Suggest security services and mechanisms

Assignment Help Computer Network Security
Reference no: EM132344818

Objectives:

• Understanding Security Architecture of Wirless networks .
• Configuring TMG and implement NIS and IDS.

Tasks :
• Task 1: the Student need to submit a work proposal for this assignment.
• Task 2: the Student need to prepare a report based on three published research papers discussing wireless Security Architecture. The report should also base on reflective writing with proper referencing.
• Task 3: Student need to implement some security mechanisms in the TMG for some given requirements.

Task 1:

Submit a work proposal for this assignment which must include:
• Understanding of deliverables - a detail description of deliverables
• General overview of proposed plan - initial understanding of solution to all the tasks
• Timeline for assignment works
• Resources identified

Task 2:

Wireless Internet access technology is being increasingly deployed in both office and public environments, as well as by the Internet users at home. The use of a wireless network enables enterprises to avoid the costly process of introducing cables into buildings or as a connection between different equipment locations. The basis of wireless systems are radio waves, an implementation that takes place at the physical level of network structure. The wireless network can be found in different types, for example: wireless local area network (WLAN), Wireless Metropolitan Area Networks (WMAN), Wireless Personal Area Network (WPAN), wireless sensors networks (WSN).

Referring to at least three research papers, Student is required to study a wireless network architecture and recommend a security architecture by answering the following tasks:

Task 2.A: summarize and describe any type of wireless network.

(Hint: you should include definition, uses, and structure of your selected wireless network)

Task 2.B: Analyze and describe different security concerns (threats, vulnerabilities, attacks) of your selected wireless network.

(Hint: identify and describe the threats, vulnerabilities and attacks on your selected wireless network, describe the scenario of each attack and its effect on wireless network performance. Also clarify the attacks by diagrams)

Task 2.C: Suggest security services and mechanisms to countermeasure the attacks. Provide a detailed description for each service and mechanism. Then, provide a clear diagram of your security architecture of wireless network.

(Hint: identify the security service that could detect/prevent the attack, then describe mechanisms to implement the identified services.)

Task 3:
You are the network administrator for ABC Company. The company has implemented Microsoft Forefront TMG as the firewall. The company works 5 days a week (Sunday to Thursday) from 7am to 5pm. The company has the following requirements:

1. The Company management wants to implement Network Inspection System (NIS). The goal is to enable NIS to all networks except for servers located in the range 192.168.0.10 to 192.168.0.28.. Those servers are considered administration servers, and do not require NIS traffic evaluation. TMG should check for updates every 15 minutes to obtain new signatures. The company wants to follow the default Microsoft policy when network traffic matches one of the active signatures. In case of anomalies protocols the traffic should be allowed to avoid blocking legitimate traffic.

2. The TMG intrusion detection should be able to detect Ping of death, UDP bomb, IP half scan and port scan attacks. DNS length overflow should be also detected. TMG should deny packets with the Time stamp and Loose Source Route during the IP filtering. The Company management wants to block packets containing IP fragments, but wants to give the default settings for the SIP parameters.

You are required to complete the following configuration

a. Configure network Inspection System (NIS) as following :
• Configure an exception named ‘admin server'' for the NIS
• Configure the excepted IP addresses range to be 192.168.0.10 to 192.168.0.28.
• Configure the signature update to be every 15 minutes, and trigger alert if no update installed every 5 days.
• Make the response to anomalies protocols according to the company requirements.

b. Configure an intrusion detection System (IDS):
• Enable detection for Ping of death, UDP bomb, IP half scan attacks and port scan attacks.
• Enable detection for all types of DNS attack.
• Configure Time stamp and Loose Source Route during the IP options filtering.
• Block packets containing IP fragments.
• Configured SIP parameter according to the company's requirements.

Attachment:- Network Security (COMP 30019).rar

Verified Expert

In this assignment, we have write reports on mobility in the network communication. Here, we have discussed various mobility operation of mobile network communications. Mobility of network communication in industry which helps to perform business operation smoothly.

Reference no: EM132344818

Questions Cloud

Calculate the break-even point in sales units per month : Assume that the same amount is spent each month on fixed overheads. Budgeted sales for next month are 2,200 units.
What is the amount of depreciation expense that should be : A company purchased a weaving machine for $332,970. The machine has a useful life of 8 years and a residual value of $18,500.
Clear vision of the new society-vague vision of new society : A clear vision of the new society (revolutionary dissidents), a vague vision of the new society (nihilist dissidents) national aspirations (nationalist dissiden
Determine the equity income to be recognized : On July 1, 2016, Killearn Company acquired 148,000 of the outstanding shares of Shaun Company for $21 per share. Determine the equity income to be recognized.
Suggest security services and mechanisms : Analyze and describe different security concerns of your selected wireless network you need to implement some security mechanisms in the TMG.
Describe the essential aspect for secure communications : During this time when the Internet provides essential communication between literally billions of people and is used as a tool for commerce, social interaction.
Interactionist perspectives of sociology : How would the functionalist, conflict, and interactionist perspectives of sociology each interpret your decision to earn a degree?
Connection between diversity and inclusion be important : How might the connection between diversity and inclusion be important in a working environment?
Types of statements of work in regard to compatibility : Imagine that you are working in a federal government office as a government employee. Evaluate the types of statements of work in regard to compatibility

Reviews

len2344818

7/24/2019 3:18:11 AM

• Task 2: Students are required to write a report, not more than 3,000 words, the report should include: • Understanding of wirless architecture. • Analysis and evaluation of Security concerns of wireless network. • Recommending of security services/mechanisms for wireless security architecture. • Task 3: TMG configuration • Configuration of NIS to satisfy the given requirements • Configuration of IDS to satisfy the given requirements Evaluation Criteria: • Zero marks will be awarded if student is absent for Viva. • The contribution of the student will also be evaluated during the Viva.

len2344818

7/24/2019 3:17:56 AM

Evaluation Criteria: • Zero marks will be awarded if student is absent for Viva. • Student will be given 10 minutes for Viva. • The contribution of the student will also be evaluated during the Viva. • The evaluation will be done on the strength of analysis presented in the assignment: • Task 1: Assignment work proposal submission: 10 Marks Submit a work proposal for this assignment on or before, which must include: ? Understanding of deliverables – a detail description of deliverables ? General overview of proposed plan - initial understanding of solution to all the tasks ? Resources identified ? Work proposal should be submitted in the form of word document in Moodle on or before 24th April, 2019. • Assignment report submission 90 Marks Submit the assignment report on or before 29th May, 2019, which must include:

len2344818

7/24/2019 3:17:35 AM

Instructions to Student: • This is an individual assignment. • Present the relevant citation / references at the end of document • Marks will be awarded for the content written in your own words • Duplicate documents submitted will be treated as per MEC plagiarism policy. • All the tasks will be evaluated through viva. Students absent for viva will be awarded zero marks for the assignment. • You can make use of the library resources to find information. Internet resources can also be used to search information.

Write a Review

Computer Network Security Questions & Answers

  Identify a successful three-way handshake?

Identify a successful three-way handshake?

  It infrastructure management assessment item 2enterprise

assessment item 2 ltbrgtenterprise architect3939s bog amp swot analysis ii ltbrgtvalue 35 ltbrgtdue date 04-oct-2014

  Define SIMD and MIMD

Define SIMD and MIMD. What is Ethernet? What does the acronym LAN stand for? Compare and contrast these languages in terms of their history and their purpose.

  Write a succinct policy statement specifying employee

Summarize the primary vulnerabilities and potential threats that exist for GCI related to the practice of storing sensitive data on laptops. In your opinion, which of the risks GCI faces are most significant to the company?

  Compares and contrasts intrusion detection systems

Research and develop a thread that compares and contrasts Intrusion Detection Systems (IDS) and Intrusion Protection Systems (IPS)

  Explain the new threat of ransomware to the organization

The security manager of your organization has approached you to explain the new threat of ransomware to the organization.

  Explain two-bit system noninterference-secure

The initial state is not output (in contrast to the example). Is this version of two-bit system noninterference-secure with respect to Lucy? Why or why not?

  Describe the data synchronization

Describe the Data synchronization in one page.

  Describe how hacker might go about cracking message

Describe how a hacker might go about cracking a message encrypted with each type of algorithm. Suggest a specific application for each type of algorithm where the advantages clearly outweigh the disadvantages.

  How network security be customized for risks management

If not, how can one of these network security best practices be customized to requrements or risks present in the organization? How are risks to particular organization discovered or established?

  Analyse a given sample of malware

Cyber Crime Malware Assignment - Malware Analysis & Reverse Engineering. The aim of this assessment is to analyse a given sample of malware

  Program to strip all occurrences

Write a program to strip all occurrences of these characters: '(', ')' and '-'. Also, strip all the leading and trailing whitespace characters. Display the stripped phone number

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd