Reference no: EM133715569 , Length: word count:2500
Computer Network Security
Question 1
Discuss the security implications of IPv6.
Include a discussion on the built-in security features of IPv6 compared to IPv4, and the challenges involved in transitioning to IPv6.
Question 2
What are Distributed Denial of Service (DDoS) attacks, and how can they be mitigated?
Describe the mechanisms of a DDoS attack and discuss various strategies and technologies used to defend against them.
Explain the significance of network segmentation in security.
Discuss how segmenting a network can limit the spread of an attack within an enterprise, including the use of VLANs and subnetting.
Detail the challenges and security considerations for Wireless Networks.
Include discussions on encryption methods like WPA2 and WPA3, potential vulnerabilities like Evil Twin attacks, and best practices for securing a wireless network.
Question 3
Analyse the role of firewalls in network security.
Explain the different types of firewalls (e.g., packet filtering, stateful inspection, application layer) and how they protect a network from unauthorised access.
Question 4
GlobalTech University, an international educational institution known for its focus on technology and innovation, is expanding its operations by establishing two new campuses within a city. The campuses are strategically located 1 km apart to serve different academic and administrative functions.
Campus 1: Spanning 1200 meters in length and 500 meters in width, this campus hosts three academic departments (Computer Science, Robotics, and Design), each housed in separate blocks, along with a central library and a student center.
Campus 2: Measures 600 meters in length and 1100 meters in width, containing two blocks dedicated to administration and faculty offices, plus a library and a conference center.
Network Requirements:
Both campuses need to be interconnected using high- speed, secure networking solutions.
Comprehensive indoor and outdoor wireless coverage is required on both campuses.
The network should support high volumes of data traffic and provide robust security to protect student and faculty data.
Innovative networking technologies that support IoT devices and smart campus initiatives are a priority.
You need to develop the following things:
Describe why the specific architecture is suitable for an educational environment with high data traffic and diverse connectivity needs. (3 Marks)
You are required to draw the campuses floor mapping which includes buildings, pin on it where routers, switches, servers, and links are located.
Hardware and software analysis
You are required to search for devices, links and provide a list of brands, models, technical specification, and images for each.
List of Software that may be used.
Relate these devices to the OSI layers, which device belongs to which layer. Highlight
each device functions within these layers.
The desired type of link(s) between campuses.
Question 5
GlobalTech University's IT department has recently updated the network infrastructure to include VPN access for remote users and to enhance security through more granular access controls using ACLs. However, after these updates, remote faculty members have reported that while they can connect to the university's VPN, they are unable to access certain internal resources that are critical for their work, such as the faculty shared drive and internal research databases.
Describe a systematic approach to troubleshoot the ACL configurations on GlobalTech University's network that could be blocking VPN users from accessing internal resources. Include specific ACL entries that should be checked or modified.
Examine potential misconfigurations in the VPN settings that might prevent access to specific network segments. Discuss the VPN protocols and security settings that should be verified and possibly adjusted.
Propose a solution that would allow remote faculty members to access the necessary resources without compromising the overall network security. Outline any changes to the ACL and VPN configurations that would be necessary.