Reference no: EM132297082
Scenario
TIA Software company is global IT company that provides all IT relate services across the globe. TIA is expanding its business and as a consequence, they want to establish a new office at Auckland for their business needs in the Trans-Tasman region.
As the business is growing management has decided to upgrade the peer to peer networks using the internet with their global branches. In the Auckland branch office there are three floors which are connected to the main chassis switch. There is an email and file server which are directly connected to chassis switch in Auckland office, all the computers working fine locally but there is a requirement to connect the local office network to the existing global TIA software branch offices.
As a network administrator, your role is to connect the local Auckland network to the global TIA network using the internet. Assume that your Auckland local network is using 192.168.10.0/24 IP address block. After interconnecting local Auckland network with global branches, TIA Software Company is facing following problems.
a) The server is not responding very often.
b) Some files from share resources are corrupted.
c) Email services, as well as network resources, are running on the server with limited access
Being a network administrator you have to identify the problems and provide necessary solutions/recommendations for various issues by performing the following tasks:
Note: You have to write down the appropriate report after performing each task.
Question -01:
Install and configure the network vulnerability scanning tools (Nmap) in your network and check the vulnerabilities in your network against hackers. Use a network where the vulnerabilities are prominent.
Question-02:
As a network administrator, you have to protect network users and computers. Demonstrate how you would protect your network with the following tasks.
a) Block all the computers from the web access.
b) Create the web access security policy for the network only allowing a single host having IP address (192.168.10.101) and blocking all network hosts to access the internet from port 80 and /or 8080.
c) Apply rules for Windows services and applications.
d) Apply important program with conditions.
e) Block all the remote users to access the internal networks.
Question-03
Analyse the scenario of TIA Software company and create your own network security policies to protect network users and computers from hackers.
Question-04
Evaluate the network vulnerability concerns and weakness in your network (used in Question-01) after generation of vulnerability report of software by using NMAP and provide the counter measures for identified vulnerabilities.
Question-05
Perform the following activities at NMAP using command line tools:
a) Scan open ports.
b) Perform OS fingerprinting.
c) Ping Scan.
d) TCP ports scan.
e) UDP ports scan.
Question-06
Identify and analyse network vulnerabilities by using NESSUS scanner tools.
Your reports should include following analysis:
a) Basic Network scanning.
b) Ntstat port scanning.
c) Vulnerability mapping.
d) Plugins.
e) Policies.
Question-07
a) Analyze how intruder detection system(IDS) can resolve security issues in a computer network. different kinds of scams and frauds on online transaction over network or on Internet. Provide suitable solutions for each of these attacks to protect your system.
b) Install and configure the intruder detection system(IDS), SNORT in your network for ensuring network protection from hackers. Explain different configuration modes of SNORT in details.
Question-08
a) Analyze and explain foot printing in network security.
b) Evaluate hacker's foot print and their presence into network by using network vulnerability tools.
Question-09
a) Explain the main functions of firewall in network security. Analyze different kinds of firewall in brief.
b) Evaluate and explain the selection criteria of a next generation firewall in details.
Question-10
a) Evaluate the common network security problems and their solutions
b) Analyze and explain why network security is crucial for any business organization.