

NETWORK DESIGN PROJECT - INSTRUCTIONS

Overview

For this project, you will utilize the security policies and the high-level network diagram created in Lab 2 to create a report describing the network design necessary to address common security issues.

Inputs:

1. Lab 2 outputs - security policies and high-level network diagram

2. Course textbook - Vaca, J. R. (2014). Network and system security (2nd ed.). Waltham, MA: Syngress/Elsevier. ISBN: 9780124166899.

3. Other external resources as needed

Instructions:

1. Assume that you are designing a network architecture for a complex enterprise with a diverse application, user community, and device mix.

2. Incorporate and modify the security policies and network diagram created in Lab 2 as needed to elaborate on a more comprehensive network design.

3. Describe how the overall network architecture addresses the security threats and vulnerabilities:
a. Denial of Service (DOS) and Distributed Denial of Service (DDOS) attacks
b. Worms, virus, and Trojan horses
c. Man-in-the-middle (MITM) attacks
d. Rootkit injections
e. Data security/privacy on remote mobile devices

4. Document how each component in the network architecture addresses the security issues from step 2 (and others).

5. Beyond the network design, what additional measures do you recommend to address security concerns?

Outputs:

Write a 5-page research -based paper in current APA format that focuses on a network solution design using best practices in network security. The paper must include at least 5 references in addition to the course textbook and the Bible. Include the security policies, network diagram, and answers to steps 3-5 in the instructions.

Verified Expert

Hence in this assignment we have discussed the security policy of enterprise network architecture. When your business is completely dependent on, website, internet or server then the company administration should focus on various aspects to make it secure. Six security policy has been discussed above which should be adopted keenly to protect the network.

Reference no: EM131582477

Questions Cloud

What is the average price of the tickets per game : Roger bought season tickets to professional basketball games. The cost was $945.60. The season package included 36 home games.
Improve communication within the organization : Address two additional leadership traits that can assist in managing conflict and improve communication within the organization.
Write an equation in standard form of the parabola : Write an equation in standard form of the parabola that has the same shape as the graph of f(x) = 2x2, but with the given point as the vertex (5, 3).
Discuss the importance of standard costing : Discuss the importance of standard costing and understanding variances. If a supplier were to offer you cheaper goods (price and quality)
Designing a network architecture : Describe how the overall network architecture addresses the security threats and vulnerabilities
Calculate the cash provided in operating activities : Scranton, Inc. reports net income of $257,000 for the year ended December 31. Calculate the cash provided in operating activities using the indirect method
Address two additional leadership traits : Identify the top two leadership points you would want to share at the workshop, and discuss why you selected those points.
What opinions have you read that peaked your curiosity : What opinions have you read that peaked your curiosity. What new information did you learn. What would you like to know more about
What you think should be included in a future reform : Write a paper (1,250-1,500) on what you think should be included in a future reform of the health care system, focusing on financial operating changes.

Reviews

inf1582477

9/25/2017 6:24:57 AM

I have received the assessment even before the given deadline. I hope that the answers are right. There is no issues of price when you ask expertsmind. Just submit your task with all the relavant informations and forget about the quality what else a student require more. Service is always great as usual. thanks

inf1582477

8/18/2017 5:32:23 AM

It is from ch-2 and 3 from book , bible and additional 5 references. I have made payment. Please submit as soon as you can. I have to submit by 30th. I am sending you lab steps and 2 submission of What i did. 24505143_1Lab steps.docx 24505143_2Lab 2.docx 24505175_3Shah WirelessCommunicationStandard.docx Please check your work for Plagiarism also. did you add bible and book in reference? Book should be Vaca listed in the I nstructions and regular bible where you have to relate to it. Reference should be regular bible and vaca author book listed in instructions. I want those two references. It is not same that was listed at the end. I have to part 2 for this assignment. I have attached document. 24505178_1Network Design Project Part 2 Instructions1.docx take 5 pages from last assignment and this assignment so that will be 10 pages. combine both assignment so it will be 10 pages all together. Do same thing as last paper for reference with APA format. work will also checked for plagiarism.

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd