Unit 17 Network Security Assignment

Assignment Help Other Subject
Reference no: EM132427584

Unit 17 Network Security - Higher National Diploma in Computing

Learning Outcomes

LO1. Examine Network Security principles, protocols and standards.
LO2. Design a secure network for a corporate environment.
LO3. Configure Network Security measures for the corporate environment.
LO4. Undertake the testing of a network using a Test Plan.

Assignment Brief and Guidance:

EMC Finance is a well-known Finance company established in Kandy with more than 5000 customers and 8 branches island wide. Director board of EMC Finance hasdecided to restructure and enhance the computer network at Head office with up to date security measures to face the emerging security threats worldwide. You have been appointed as the Network Security Engineer for EMC Finance and it is now your responsibility to plan and implement a secure network that fulfils the company's expectations.

Main requirements are as follows but NOT limited to;

1. Head office LAN need to be a Gigabit Ethernet and all Network devices need to be compatible with each other for maximum performance.

2. All the network devices such as Routers, Switches, Firewalls etc. should be manageable and only secure logins need be allowed on all devices.

3. AAA should use for Network Device login Authentication where possible and Syslog Server should use for record logging events, while having NTP server for time.

4. All publicly available resources including public web servers need to be separated from the main network and should move to a separate subnet. Only Secure Web Access should be enabled for web servers.

5. Design aSAN (Storage Area Network) implementation for saving Data for the Internal Network.

6. Network design should follow the Hierarchical Network Design Model.

7. End user authentication and managing of security polices need to centralized.

8. Internet usage management and URL filtering need to be enforced.

9. Communication between the Head office and the Branch offices need to be highly secured.

10. Quality of service (QoS) should be implemented where possible.

EMC Finance Head office consists of the following departments;

Department

Number of Users

Customer Care

25

Sales and Marketing

35

Finance

60

Legal

5

HR

20

IT Team

25

Internal Server Room

8 Servers + SAN

Servers for Public users

4

Task 1

Examine Network Security principles, protocols and standards.
1.1. Discuss the importance of Network Security in present socio-economic world.
1.2. Describe devices and their characteristics that are used to enhance the security of a Network.
1.3. DifferentiateSymmetricand Asymmetric Encryption with examples.
1.4. Explain the purpose of a Digital Certificatein secure web access.

Task 2
Design a secure network for a corporate environment.
2.1. Provide a suitable Virtual LAN design for internal network and IP Design for the network. (Public servers should be separated from the Internal Network)
2.2. Explain the Technologies /concepts that are required to accomplish the objectives of the above scenario.
2.3. Determine which security devices and software are needed to design this network and justify your selections.
2.4. Provide a suitable detailed Diagram of above Network Design including WAN connections.

Task 3
Configure Network Security measures for the corporate environment.
3.1. Configure all the network devices to achieve the highest level of security for the network with the requirements given by the scenario. (Provide Network Security configuration scripts/files/screenshots with comments.)
3.2. Explain how QoS can be integrated in to Network security configurations.

Task 4
Undertake the testing of a network using a Test Plan
4.1 Develop test cases and test the above LAN and WAN designs to verify whether the design objectives are met.
(Provide Network Security configuration scripts/files/screenshots with comments.)
4.2 Suggest how you can improve the performance and security of this network in the Future.

Attachment:- Network Security.rar

Reference no: EM132427584

Questions Cloud

Four different combination of prejudice and discrimination : Question: What are the four different combination of Prejudice and discrimination? What is your view on different combination?
What does it take for the hr person to get a seat at table : When we talk about the business partner we sometimes talk about "getting a seat at the table". That is, actually being physically present at meeting
What are the market demographics : When running a sports bar business, what are the market demographics, market needs, market trends, market growth, SWOT analysis
Egyptian conceptions of the after-life and egyptian art : Describe the relationship between Egyptian conceptions of the after-life and Egyptian art. Use examples to support your essay.
Unit 17 Network Security Assignment : Unit 17 Network Security Assignment Help and Solution - Higher National Diploma in Computing and Discuss the importance of Network Security in present
Examine the claim of consequentialism : Examine the claim of consequentialism that actions are "right" to the extent they have beneficial consequences.
Present some methods of training needs assessment : Imagine you are an operations manager at a manufacturing facility. What method would be best for this type of setting? Who should be involved in this process?
Arguments against birth control : Using your own words, explain three (3) world arguments for birth control and two (2) world arguments against birth control.
How does knowing the customer drive business success : How does knowing the customer drive business success? How would you evaluate VALS as a method of market segmentation?

Reviews

Write a Review

Other Subject Questions & Answers

  Describe the results you obtained from laboratory activity

At the conclusion of each laboratory project, a written report will be required. This is your opportunity to tell the instructor what you have learned from the weekly content by focusing on the criteria listed above. Reports should display critica..

  Estimate albert cohen-s theory on reaction formation

Using outside resources, estimate Albert Cohen's theory on reaction formation. Is formation and content of delinquent subcultures influenced?

  Describe the two specific types of family crisis situations

Explain what insights you have or conclusions you can draw based on this comparison.Crisis intervention strategies that might be used for each.

  What population is this condition typically found in

Write a paper related to your assigned cardiopulmonary condition then summarize the paper in a presentation of no more than 15 minutes.

  Explain how the stakeholder''s worldview effects policy

The name of your selected stakeholder in the Virtual Community. Then, explain how the stakeholder's worldview effects his or her policy position that he or she would take on reproductive rights. Finally, explain alternative policy positions that t..

  How will your topic add to current research

Discuss the topic you would like to prepare a research proposal on. How will your topic add to current research? What are some of the ethical considerations.

  What is humes attack against causation

What is Humes attack against causation - why does the version of Consequentialism, Ethical Egoism, not meet the Moral Criteria of Adequacy?

  What kind of job are you looking for

What kind of job are you looking for?What is your preferred type of company?What other specifics are you looking for in employment?

  What is your artistic intent

Your thesis art project concept and presentation should be explained as clearly and thoroughly as possible. What is your artistic intent? What do you plan to convey through your final artwork and/or narrative

  Describe the type of computer crime

How the evidence was analyzed - including the processes and what tools were used.How the crime scene was secured.

  Define what is meant by risk and return

Write a five paragraph essay with the title: Risk and return. Define what is meant by risk and return. What role do markets play in risk and return

  Define protocol description of the assignment mechanism

Many statisticians base ANOVA on the design of the experiment, especially on the protocol that specifies the random assignments of treatment to subjects.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd