Explain impact that each configuration has on security

Assignment Help Computer Engineering
Reference no: EM132363056

Assignment: Using the network diagram attached below, incorporate into the diagram the devices on the lower right to create a secure corporate network. The devices you must incorporate into the network diagram include: Web server, ftp server, vulnerability scanner, anti-virus server (client-based / server-based), Web proxy, intrusion detection system (IDS), and authentication server.

Note: All client-based / server-based devices work where a client is installed on a workstation, which has bidirectional communication with a corresponding server.

Write a paper in which you:

1. Determine which devices you will use for both the current network diagram infrastructure consisting of firewalls, routers, and workstations as well as the device(s) you need to incorporate. Include the following for each:

• Make or vendor's name (e.g., Microsoft, Redhat, Cisco, Juniper, Netgear, 3Com, etc.)

• Model (e.g., Windows 7, ASA 5500, Cisco 3500, Squid, etc.)

• IP address assigned to all devices

2. Establish the configuration for each device in which you:

• Research each of the devices you chose and provide a basic configuration you would use in your network.

• Use IP addresses to describe your configuration.

• Explain the impact that each of your configurations has on the security of the entire network.

• Highlight at least five (5) security features for each device, including devices in network diagram.

3. Using Microsoft Visio or its open source alternative, create a final network diagram that incorporates all devices into the existing network and ensures the following:

• VPN sessions (from laptop) are only allowed to access the desktops in the IT department by IT department employees.

• All VPN connections from the Internet cloud into the corporate network terminate at the VPN server.

• Users from Engineering and Finance and Accounting CANNOT communicate.

• Vulnerability scans occur daily in which all desktops are scanned at least once per day.

4. Use at least four (4) quality resources in this assignment. (Note: Wikipedia and similar websites do not qualify as quality resources.)

5. Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

Information related to above question is enclosed below:

Attachment:- Two_Network_Map.rar

Reference no: EM132363056

Questions Cloud

Difference between bioavailability and speciation : What could be the reason of using MgCl2 reagent in the extraction of Cr Speciation in soil?
Calculate the ph of an aqueous solution : Calculate the pH of an aqueous solution containing 0.80 M lactic acid and 0.40 M lactate acid.
Identify the business problems that topbike has : Imagine that you, a systems architect leading a consulting team, are asked to perform a systems analysis and design to help TopBike implement a software system.
Two stable isotopes of chlorine : There are two stable isotopes of chlorine: chlorine-35, with a mass of 34.968853 amu; and chlorine-37, with a mass of 36.965903.
Explain impact that each configuration has on security : Explain the impact that each of your configurations has on the security of the entire network. Highlight at least five (5) security features for each device.
Write a proposed mechanism for the reaction of the aptms : Write a proposed mechanism for the reaction of the APTMS with the silanol groups on the glass surface
Explain what this tells us about the favoured direction : Explain what this tells us about the favoured direction of the equilibrium (i.e. does it favour reactants or products)?
Calculate the ph of an aqueous solution containing : Calculate the pH of an aqueous solution containing 0.80M lactic acid and 0.40M lactate acid.
What is the molar mass of a nonpolar molecular compound : The freezing point of pure benzene is 5.50 °C and the freezing point depression constant, Kf, is -5.12 °C/m.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is mflops rating of the system

What is MFLOPS rating of the system

  Discuss the techniques used by malware developers

Why is it critical for an organization to have a DoS attack response plan well before it happens? Please discuss the techniques used by malware developers.

  Questioni briefly describe the concept of queuesii give

questioni briefly describe the concept of queues.ii give two applications of queues in computing.iii describe

  Determine it resources that you employ to automate process

Determine the IT resources that you would employ to automate the process (i.e., electronic documents instead of paper documents).

  Describe the main elements of data breach notification laws

Describe the main elements of data breach notification laws. Discuss the importance of breach notification for credit card information, as it relate to PCI-DSS.

  Perform the operations of projection and expansion

Write a pair of functions in Matlab or Python that numerically performs the operations of projection and expansion.

  What network device or devices can be used to address

In relation to Internet connectivity, both you and the chemists at Plains Research are concerned about security.

  Possible media solutions that will support this download

You are sitting at your desk at work, using your laptop computer. The boss calls an emergency meeting for you and several coworkers, and asks everyone to bring his or her laptop computer.

  Interpreted code execute much more slowly than compiled code

interpreter mode and compiler mode), JavaScript and special case of interpretation of Java programs. Discuss the merits and weaknesses of interpreting, as opposed to compiling, and explain when and why they are used.

  Discuss software scanning algorithm

Use a 74HC 138 1-of-8 decoder and a 74HC I 5 I 8-to- I multiplexer to design a key-board scanner that will scan an 8 x 8 keyboard matrix.

  Describe a project that increase an intranet

Describe a project that increase an Intranet.

  Distinguish between declaration and definition for variables

C and C++ distinguish between declaration and definition for variables. Study this language feature and write a short explanation of why this can be useful.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd