Discuss the appropriate security design

Assignment Help Computer Network Security
Reference no: EM132400090

Purpose of the assessment

This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them.

• Describe architectural VPN design for small, medium and large businesses and corporations
• Report on the health of the existing VPN architecture, solution, data, application, and technology
• Discuss the appropriate security design and solutions for varieties of organisations
• Report on the current and future state of the management of VPN infrastructure and its technologies
• Interpret a roadmap process to transform the VPN architecture to support long- term organisations' goals
• Implement a process to support the administration and the management of VPN

Assignment Description

Tasks:

There are two parts to this assignment, i.e. part A and part B.

1. Investigate, design and develop a suitable VPN network for a fictitious company in Australia (National Cyber Security Services Inc.) by addressing the following criteria. See detailed instruction in the next section.

2. Presentation.

Part A description

National Cyber Security Services Inc. is a fictitious company in Australia and currently operating in Brisbane. Recently, National Cyber Security Services Inc. is planning to expand their operations in Melbourne and Sydney. You have been contracted to analyse various options and develop a VPN network design so that three sites can be connected securely. This is in addition to remote users (5 from Melbourne and three from Sydney) who should be able to access their work from the company site while travelling.

1. Design a network for National Cyber Security Services Inc.

2. Build VPN services for the users. The network solution would be built on a simulator (such as Packet Tracer or NetSim) and include establishing VPN connections from remote sites to main branch in Brisbane.

3. You need to select the IP address of your network at main branch based on your group ID of the third subnet such as: 10.0.g.x, where g is your group ID. The other branches at Sydney and Melbourne can use the same ip or different IP but with third subnet equal to your group ID. You need to use different IP for WAN connection.

Report must include:

• Introduction
• Scopes and Limitations
• Requirements (Network parts and VPN service parts)
• Solution Design
o Logical Design
o Physical Design
o Network Topologies
o IP addressing
o Security features and Policies

o Redundancy and Failover plans
o VPN service Deployment and implementation
• Refer the sample document included in below for network design, and consider how to deploy and implement relevant VPN services onto the network. You need to choose the right type of VPNs and protocols that satisfy the requirements for remote and branch to branch connectivity.

Part B description

Presentation slides should be submitted in Moodle prior to the presentation for marking. No other options (e.g. hard copy, memory stick, website, email etc) will be considered but the presentation file submitted in Moodle. Students need to demonstrate their work in Lab 11. The demonstration will include viva voce (oral test) questions as well. The final mark of Part A of this assignment might be reduced to half based on students' presentation.

Attachment:- Virtual Private Networks.rar

Reference no: EM132400090

Questions Cloud

Evaluate various accounting information systems : Use different methodologies to evaluate various accounting information systems and Identify, analyse and compare different types of accounting information
HA2042 Accounting Information Systems Assignment Problem : HA2042 Accounting Information Systems Assignment Help and Solution, Holmes Institute - Assessment Writing Service - Prepare a report to the Managing Director.
MKT00720 Marketing Assignment Problem : MKT00720 Marketing Assignment Help and Solution, Southern Cross University - Assessment Writing Service - What marketing strategy or strategies
BN309 Computer Forensics Assignment Problem : BN309 Computer Forensics Assignment Help and Solution, Melbourne Institute of Technology - Assessment Writing Service - Prepare a forensic image with the record
Discuss the appropriate security design : Describe architectural VPN design for small, medium and large businesses and corporations and Discuss the appropriate security design and solutions.
Where in the layers does the DNA form : What does mushing the fruit do and What does the soap do to the fruit - What happens to the DNA in the foods you eat
Describe your strategy for resolving the issue : Sections of the Act and provide a copy of the policy (or policies), citing the sections referenced. Please note that this policy document does not count
Develop a wage structure for the customer service agent : Develop a wage structure for the Customer Service Agent position by pricing the job and completing the wage structure using a rate range approach
FNSACC502 Prepare tax documentation for individuals : FNSACC502 Prepare tax documentation for individuals Assignment Help and Solution, Elite Education Vocational Institute - Assessment Writing Service.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd