Improving the security of the current network

Assignment Help Computer Network Security
Reference no: EM13191034

Based on the following background information and project requirements, complete a project making use of OPNET:

Background: AusCloud Brisbane is an IT company located in Brisbane. The company has offices in Melbourne and Sydney. They are now planning to extend the businesses to Singapore and Hong Kong. The company has experienced several security attacks in the
past, for example, some business data labelled as "sensitive" and "confidential" has been found in a report published on the Internet, and a number of malicious intrusions to the network of the company have been detected. The company has just made a budget to support a plan for improving the security of the network and information system. The plan includes improving the security of the current network and establishing a secure environment for data exchange between the headquarters (Brisbane) and other offices.

Project Description: The objectives of the project include: (1) to study how the database and web services can be protected against unauthorized use while maintaining access for authorized users by using firewall and VPN techniques; and (2) to study how secure data exchange over the Internet can be achieved by using encryption.

For the project, you are required, based on the background information given above, to implement a simulator using the OPNET IT Guru. On completion of the project you are expected to submit a report. (The requirements for the simulator and the report will be given below).

Requirements for the simulator:
(a). The simulator will have at least two servers: database server and web server.
(b). The offices in Melbourne and Sydney can access all the data, web services, and other applications.
(c). The office in Singapore cannot access the database.
(d). The office in Hong Kong cannot access the web services.
(e). The information exchange between the headquarters and authorized offices should be protected by encryption (hints will be given below on simulating the effect of encryption by using OPNET).

(f). The simulator should include the following scenarios for comparison purpose:

- Scenario 1: No firewall, VPN, or encryption is employed, that is, a network without any protection.

- Scenario 2: Only firewall is implemented.

- Scenario 3: Employing both firewall(s) and VPN(s) to meet the requirements (a) - (d) given above.

- Scenario 4: Implementing firewall(s), VPN(s), and encryption to meet the requirements (a)-(e). 

Reference no: EM13191034

Questions Cloud

How much money was put into each type of investment : To pay for their child's college education, the parents invested $10,000, part in a certificate of deposit paying 8.5% annual interest, the rate in a mutual fund paying 7% annual interest. The annual income from the mutual fund. How much money was..
Define chemical is measured under the same conditions : Another solution of the same chemical is measured under the same conditions and has an absorbance of 0.81. What is its concentration?
Find the lcm of each set of polynomials : Find the LCM of each set of polynomials
State how many years would it take : how many years would it take for a 10-gram sample of U-238 to decrease to 2.5 grams?
Improving the security of the current network : The plan includes improving the security of the current network and establishing a secure environment for data exchange between the headquarters (Brisbane) and other offices.
How many ways can the manager choose which routines : A dance team knows 14 routines of which 7 are tap, 5 are ballet, and 2 are modern. The program can consist of any four routines. In how many ways can the manager choose which routines to present if there are no restrictions?
How many rabbits does the farmer have : How many hens and how many rabbits does the farmer have? I know the answer is 20 rabbits and 30 hens. I need the algebraic formula. Can you help?
Depict a potential energy diagram for the reaction : Please draw a detailed, arrow-pushing mechanism for the addition of HBr to trans-2-butene. 4. Please draw a potential energy diagram for this reaction
What is the subgame perfect equilibrium of the game : Now suppose that there is a second ?rm with cost function c1 (q) above. Whichever cost function ?rm 1 chooses, the second ?rm will observe this choice and then have the option of entering the market or not. If he does not enter, ?rm 1 remains a mo..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Question on security infrastructure and protocols

Question on Security infrastructure and protocols

  Strategies and recommendations to the cio

Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization and draft a one page Executive Summary that details your strategies and recommendations to t..

  Dealing with computer security

Computer Security is very important for organizations and if not impliedproperly it may have a very big impact on its overall working system.

  Explain security strategy for a corporate wan

Prescribe a security strategy for a corporate WAN. Be sure to include methods to combat both technical and nontechnical attacks. C

  What is the resulting cipher

What is the resulting cipher - Given your answer, is security of the a!ne cipher with a given modulus m increased if one encryption is followed by a second encryption with a different key?

  Explain hardware and software used to support personal

Write 700-1050 word paper explaining hardware and software used to support personal, workgroup, and enterprise computing within current organization, an organization.

  Type of security problems computer services encounter

Students would enter the room, pick up their jobs, and leave. What kinds of security problems might computer services encounter with a system such as this?

  Use of keys to communicate when alan sends private message

Alan and Beatrice are both users of (PKI)also called public key infrastructure. Describe how they use their keys to communicate when Alan sends a private message to Beatrice

  Why are scada systems particularly vulnerable to cyber treat

Why are SCADA systems particularly vulnerable to cyber treats? C. Using the X.805 security framework as a reference, discuss the SCADA security requirements for an electric, water or oil refinery enterprise.

  Scenario-based project

Authentic Assessment:   The scenario will be a realistic, enterprise-level situation encompassing diverse networking components, including Microsoft Windows, Linux, VoIP, security, wireless, and Cisco technologies.

  How rtsp vary from http in keeping client state information

How does RTSP differ from HTTP (a) in maintaining client state information; (b) in terms of in-band, out-of-band traffic?

  Technical versus soft skills

Suppose that there is some consensus with basic premise that most skills can be learnt, which would you expect to be the more productive task,

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd