Unit 17 network security - network security project

Assignment Help Computer Networking
Reference no: EM132382926

Higher Nationals

Assignment Brief - BTEC (RQF)

Higher National Diploma in Computing

Unit Number and Title - 17 - Network Security

Assignment Title - Crumlin Computers Limited (CCL) - Network Security Project

Unit Learning Outcomes:

Examine Network Security principles, protocols and standards.
LO2. Design a secure network for a corporate environment.
LO3 Configure Network Security measures for the corporate environment
LO4 Undertake the testing of a network using a Test Plan

Assignment Brief and Guidance:

Crumlin Computers Limited (CCL) is a Small Business Enterprise providing computing services to local SMEs including but not limited to Network Planning, Setup, Configurations, Testing and Security. CCL prides itself on providing unrivalled support to its customers. Due to the recent business growth, CCL have acquired new headquarters in Manchester. CCL therefore requires someone who can setup their network at their new HQ in Manchester. CCL are very conscious about security, especially Network Security for their new HQ in Manchester.

You have recently been employed by CCL as their network manager and your principal duties include among other things setting up their network including implementing a secure working environment in terms of their network. Your task as their newly appointed network manager is to create a prototype network as a proof-of-concept. Your prototype must be accompanied by written material that explains how your networking solution can increase security and scalability as well as address issues of reliability and availability.

The Manchester HQ is organised as follows: there are 4 main rooms containing 18, 12, 5 and 3 PCs respectively. The room containing 5 machines is occasionally used for video conferencing with other organisations. Each location is on a separate network and will require internet access. The HQ also has a wireless access point that allows its employees to access the network

Task 1

Prepare a report covering the following topics:
Conduct a detailed analysis of Network Security principles and aspects covering devices needed to implement a secure network.
A discussion of possible Network Security protocols and associated technologies that will enable a secure network for CCL's Manchester HQ.

Task 2

Design and implement a network prototype using a network simulator (or lab devices), which incorporates high levels of Network Security features with the following requirements:

  • Firewall configurations.
  • Switches configurations.
  • Routers configurations.
  • VoIP configurations (IP Telephony).
  • WAN links.
  • Devices configurations.
  • IP addressing.
  • Subnetting, etc.

Provide evidence of your design through the use of commented configuration files and screenshots
You also need to provide the following written material in your formal report:

A rationale about the selection of the networking devices for the prototype.
A detailed explanation of how the security protocols will work with IPv4 and IPv6.
A discussion of different cryptographic types of network security and Quality of Service in relation to Network Security configuration

Task 3
Produce a comprehensive test plan for your network and provide evidence of testing through scripts, files and screenshots

Task 4
Make future recommendations for improvements to your network and critically evaluate the process of producing your network.

Attachment:- Assignment Network Security.rar

Reference no: EM132382926

Questions Cloud

What types of information do you feel are missing : Go to a local health care system and under "Choose a doctor" (or similar wording allowing a search for physicians associated with that center).
Examining health care delivery in the united states : The overall goal of the Session Long Project in this course is to examine health care delivery in the United States from a personal perspective and provide.
Compute the firm gross profit margin : Your firm has the following income statement items: sales of $52,000,000; income tax of $1,880,000; operating expenses of $9,000,000; cost of goods sold
Assignment - Cleaning, checking, and managing data in SPSS : Assignment - Cleaning, checking, and managing data in SPSS. Collapse the "Age" variable into ordinal variable with three categories
Unit 17 network security - network security project : Unit 17 Network Security Assignment help and solution, Crumlin Computers Limited, Network Security Project Assessment help, Higher National Diploma in Computing
Develop deployment plan for implementation of these polices : Develop a deployment plan for implementation of these polices, standards, and controls. List controls placed on domains in the IT infrastructure.
How much interest on interest would you have at the end : How much would you have at the end of 20 years? How much interest on interest would you have at the end of 20 years?
What is the projected net present value of project : Travis and sons has a capital sturcture which is based on 40 percent debt, 5 percent preferrerd stock, and 55 percent common stock.
Demonstrate connection to your desired work environment : Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

Reviews

Write a Review

Computer Networking Questions & Answers

  What is the cidr notation for the network id now

Starting with the network ID 192.16.20.0/24, what is the default Class C subnet mask for this network? Write this information both in decimal and in binary.

  How many trace elements are shown

What objects and counters are displayed in the right pane by default and what are the first five counters listed? What instances are listed?

  Make changes to the appearance of text

Make changes to the appearance of text or objectsMake changes to the appearance of text or objects

  How does the csma-ca in dcf handle media contention

Explain how does the CSMA/CA in DCF handle media contention and define ‘throughput' in regards to wireless network.

  How each layer of the model represents communication flow

Describe how each layer of the Model/Suite represents the communication flow between organizational levels and across departments/division of an actual hierarchical business.

  Provide network addresses which satisfy constraints

Subnet 1 is needed to support up to 125 Interfaces, and Subnet 2 and 3 are each needed to support up to 60 interfaces. Give three network addresses which satisfy these constraints.

  Literature review on modern network applications

Analyse common and emerging types of middleware to design and manage networked applications - Perform a literature review on modern network applications

  Comprehensive authentic assessment plan

Comprehensive Authentic Assessment Plan Deliverables- For this course AAP is a response for customer's RFP or customer's design requirements and type of solution used in network design

  What kind of security issues require to be considered when

q1. what are some of the reasons an organization might consider using a wireless lan?q2. what type of security issues

  Design lan with operation over a distance

You have been asked to design a LAN with operation over a distance of about 100m. Compare and contrast twisted pair cable, coaxial cable, fiber-optics.

  What is a bottleneck and how can you locate one

What is a bottleneck and how can you locate one?  - Describe three ways to improve network performance on the server?

  Technology related to client-dominant local area network

What technology and cost-of-use issues are related with a client- dominant local area network? Think about what happens as the network grows in size and users are storing and retrieving vast amounts of data.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd