Why is the voip network not isolated, it has an independent

Assignment Help Computer Engineering
Reference no: EM133239008

Case: Your manufacturing organization was recently attacked due to outdated technologies. The attack originated from an Operating System based vulnerability on legacy Windows machines (XP and 7). These machines are responsible for specific functions within your plants, such as cutting metal and laser cutting. These machines cost millions of dollars each, so they cannot easily be replaced. As well, the certification periods for the machines still have several years until they are not supported by the company who created them, and it is written in a contract that you cannot patch them or replace them yet. It is not clear as to where the attack originated from because as you dig further, the network becomes much more difficult to understand why it was built this way.

You have narrowed down the points of penetration (The network security flaws), and have distinguished that for some reason everything is in the same subnet! As well, you have a strong wireless Access Point with weak encryption directly on the network with no firewall protections. Additionally, you have a web server that is not contained in a DMZ. To make matters even more tragic, you have multiple modems with different public IP addresses, and one of them does not have a firewall. Also, the VOIP systems are located in the same network, yikes. After a long time considering if you want to keep your job, or just resign, you decide to develop a patch management proposal. Luckily, all the work that needs to be done to provide network defense can be designed within a quite simple manageable network plan architecture proposal.

The questions for the proposal are:

Q 1: Does the wireless access point need to be here (seems unlikely), and if so what kind of control needs to be implemented?

Q 2: What should be done about the web server and the second public IP with no firewall?

Q 3: Should we segment the network using VLANs, air gaps, and DMZs? If so, where in the network?

Q 4: Why is the VOIP network not isolated, it has an independent PBX controller (Like a router/modem depending on the brand) which can be attacked easily.

Tip: Remember, the XP and Win 7 Machines cannot be replaced, what kind of network control helps Isolate them from the internet?

Assignment requirements:

Design a topological network architecture diagram like the one above, using your knowledge from Module 4 around secure isolation of networks. Feel free to add in controls (I.E., air gaps, vlans, DMZs, Faraday Cages, etcetera). After reconstructing a proposed more secure (isolated) network. List the controls you would implement and why you would implement them.

Reference no: EM133239008

Questions Cloud

How many times the word occurred in the file : CS 203 Yuan Ze University, how many words there are in the file and the 10 most occurred word in the file with how many times the word occurred in the file
Explain the liver role in production of proteins : Anatomy Case Study - Hypoproteinemia- Describe all the constituents contained in plasma and their concentrations. Explain liver role in production of proteins
Predictive analysis would be best to showcase the work : DAT 430 Southern New Hampshire University - How could this scenario benefit from utilizing a predictive analysis and What type of predictive analysis
Create five literature-based learning centers : For this assignment, select a grade, pre-K to Grade 3. Create five literature-based learning centers for developing literacy skills
Why is the voip network not isolated, it has an independent : Pikes Peak Community College, Why is the VOIP network not isolated, it has an independent PBX controller (Like a router/modem depending on the brand)
Examine relationship between organization values and ethics : Examine the relationship between an organization's values and ethics and its culture. Discuss the relevance of Hofstede and Bond (1984)
How internet of things iot might utilize deep learning : University of Phoenix, Do you have a more comprehensive explanation of how the Internet of Things (IoT) might utilize deep learning
What is the difference between a switch and a router : What are the basic components of computer hardware and What is the difference between a switch and a router?
Explain what is meant by proving the null hypothesis : Explain what is meant by proving the null hypothesis? What is meant by the "power" of the probability accepting the null hypotheses

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd