Why is the voip network not isolated, it has an independent

Assignment Help Computer Engineering
Reference no: EM133239008

Case: Your manufacturing organization was recently attacked due to outdated technologies. The attack originated from an Operating System based vulnerability on legacy Windows machines (XP and 7). These machines are responsible for specific functions within your plants, such as cutting metal and laser cutting. These machines cost millions of dollars each, so they cannot easily be replaced. As well, the certification periods for the machines still have several years until they are not supported by the company who created them, and it is written in a contract that you cannot patch them or replace them yet. It is not clear as to where the attack originated from because as you dig further, the network becomes much more difficult to understand why it was built this way.

You have narrowed down the points of penetration (The network security flaws), and have distinguished that for some reason everything is in the same subnet! As well, you have a strong wireless Access Point with weak encryption directly on the network with no firewall protections. Additionally, you have a web server that is not contained in a DMZ. To make matters even more tragic, you have multiple modems with different public IP addresses, and one of them does not have a firewall. Also, the VOIP systems are located in the same network, yikes. After a long time considering if you want to keep your job, or just resign, you decide to develop a patch management proposal. Luckily, all the work that needs to be done to provide network defense can be designed within a quite simple manageable network plan architecture proposal.

The questions for the proposal are:

Q 1: Does the wireless access point need to be here (seems unlikely), and if so what kind of control needs to be implemented?

Q 2: What should be done about the web server and the second public IP with no firewall?

Q 3: Should we segment the network using VLANs, air gaps, and DMZs? If so, where in the network?

Q 4: Why is the VOIP network not isolated, it has an independent PBX controller (Like a router/modem depending on the brand) which can be attacked easily.

Tip: Remember, the XP and Win 7 Machines cannot be replaced, what kind of network control helps Isolate them from the internet?

Assignment requirements:

Design a topological network architecture diagram like the one above, using your knowledge from Module 4 around secure isolation of networks. Feel free to add in controls (I.E., air gaps, vlans, DMZs, Faraday Cages, etcetera). After reconstructing a proposed more secure (isolated) network. List the controls you would implement and why you would implement them.

Reference no: EM133239008

Questions Cloud

How many times the word occurred in the file : CS 203 Yuan Ze University, how many words there are in the file and the 10 most occurred word in the file with how many times the word occurred in the file
Explain the liver role in production of proteins : Anatomy Case Study - Hypoproteinemia- Describe all the constituents contained in plasma and their concentrations. Explain liver role in production of proteins
Predictive analysis would be best to showcase the work : DAT 430 Southern New Hampshire University - How could this scenario benefit from utilizing a predictive analysis and What type of predictive analysis
Create five literature-based learning centers : For this assignment, select a grade, pre-K to Grade 3. Create five literature-based learning centers for developing literacy skills
Why is the voip network not isolated, it has an independent : Pikes Peak Community College, Why is the VOIP network not isolated, it has an independent PBX controller (Like a router/modem depending on the brand)
Examine relationship between organization values and ethics : Examine the relationship between an organization's values and ethics and its culture. Discuss the relevance of Hofstede and Bond (1984)
How internet of things iot might utilize deep learning : University of Phoenix, Do you have a more comprehensive explanation of how the Internet of Things (IoT) might utilize deep learning
What is the difference between a switch and a router : What are the basic components of computer hardware and What is the difference between a switch and a router?
Explain what is meant by proving the null hypothesis : Explain what is meant by proving the null hypothesis? What is meant by the "power" of the probability accepting the null hypotheses

Reviews

Write a Review

Computer Engineering Questions & Answers

  Create a linear regression model in spss

Your goal is to create a regression model that can predict income based on age in years. Create a linear regression model in SPSS.

  What happens if you place two buttons in northern position

What happens if you place two buttons in the northern position of a border layout? Try it out with a small program.

  Define the edit distance between two strings x and y

Define the edit distance between two strings X and Y of length n and m, respectively, to be the number of edits that it takes to change X into Y.

  Create a simple php front end for a mysql database

A 'business table' consisting of: organisationID (primary key), business name, numOfLocations, numOfEmployees and address.

  Describe multiple anomaly detection techniques

Discuss techniques for combining multiple anomaly detection techniques to improve the identification of anomalous objects. Consider both supervised.

  Ethical and professional issues faced by risk professionals

Articulate the legal, social, ethical and professional issues faced by information security and risk professionals - systematic analysis of security breaches

  How the knowledge or theories of course have been applied

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be.

  What are the characteristics of the imperative paradigm

What are the characteristics of the imperative paradigm? What are the characteristics of the functional paradigm? What are characteristics of logic paradigm?

  Write a c program that will update a bank balance

Write a C program that will update a bank balance. A user cannot withdraw an amount of money that is more than the current balance.

  Create a text based version of the dice game

Using Java, create a text based version of the dice game 'Button Men'. No Special dice are allowed.

  Analyze software monopolies give your personal opinion

Analyze software monopolies. Give your personal opinion. Do you agree with Plato's Glaucon? Either way, explain why. Do all of them, not just one of them. Are these positive rights? Explain your personal opinion, according to one or more ethica..

  Compare rate distortion performances with the one tap case

DPCM-encode the Sinan, Elif, and bookshelf 1 images using a two-tap predictor and a four-level quantizer followed by a Huffman coder.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd