Secure network design

Assignment Help Computer Networking
Reference no: EM133018657

TASK: SECURE NETWORK DESIGN

4027.1.4 : Network Characteristics
The graduate determines network characteristics based on functionality de?ned in the Open Systems Interconnection (OSI) reference model and the TCP/IP protocol stack for designing and building highly secure computer networks.
4027.1.5 : Network Device Security
The graduate securely con?gures network devices to maximize the security of a computer network.
4027.1.6 : Network Segmentation
The graduate recommends network segmentation strategies to isolate network segments based on business requirements and security concerns.
4027.1.7 : Troubleshooting Network Problems
The graduate performs root cause analysis to determine sources of network-related problems and propose solutions.
4027.1.8 : Secure Network Architecture
The graduate designs secure network architectures based on industry best practices and the principles of secure network design.

INTRODUCTION
Secure network design is a critical component for protecting resources, processes, and business continuity. Effective network design involves evaluating existing network problems and potential threats, considering secure architectures based on industry best practices and secure design principles, and proposing secure network design solutions that address the business needs of the organization.

SCENARIO
Company A is a property and casualty insurer underwriting multiple types of insurance. Company A is acquiring Company B, a ?nancial services organization, in order to diversify and increase market share. Company B conducts business in the same geographical area as Company A and delivers business and individual ?nancial planning services. Both companies provide services from their respective of?ces and at the customer's site. Both companies use broadband connectivity.

You are the IT director for Company A and will be the chief information of?cer (CIO) for the merged organization. You are tasked with analyzing, designing, and presenting the proposed IT integration project. Company A has clear IT infrastructure documentation, including a logical diagram, an organizational chart, and a recent security risk analysis. Company B does not have any IT infrastructure documentation, and several security and integration issues are evident. Company B outsources any IT-related needs to a consultant. Leadership for the merged organization has allocated a limited budget of $35,000 for this project and will expect justi?cation for recommended expenditures.

Integration project requirements include following secure network design principles, selecting or repurposing secure network components, assuring secure communication channels, addressing relevant regulatory compliance, minimizing potential network problems and security threats, delivering integration cost savings, and aligning IT to meet the business needs of the post-merger organization. This post-merger organization will re?ect one corporate of?ce and a branch of?ce.

A. Describe the problems Company A has with network security and infrastructure using details from one or more of the "Company A Organizational Chart," "Company A Risk Analysis," and "Company A Visio Diagram" supporting documents.

B. [Intentionally left blank. Not part of the Assessment]

Note: This assessment requires you to submit pictures, graphics, and/or diagrams. Each ?le must be a supporting document no larger than 30 MB in size. Diagrams must be original and may be hand-drawn or drawn using a graphics program. Do not use CAD programs because the ?le will be too large. Your ?nal network drawing should be saved in *.vsd format using Microsoft Visio or a similar software tool.

C. Describe the potential impact of two network security or infrastructure problems of Company B using details from the outputs of Zenmap and OpenVas (see supporting documents below), including rationale for each problem.
1. Explain how correcting each of these problems will improve the functioning of the merged network.

D. Provide a network topology diagram using Microsoft Visio or a similar software tool that represents the proposed merging requirements from the scenario of Company A and Company B, including remediation of all existing infrastructure problems described in part A and part C.
E. Identify which layer of the OSI model and layer of the TCP/IP protocol stack apply to each component in the merged network topology diagram.

F. Justify the retention or deletion of four existing components as suggested in your proposed network topology diagram. Include how each component's retention or deletion and any newly required additions to the network address both security concerns and budgetary restrictions found in the scenario.

G. Explain how two secure network design principles are included in your proposed merged network topology diagram.

H. Describe two secure hardware and/or software components integrated into the proposed network topology and how each component will address the security needs of the merged organization.

I. Explain how the proposed network topology diagram for the merged organization addresses security safeguards based on a regulatory compliance requirement.

J. Explain a security threat and one potential network problem that would become a risk as part of the implementation of the proposed network topology diagram, including why each would become a risk.
1. Explain how the security threat and potential network problem should each be managed or mitigated as part of the implementation of the proposed topology diagram.

K. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

L. Demonstrate professional communication in the content and presentation of your submission.

Attachment:- secure network design.rar

Reference no: EM133018657

Questions Cloud

What is price of the bond : The interest rate for similar bonds is currently 5.97 percent. Assume the face value of the bond is 1000. What is price of the bond
Calculate the value of the forward contract : A company has entered a short position in a forward contract to lock in a price of $87 for one year. Calculate the value of the forward contract
How much did you borrow : Question - Your mortgage payment is $755 per month. It is a 30 year mortgage at 9.0% compounded monthly. How much did you borrow
What is the bad debts expense for the year : A company has an opening debit balance of $500 in Allowance for Doubtful Accounts. What is the Bad Debts Expense for the year
Secure network design : Determine network characteristics based on functionality de?ned in the Open Systems Interconnection (OSI) reference model and the TCP/IP protocol stack
What price must the company charge : If the company uses cost-plus pricing based on full cost, what price must the company charge when the mark-up percentage is 40 per cent
Determine the type of annuity : A new RRSP is set up with monthly contributions of $300 for five years earning 9% compounded semi-annually. Determine the type of annuity
Determine the merchandise inventory : In order to record the adjusting entry needed under the lower-of-cost-or-market ?rule, determine the Merchandise Inventory
Calculate the cost per equivalent unit for labor : The balance in beginning Work in Process at Lawn Rubber Company for direct labor was $150,000. Calculate the cost per equivalent unit for labor

Reviews

len3018657

10/26/2021 2:06:12 AM

Please let me know as soon as you can. If you can help I need it in this week. Please do it carefully, follow each and every instruction and Marking Criteria and References Very STRICTLY. Follow word limit if any is given.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd