LD7007 Network Security Assignment

Assignment Help Computer Networking
Reference no: EM132437092

LD7007 - Network Security - Northumbria University

Learning Outcomes

The following learning outcomes will be assessed by this assignment:

• Develop an in-depth understanding of fundamental concepts and challenges in data and network security
• Demonstrate concepts related to basic cryptography
• Critically evaluate threats to data and network security; design and implement security solutions using networking IOS

Introduction

You are an independent consultant, part of the consultancy firm responsible for designing and implementing secure VoIP systems. Your main task is to implement a dedicated open source VoIP system with direct links to the mailbox of users using Asterisk IP-PBX in a series of Block Tasks. You should be able to design and implement secure VoIP calls in a local area network with appropriate dial plans in a fully virtualised environment. Your VoIP system should allow seamless integration with a unified communication (UC) system that allow unified email and desktop services.

Assignment Tasks:

Your work must be presented in the form of a Project Report and be no longer than 3000words (excl. references, figures, tables and appendices) plus a facing page that includes the executive summary. This should be typed on A4 paper and use a font size Arial 11 single spacing. For completeness, you may if you wish include additional material in an appendix but this will not contribute to the marks.

Portfolio Task(s):

Block A: Architecture and Communication

1. Configure a Linux server with Asterisk IP-PBX fully installed and configured with an appropriate logical addressing scheme. Your Linux server must be an authoritative DNS server for a domain of your choice.

2. Create a dial plan to serve up to 150 different extensions with at least two (2) soft phones attached and configured into your environment.

3. Design and implement a Postfix MTA in such a way that all voicemail from extensions it is forwarded to users' mailboxes.

4. Configuring appropriate IAX trunks to demonstrate connectivity between two different Asterisk servers.

Block B: Secure Operations and Service Delivery

5. Fully demonstrate at least three (3) attacks against your VoIP system with evidence on their sophistication and impact. At least one of these attacks should demonstrate pivoting against users' mailboxes.

6. Design and implement a comprehensive security policy for your VoIP system and clearly articulate adequate security controls against the attacks demonstrated in the previous step. Evidence must be provided on how the controls implemented can mitigate the attacks demonstrated.

7. Implement a comprehensive Network-based Intrusion Detection and Prevention system (NIDS) and test its efficiency in your VoIP deployment.

Block C: Research & Development

8. Deploy at least two (2) strong authentication mechanisms for your user agents (UA). You should be able to discuss critically the efficacy of those mechanisms into your VoIP environment and the cryptographic overhead produced as part of their deployment.

9. Encrypt VoIP traffic using standardised security protocols for the media part of the call. Critically discuss strengths and limitations of the protocol(s) selected with evidence on their efficacy in your environment.

10. With references to the public domain, critically discuss how cyber resilience can be achieved in unified communications. Identify the levels of UC reliability and redundancy companies must take to assure critical mission processes from the integration and adaptation of UC in traditional IT infrastructures.

Report Structure:
1. Executive Summary
2. Block A: Architecture and Communication
2.1 Asterisk design and Implementation
2.2 Dial Plan Implementation and Testing
2.3 Postfix MTA implementation and Testing
2.4 Configuration and demonstration of IAX trunk(s)
3. Block B: Secure Operations and Service Delivery
3.1 Attack demonstration and impact
3.2 Holistic security policy and controls
3.3 NIDS implementation and testing
4. Research & Development
4.1 Authentication mechanisms and Cryptographic overhead
4.2 VoIP media encryption: Implementation & Testing
4.3 Overview of Cyber resilience in UC: State-of-the-art
5. Conclusion and Future Work

Attachment:- Network Security.rar

Reference no: EM132437092

Questions Cloud

Preferable to base the assessment of learning on retention : Is it preferable to base the assessment of learning on retention or transfer test rather than on only performance during skill acquisition? Why or why not?
Describe the behavioral challenges in achieving efficiency : Describe the behavioral challenges in achieving efficiency. Discuss the three forms of market efficiency. What are the implications to corporate finance?
Determine effectiveness of workshop via evaluation method : Create a logical and comprehensive design document that governs the conduct of the workshop.Determine the effectiveness of the workshop via an evaluation method
Discuss dietary solutions to increase the intake : Discuss dietary solutions to increase the intake and absorption of iron. How can a vegetarian avoid this deficiency?
LD7007 Network Security Assignment : LD7007 Network Security Assignment Help and Solution, Northumbria University - Assessment Writing Service - Develop an in-depth understanding of fundamental
Data collection tools : Statistically speaking, does your data collection method have high or low participation rate? Does your survey instruments violate HIPAA or healthcare laws?
Discuss examples of relationships to obesity : What are the cultural, economic, and social factors that may result in obesity? Discuss examples of their relationships to obesity.
Healthful diet and the role of each in daily meal plans : Describe the four characteristics of a healthful diet and the role of each in daily meal plans.
Describe two types of fat patterning of the body : Fluids serve many functions for the body. Provide the four critical functions of fluids.

Reviews

Write a Review

Computer Networking Questions & Answers

  Research the vpn solution of two it solutions vendors

There are both commercial and open source types of Virtual Private Networks (VPNs) available. Research the VPN solution of two IT solutions vendors.

  Will the packet be forwarded into its base network

If a router is attached to a network with a base IP address of 198.10.0.0/20 and receives a packet addressed to 198.10.10.144.

  Exchanged between the client and the server

This connection is established before any data is exchanged between the client and the server.

  Proposal for the major project assignment

MN601 - Network Project Management - demonstrate project leadership skills; identify and assess risk in designing, executing a major project

  How are bootp and dhcp related

Define load balancing in terms of data traffic flow in a computer network.

  Provide for efficiency in the processing of data traffic

provide for efficiency in the processing of data traffic. This command line interface offers an administrator's interface for configuring logical segmentation.

  What command did you use to test the acl rule

What command did you use to test the ACL rule that blocks R1's fa0/0 interface from reaching R3's fa0/0 interface?

  Evaluate the technology and connectivity

You are to write a memo covering 15 points on which you will evaluate the technology, connectivity, and functioning of the company's computer networks

  Explain why it is recommended to secure windows

You are the Information Security Officer at a medium-sized company (1,500 employees). The CIO has asked you to explain why you recommend it is so important to secure your Windows.

  Detail explanation of the designing the network

The report should have a detail explanation of the planning and designing of the network. It is recommended that bullet points are only included

  Build the network and verify connectivity

Network device, such as a Cisco router, assigns a public address to host devices inside a private network. The main reason to use NATisto reduce the number

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd