Discuss the appropriate security design

Assignment Help Computer Network Security
Reference no: EM132400090

Purpose of the assessment

This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them.

• Describe architectural VPN design for small, medium and large businesses and corporations
• Report on the health of the existing VPN architecture, solution, data, application, and technology
• Discuss the appropriate security design and solutions for varieties of organisations
• Report on the current and future state of the management of VPN infrastructure and its technologies
• Interpret a roadmap process to transform the VPN architecture to support long- term organisations' goals
• Implement a process to support the administration and the management of VPN

Assignment Description

Tasks:

There are two parts to this assignment, i.e. part A and part B.

1. Investigate, design and develop a suitable VPN network for a fictitious company in Australia (National Cyber Security Services Inc.) by addressing the following criteria. See detailed instruction in the next section.

2. Presentation.

Part A description

National Cyber Security Services Inc. is a fictitious company in Australia and currently operating in Brisbane. Recently, National Cyber Security Services Inc. is planning to expand their operations in Melbourne and Sydney. You have been contracted to analyse various options and develop a VPN network design so that three sites can be connected securely. This is in addition to remote users (5 from Melbourne and three from Sydney) who should be able to access their work from the company site while travelling.

1. Design a network for National Cyber Security Services Inc.

2. Build VPN services for the users. The network solution would be built on a simulator (such as Packet Tracer or NetSim) and include establishing VPN connections from remote sites to main branch in Brisbane.

3. You need to select the IP address of your network at main branch based on your group ID of the third subnet such as: 10.0.g.x, where g is your group ID. The other branches at Sydney and Melbourne can use the same ip or different IP but with third subnet equal to your group ID. You need to use different IP for WAN connection.

Report must include:

• Introduction
• Scopes and Limitations
• Requirements (Network parts and VPN service parts)
• Solution Design
o Logical Design
o Physical Design
o Network Topologies
o IP addressing
o Security features and Policies

o Redundancy and Failover plans
o VPN service Deployment and implementation
• Refer the sample document included in below for network design, and consider how to deploy and implement relevant VPN services onto the network. You need to choose the right type of VPNs and protocols that satisfy the requirements for remote and branch to branch connectivity.

Part B description

Presentation slides should be submitted in Moodle prior to the presentation for marking. No other options (e.g. hard copy, memory stick, website, email etc) will be considered but the presentation file submitted in Moodle. Students need to demonstrate their work in Lab 11. The demonstration will include viva voce (oral test) questions as well. The final mark of Part A of this assignment might be reduced to half based on students' presentation.

Attachment:- Virtual Private Networks.rar

Reference no: EM132400090

Questions Cloud

Evaluate various accounting information systems : Use different methodologies to evaluate various accounting information systems and Identify, analyse and compare different types of accounting information
HA2042 Accounting Information Systems Assignment Problem : HA2042 Accounting Information Systems Assignment Help and Solution, Holmes Institute - Assessment Writing Service - Prepare a report to the Managing Director.
MKT00720 Marketing Assignment Problem : MKT00720 Marketing Assignment Help and Solution, Southern Cross University - Assessment Writing Service - What marketing strategy or strategies
BN309 Computer Forensics Assignment Problem : BN309 Computer Forensics Assignment Help and Solution, Melbourne Institute of Technology - Assessment Writing Service - Prepare a forensic image with the record
Discuss the appropriate security design : Describe architectural VPN design for small, medium and large businesses and corporations and Discuss the appropriate security design and solutions.
Where in the layers does the DNA form : What does mushing the fruit do and What does the soap do to the fruit - What happens to the DNA in the foods you eat
Describe your strategy for resolving the issue : Sections of the Act and provide a copy of the policy (or policies), citing the sections referenced. Please note that this policy document does not count
Develop a wage structure for the customer service agent : Develop a wage structure for the Customer Service Agent position by pricing the job and completing the wage structure using a rate range approach
FNSACC502 Prepare tax documentation for individuals : FNSACC502 Prepare tax documentation for individuals Assignment Help and Solution, Elite Education Vocational Institute - Assessment Writing Service.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Give a description of the certification or degree program

Describe how often you need to re-certify, and describe if there are any CEUs you must complete after testing for your certification.

  Brief description of the malware and it capabilities

Visit the Museum, choose a malware from the collection and study it. Post a brief description of the Malware and it capabilities. Your post should be in your own words based on your understanding of the malware that you examined. Text-book style ..

  Create random secret one-time pad key ka and xors

Creates random secret one-time pad key KA and XORs it with K. She sends M1 = KA K to Bob. Bob creates random secret one-time pad key KB, XORs what he gets with it to compute M2 = M1 KB.

  Potential threats to a bank using mobile technology

Your goal is to identify the potential threats to a bank using mobile technology and rank them in terms of risk. To calculate risk, you will need to rank each threat in terms of severity and likelihood- ITECH3215-7215

  How to set up or improve their cybersecurity

How should government justify telling private industry how to set up or improve their cybersecurity?

  What descriptive labels might apply to this type of threat

What descriptive labels might apply to this type of threat/incident? How would the organization try to discourage, or reduce the incentives that could attract possible threat actors?

  How to manage the file system encryption keys

Setup a 64MB encrypted file system in a file on a Flash drive so that it can be used with the cryptmount command.

  Define the vulnerability assessment requirement

Define the vulnerability assessment requirement, propose a solution, and justify the solution. Define the risk management requirement, propose a solution.

  Cryptography and network security

CS 470: Cryptography and Network Security,  Compare the RSA and EIGamal signature schemes' performance in terms of efficiency of the verification operation, ability to pre-compute most of the signature operation in advance.

  Define cybercrimes and computer security

Evaluate how teamwork and leadership are effective tools for financial forensic investigations. Provide support for your evaluation.

  What plan will you follow to assign printers to all the user

What plan will you follow to assign printers to all the users in the organization and how will you use your network administrator skills and knowledge in assigning IPs to each user?

  Explore and analyse information security threats

Assessment Three - Cyber intelligence is the ability to define, explore and analyse information security threats. Advanced adversaries accomplish their goals using advanced tools

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd