Secure network design

Assignment Help Computer Networking
Reference no: EM133018657

TASK: SECURE NETWORK DESIGN

4027.1.4 : Network Characteristics
The graduate determines network characteristics based on functionality de?ned in the Open Systems Interconnection (OSI) reference model and the TCP/IP protocol stack for designing and building highly secure computer networks.
4027.1.5 : Network Device Security
The graduate securely con?gures network devices to maximize the security of a computer network.
4027.1.6 : Network Segmentation
The graduate recommends network segmentation strategies to isolate network segments based on business requirements and security concerns.
4027.1.7 : Troubleshooting Network Problems
The graduate performs root cause analysis to determine sources of network-related problems and propose solutions.
4027.1.8 : Secure Network Architecture
The graduate designs secure network architectures based on industry best practices and the principles of secure network design.

INTRODUCTION
Secure network design is a critical component for protecting resources, processes, and business continuity. Effective network design involves evaluating existing network problems and potential threats, considering secure architectures based on industry best practices and secure design principles, and proposing secure network design solutions that address the business needs of the organization.

SCENARIO
Company A is a property and casualty insurer underwriting multiple types of insurance. Company A is acquiring Company B, a ?nancial services organization, in order to diversify and increase market share. Company B conducts business in the same geographical area as Company A and delivers business and individual ?nancial planning services. Both companies provide services from their respective of?ces and at the customer's site. Both companies use broadband connectivity.

You are the IT director for Company A and will be the chief information of?cer (CIO) for the merged organization. You are tasked with analyzing, designing, and presenting the proposed IT integration project. Company A has clear IT infrastructure documentation, including a logical diagram, an organizational chart, and a recent security risk analysis. Company B does not have any IT infrastructure documentation, and several security and integration issues are evident. Company B outsources any IT-related needs to a consultant. Leadership for the merged organization has allocated a limited budget of $35,000 for this project and will expect justi?cation for recommended expenditures.

Integration project requirements include following secure network design principles, selecting or repurposing secure network components, assuring secure communication channels, addressing relevant regulatory compliance, minimizing potential network problems and security threats, delivering integration cost savings, and aligning IT to meet the business needs of the post-merger organization. This post-merger organization will re?ect one corporate of?ce and a branch of?ce.

A. Describe the problems Company A has with network security and infrastructure using details from one or more of the "Company A Organizational Chart," "Company A Risk Analysis," and "Company A Visio Diagram" supporting documents.

B. [Intentionally left blank. Not part of the Assessment]

Note: This assessment requires you to submit pictures, graphics, and/or diagrams. Each ?le must be a supporting document no larger than 30 MB in size. Diagrams must be original and may be hand-drawn or drawn using a graphics program. Do not use CAD programs because the ?le will be too large. Your ?nal network drawing should be saved in *.vsd format using Microsoft Visio or a similar software tool.

C. Describe the potential impact of two network security or infrastructure problems of Company B using details from the outputs of Zenmap and OpenVas (see supporting documents below), including rationale for each problem.
1. Explain how correcting each of these problems will improve the functioning of the merged network.

D. Provide a network topology diagram using Microsoft Visio or a similar software tool that represents the proposed merging requirements from the scenario of Company A and Company B, including remediation of all existing infrastructure problems described in part A and part C.
E. Identify which layer of the OSI model and layer of the TCP/IP protocol stack apply to each component in the merged network topology diagram.

F. Justify the retention or deletion of four existing components as suggested in your proposed network topology diagram. Include how each component's retention or deletion and any newly required additions to the network address both security concerns and budgetary restrictions found in the scenario.

G. Explain how two secure network design principles are included in your proposed merged network topology diagram.

H. Describe two secure hardware and/or software components integrated into the proposed network topology and how each component will address the security needs of the merged organization.

I. Explain how the proposed network topology diagram for the merged organization addresses security safeguards based on a regulatory compliance requirement.

J. Explain a security threat and one potential network problem that would become a risk as part of the implementation of the proposed network topology diagram, including why each would become a risk.
1. Explain how the security threat and potential network problem should each be managed or mitigated as part of the implementation of the proposed topology diagram.

K. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

L. Demonstrate professional communication in the content and presentation of your submission.

Attachment:- secure network design.rar

Reference no: EM133018657

Questions Cloud

What is price of the bond : The interest rate for similar bonds is currently 5.97 percent. Assume the face value of the bond is 1000. What is price of the bond
Calculate the value of the forward contract : A company has entered a short position in a forward contract to lock in a price of $87 for one year. Calculate the value of the forward contract
How much did you borrow : Question - Your mortgage payment is $755 per month. It is a 30 year mortgage at 9.0% compounded monthly. How much did you borrow
What is the bad debts expense for the year : A company has an opening debit balance of $500 in Allowance for Doubtful Accounts. What is the Bad Debts Expense for the year
Secure network design : Determine network characteristics based on functionality de?ned in the Open Systems Interconnection (OSI) reference model and the TCP/IP protocol stack
What price must the company charge : If the company uses cost-plus pricing based on full cost, what price must the company charge when the mark-up percentage is 40 per cent
Determine the type of annuity : A new RRSP is set up with monthly contributions of $300 for five years earning 9% compounded semi-annually. Determine the type of annuity
Determine the merchandise inventory : In order to record the adjusting entry needed under the lower-of-cost-or-market ?rule, determine the Merchandise Inventory
Calculate the cost per equivalent unit for labor : The balance in beginning Work in Process at Lawn Rubber Company for direct labor was $150,000. Calculate the cost per equivalent unit for labor

Reviews

len3018657

10/26/2021 2:06:12 AM

Please let me know as soon as you can. If you can help I need it in this week. Please do it carefully, follow each and every instruction and Marking Criteria and References Very STRICTLY. Follow word limit if any is given.

Write a Review

Computer Networking Questions & Answers

  MN503 Overview of Internetworking Assignment

MN503 Overview of Internetworking Assignment Help and Solution, Melbourne Institute of Technology - Assessment Writing Service

  Implement the network using packet tracer

Implement the network using Packet Tracer - Calculate the EIGRP metric from R1 to network where PC2 is located. Explain and show how you derive at the values used in the calculation. Show detailed steps in arriving your answer.

  Possible ieee amendments could be used for new system

What possible IEEE 802.11 amendments could be used for the new system? What are the pros and cons of each amendment? Choose an amendment to implement and explain your choice.

  Describe how signal and signal management calls are used

Describe how signal and signal management calls are used in creating a process and terminating it after certain interval. Give a simple example to illustrate this routine.

  Which of the flow graphs are primes

The following sets of edges form flow graphs on five nodes, labeled from 1 to 5. Draw the flowgraphs using the conventions of Figure.

  Illustrate the difference between the customer relationship

what is the difference between customer relationship management supplier relationship management and employee

  Research on project management practice

MN601 - Network Project Management - Individual case study assignment -

  Discuss how the mcqm system connects all processes

Start the paper with a brief overview and description of FDA and ISO regulations that exist to protect consumers. Briefly discuss how the MCQM system connects all processes critical to compliance.

  How the polling mechanism will work to distribute

Explain what does it mean by "maximum weighting matching on U"? Show with an example. Construct a hypothetical matrix U and perform the Hungarian algorithm steps to show the process. You can take 4 by 4 matrix for example with entries f your own c..

  ITECH2301 Network Architecture and Design Assignment

ITECH2301 Network Architecture and Design Assignment help and Solution, Federation University - Assessment Writing Service

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Data exchange between dummy interface and ppp program

PPP Data Path Completion using Dummy Network Interface Term Project. Complete data path through PPP: Add/modify transmission/reception functions in dummy network interface. Implement data exchange between dummy interface and PPP program and Create a ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd