Explain a security threat and one potential network problem

Assignment Help Computer Networking
Reference no: EM133129300

Task: Secure Network Design

SCENARIO

Company A is a property and casualty insurer underwriting multiple types of insurance. Company A is acquiring Company B, a ?nancial services organization, in order to diversify and increase market share. Company B conducts business in the same geographical area as Company A and delivers business and individual ?nancial planning services. Both companies provide services from their respective of?ces and at the customer's site. Both companies use broadband connectivity.

You are the IT director for Company A and will be the chief information of?cer (CIO) for the merged organization. You are tasked with analyzing, designing, and presenting the proposed IT integration project. Company A has clear IT infrastructure documentation, including a logical diagram, an organizational chart, and a recent security risk analysis. Company B does not have any IT infrastructure documentation, and several security and integration issues are evident. Company B outsources any IT-related needs to a consultant. Leadership for the merged organization has allocated a limited budget of $35,000 for this project and will expect justi?cation for recommended expenditures.

Integration project requirements include following secure network design principles, selecting or repurposing secure network components, assuring secure communication channels, addressing relevant regulatory compliance, minimizing potential network problems and security threats, delivering integration cost savings, and aligning IT to meet the business needs of the post-merger organization. This post-merger organization will re?ect one corporate of?ce and a branch of?ce.

REQUIREMENTS
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. The originality report that is provided when you submit your task can be used as a guide.

You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.

Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless speci?ed in the task requirements. All other submissions must be ?le types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).

A. Describe the problems Company A has with network security and infrastructure using details from one or more of the "Company A Organizational Chart," "Company A Risk Analysis," and "Company A Visio Diagram" supporting documents.

B. Run Zenmap and OpenVAS on Company B's network(s) using the "Performance Assessment Lab Area" web link. Your submission should include the following documents:
• a screenshot of the completed Zenmap scan-should be taken within the lab environment and should
include your name and student ID
• a screenshot of the OpenVAS report result-should be taken within the lab environment and should include your name and student ID
• the completed Zenmap PDF ?le(s)
• the completed OpenVAS PDF ?le-should include your name in the summary of the report

Note: This assessment requires you to submit pictures, graphics, and/or diagrams. Each ?le must be a supporting document no larger than 30 MB in size. Diagrams must be original and may be hand-drawn or drawn using a graphics program. Do not use CAD programs because the ?le will be too large. Your ?nal network drawing should be saved in *.vsd format using Microsoft Visio or a similar software tool.

C. Describe the potential impact of two network security or infrastructure problems of Company B using details from the outputs of Zenmap and OpenVas (see supporting documents below), including rationale for each problem.

1. Explain how correcting each of these problems will improve the functioning of the merged network.

D. Provide a network topology diagram using Microsoft Visio or a similar software tool that represents the proposed merging requirements from the scenario of Company A and Company B, including remediation of all existing infrastructure problems described in part A and part C.

Please follow the web link listed below to download a free student version of Visio Professional 2019.

E. Identify which layer of the OSI model and layer of the TCP/IP protocol stack apply to each component in the merged network topology diagram.

F. Justify the retention or deletion of four existing components as suggested in your proposed network topology diagram. Include how each component's retention or deletion and any newly required additions to the network address both security concerns and budgetary restrictions found in the scenario.

G. Explain how two secure network design principles are included in your proposed merged network topology diagram.

H. Describe two secure hardware and/or software components integrated into the proposed network topology and how each component will address the security needs of the merged organization.

I. Explain how the proposed network topology diagram for the merged organization addresses security safeguards based on a regulatory compliance requirement.

J. Explain a security threat and one potential network problem that would become a risk as part of the implementation of the proposed network topology diagram, including why each would become a risk.

1. Explain how the security threat and potential network problem should each be managed or mitigated as part of the implementation of the proposed topology diagram.

K. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

L. Demonstrate professional communication in the content and presentation of your submission.

Attachment:- Performance Assessment.rar

Reference no: EM133129300

Questions Cloud

Position of an economic relationship : Using the relationship between the price of a visit to a physiotherapist and the quantity of visits demanded, define and distinguish among the direction, the sl
Why would economists use simplified models : Why would economists use simplified models, like this one, when they can be challenged as being too simple to be realistic?
How a dialogue between turkey and uk focusing on trade : Explain how a dialogue between Turkey and Uk focusing on trade can help a win-win situation beneficial for both countries.
Methods to evaluate the need for change : Methods to evaluate the need for change. Strategies to gather stakeholder support and overcome resistance. Implementation strategies
Explain a security threat and one potential network problem : Identify which layer of the OSI model and layer of the TCP/IP protocol stack apply to each component in the merged network topology diagram
Analyse the strengths and weaknesses of the miners : Analyse the strengths and weaknesses of the Miners/Trade Union, Police and Government from the 1984-85 miners strike. (The one that took place in the UK)
Miners strike marked a turning point : In the wider context of employment relations in the UK. Consider the extent to which the miners' strike marked a turning point, leading to lower levels of indus
Is the article made by public or private entity : Name of the article and its author. Is the article made by a public or private entity? Who is the author trying to reach (audience)?
Contemporary challenges in transformational leadership : Describe the contemporary challenge. Apply three theories to evaluate the issue. Critically analyze the application of the theories.

Reviews

Write a Review

Computer Networking Questions & Answers

  What role do you think ids should have in security posture

What role do you think IDS (network and/or host-based) should have in the security posture of a home network?

  Find the rfc which defines ftp protocol

Find the RFC that defines the FTP protocol. Take any non text file (e.g. word document, mpg, excel or any application centric file) Segmentation of a file and forming FTP datagrams: Read first 'x' number of bytes and use them as part of payload sect..

  Demonstrate a network layout for cac requirements

ICT703 - Network Technology and Management - Demonstrate a network layout for CAC requirements you can use Figure 3 as the starting point

  What information used by a typical packet filtering firewall

What information is used by a typical packet filtering firewall? What is the difference between a packet filtering firewall and a stateful inspection firewall?

  Differences between a cpe versus the hosted version of ipt

Given the migration to IPT, what are some of the differences between a CPE (IP-PBX) versus the hosted version of IPT

  Unit 14 business intelligence assignment problem

Unit 14 Business Intelligence Assignment Help and Solution, Internal verification of assessment decisions – BTEC - Assessment Writing Service.

  Recognize hardware and software required to secure your

write a 3- to 5-page paper that includes the following based on your chosen virtual organization identify hardware and

  Wired networks in real life application

ITC513 Wireless Networking Concepts - Charles Sturt University - List three advantages and three limitations/challenges that wireless communication

  Provide a network design that address transferring of videos

Provide a network design, a drawing of a solution to address the Transferring of videos and music files between computers and Sharing Internet connection, one laser printer, and one photo printer.

  Redraw the wan to indicate its new, partial-mesh topology

What new equipment or components would need to be added to the network to make it a full-mesh WAN? How many new leased lines will be necessary?

  Explain how an integrity check value used

Briefly explain how an integrity check value (ICV) may be used in network communication to detect errors - How the receiver checks whether the message has been transmitted without error

  Need information of each of given sensors

Need information of each of given sensors and compare with other sensor brand - Arduino uno, GPS sensor, RTC sensor and Relay sensor

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd