Improving the security of the current network

Assignment Help Computer Network Security
Reference no: EM13191034

Based on the following background information and project requirements, complete a project making use of OPNET:

Background: AusCloud Brisbane is an IT company located in Brisbane. The company has offices in Melbourne and Sydney. They are now planning to extend the businesses to Singapore and Hong Kong. The company has experienced several security attacks in the
past, for example, some business data labelled as "sensitive" and "confidential" has been found in a report published on the Internet, and a number of malicious intrusions to the network of the company have been detected. The company has just made a budget to support a plan for improving the security of the network and information system. The plan includes improving the security of the current network and establishing a secure environment for data exchange between the headquarters (Brisbane) and other offices.

Project Description: The objectives of the project include: (1) to study how the database and web services can be protected against unauthorized use while maintaining access for authorized users by using firewall and VPN techniques; and (2) to study how secure data exchange over the Internet can be achieved by using encryption.

For the project, you are required, based on the background information given above, to implement a simulator using the OPNET IT Guru. On completion of the project you are expected to submit a report. (The requirements for the simulator and the report will be given below).

Requirements for the simulator:
(a). The simulator will have at least two servers: database server and web server.
(b). The offices in Melbourne and Sydney can access all the data, web services, and other applications.
(c). The office in Singapore cannot access the database.
(d). The office in Hong Kong cannot access the web services.
(e). The information exchange between the headquarters and authorized offices should be protected by encryption (hints will be given below on simulating the effect of encryption by using OPNET).

(f). The simulator should include the following scenarios for comparison purpose:

- Scenario 1: No firewall, VPN, or encryption is employed, that is, a network without any protection.

- Scenario 2: Only firewall is implemented.

- Scenario 3: Employing both firewall(s) and VPN(s) to meet the requirements (a) - (d) given above.

- Scenario 4: Implementing firewall(s), VPN(s), and encryption to meet the requirements (a)-(e). 

Reference no: EM13191034

Questions Cloud

How much money was put into each type of investment : To pay for their child's college education, the parents invested $10,000, part in a certificate of deposit paying 8.5% annual interest, the rate in a mutual fund paying 7% annual interest. The annual income from the mutual fund. How much money was..
Define chemical is measured under the same conditions : Another solution of the same chemical is measured under the same conditions and has an absorbance of 0.81. What is its concentration?
Find the lcm of each set of polynomials : Find the LCM of each set of polynomials
State how many years would it take : how many years would it take for a 10-gram sample of U-238 to decrease to 2.5 grams?
Improving the security of the current network : The plan includes improving the security of the current network and establishing a secure environment for data exchange between the headquarters (Brisbane) and other offices.
How many ways can the manager choose which routines : A dance team knows 14 routines of which 7 are tap, 5 are ballet, and 2 are modern. The program can consist of any four routines. In how many ways can the manager choose which routines to present if there are no restrictions?
How many rabbits does the farmer have : How many hens and how many rabbits does the farmer have? I know the answer is 20 rabbits and 30 hens. I need the algebraic formula. Can you help?
Depict a potential energy diagram for the reaction : Please draw a detailed, arrow-pushing mechanism for the addition of HBr to trans-2-butene. 4. Please draw a potential energy diagram for this reaction
What is the subgame perfect equilibrium of the game : Now suppose that there is a second ?rm with cost function c1 (q) above. Whichever cost function ?rm 1 chooses, the second ?rm will observe this choice and then have the option of entering the market or not. If he does not enter, ?rm 1 remains a mo..

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd