Unit 17 network security - network security project

Assignment Help Computer Networking
Reference no: EM132382926

Higher Nationals

Assignment Brief - BTEC (RQF)

Higher National Diploma in Computing

Unit Number and Title - 17 - Network Security

Assignment Title - Crumlin Computers Limited (CCL) - Network Security Project

Unit Learning Outcomes:

Examine Network Security principles, protocols and standards.
LO2. Design a secure network for a corporate environment.
LO3 Configure Network Security measures for the corporate environment
LO4 Undertake the testing of a network using a Test Plan

Assignment Brief and Guidance:

Crumlin Computers Limited (CCL) is a Small Business Enterprise providing computing services to local SMEs including but not limited to Network Planning, Setup, Configurations, Testing and Security. CCL prides itself on providing unrivalled support to its customers. Due to the recent business growth, CCL have acquired new headquarters in Manchester. CCL therefore requires someone who can setup their network at their new HQ in Manchester. CCL are very conscious about security, especially Network Security for their new HQ in Manchester.

You have recently been employed by CCL as their network manager and your principal duties include among other things setting up their network including implementing a secure working environment in terms of their network. Your task as their newly appointed network manager is to create a prototype network as a proof-of-concept. Your prototype must be accompanied by written material that explains how your networking solution can increase security and scalability as well as address issues of reliability and availability.

The Manchester HQ is organised as follows: there are 4 main rooms containing 18, 12, 5 and 3 PCs respectively. The room containing 5 machines is occasionally used for video conferencing with other organisations. Each location is on a separate network and will require internet access. The HQ also has a wireless access point that allows its employees to access the network

Task 1

Prepare a report covering the following topics:
Conduct a detailed analysis of Network Security principles and aspects covering devices needed to implement a secure network.
A discussion of possible Network Security protocols and associated technologies that will enable a secure network for CCL's Manchester HQ.

Task 2

Design and implement a network prototype using a network simulator (or lab devices), which incorporates high levels of Network Security features with the following requirements:

  • Firewall configurations.
  • Switches configurations.
  • Routers configurations.
  • VoIP configurations (IP Telephony).
  • WAN links.
  • Devices configurations.
  • IP addressing.
  • Subnetting, etc.

Provide evidence of your design through the use of commented configuration files and screenshots
You also need to provide the following written material in your formal report:

A rationale about the selection of the networking devices for the prototype.
A detailed explanation of how the security protocols will work with IPv4 and IPv6.
A discussion of different cryptographic types of network security and Quality of Service in relation to Network Security configuration

Task 3
Produce a comprehensive test plan for your network and provide evidence of testing through scripts, files and screenshots

Task 4
Make future recommendations for improvements to your network and critically evaluate the process of producing your network.

Attachment:- Assignment Network Security.rar

Reference no: EM132382926

Questions Cloud

What types of information do you feel are missing : Go to a local health care system and under "Choose a doctor" (or similar wording allowing a search for physicians associated with that center).
Examining health care delivery in the united states : The overall goal of the Session Long Project in this course is to examine health care delivery in the United States from a personal perspective and provide.
Compute the firm gross profit margin : Your firm has the following income statement items: sales of $52,000,000; income tax of $1,880,000; operating expenses of $9,000,000; cost of goods sold
Assignment - Cleaning, checking, and managing data in SPSS : Assignment - Cleaning, checking, and managing data in SPSS. Collapse the "Age" variable into ordinal variable with three categories
Unit 17 network security - network security project : Unit 17 Network Security Assignment help and solution, Crumlin Computers Limited, Network Security Project Assessment help, Higher National Diploma in Computing
Develop deployment plan for implementation of these polices : Develop a deployment plan for implementation of these polices, standards, and controls. List controls placed on domains in the IT infrastructure.
How much interest on interest would you have at the end : How much would you have at the end of 20 years? How much interest on interest would you have at the end of 20 years?
What is the projected net present value of project : Travis and sons has a capital sturcture which is based on 40 percent debt, 5 percent preferrerd stock, and 55 percent common stock.
Demonstrate connection to your desired work environment : Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd