Write a security analysis of current network

Assignment Help Computer Network Security
Reference no: EM133044411

MOD002703 Advanced Network Security Principles - Anglia Ruskin University

Assessment - Case Study

ASSESSMENT ELEMENT - CASE STUDY

Callister Inc. is new in Manchester and has opened a branch in Cambridge. The company has designed its network, but the design has several security flaws. They have approached Anglia Ruskin University with a consulting contract where brilliant students in MSc in Cyber Security students will design, implement and document a proper security solution that can accommodate the requirements of the company.
This document describes the current state of the network as well as the security requirements of Callister Inc. Finally, it describes the final deliverables for this assignment.

Topology and Initial Configuration
The company has headquarters in Manchester and a branch in Cambridge.

The network is structured as follows:

• PUBLIC NETWORK: This network is outside Callister Inc. management and should not be changed. It has a HTTPS server, accessible through the URL, a PC representing a teleworker (i.e. belongs to the company but works remotely), a PC representing an outsider to the company, a DNS server that is used by devices belonging to the PUBLIC NETWORK, and a DHCP server to provide IP address to devices connected to the PUBLIC NETWORK. The ISP router belongs to the PUBLIC NETWORK and therefore should not be modified (assume that ISP has been configured properly).
• DMZ: This is the demilitarised zone of Callister Inc. and contains all servers that are public to internal and external areas. This is under the management of the company and should be considered within your security design. It contains the company's web server, an email server and, a DNS server that is used by users

of MANCHESTER HQ and CAMBRIDGE BRANCH. The DMZ servers are known externally through their external IP addresses and internally through their internal IP addresses, which means that static NAT has been configured in the DMZ_NAT router to perform this translation. All external devices trying to communicate with the DMZ servers need to use the public (external) IP addresses.

Figure 1. Callister Inc. network topology.

• MANCHESTER HQ: This is the internal network of the Manchester headquarters and is also under the management of the company. The Manchester_NAT router is the one implementing NAT translation, which means that all the devices connected to Manchester_NAT use private IP addresses to communicate internally between them but when connecting to devices on the other side of Manchester_NAT they will use the public IP address assigned by the dynamic NAT translation.
• CAMBRIDGE BRANCH: This network has all devices of the Cambridge branch that are under the management of Callister Inc. The Cambridge_NAT router implements NAT translation to allow devices connected to it to communicate to the rest of the devices. All the devices connected to Cambridge_NAT use private IP addresses to communicate internally between them but when connecting to devices on the other side of Cambridge_NAT they will use the public IP address assigned by the dynamic NAT translation.

The following configurations have already been made for you:
• IP addresses of all devices as well as hostnames
• NAT in the Manchester_NAT, Cambridge_NAT and DMZ_NAT routers. It is recommended not to modify anything of the existing configuration on those routers unless consulted with the module tutor. Assume that NAT is working properly.
• Static routing, please note that because of NAT, connectivity tests between devices that are in the same network should be done using the private IP address whilst connectivity between devices in different networks should be done using the public IP address. Figure 1 and Table 1 show the IP addresses configured in each device interface.

Security Analysis
As part of the consulting job Callister Inc. needs you to write a security analysis of their current network and come up with the security mechanisms needed to achieve basic network security. You must write a technical document that describes the security mechanisms you would recommend the company to implement supporting your decision with references to best practices and/or industry recommendations. The CCNA Security curriculum or the slides of any other security module from your course cannot be used as references but you can use white papers from Cisco or other similar documents.
Your analysis must consider the following mechanisms:

• Securing the network devices for administrative access (including AAA).
• Zone-based policy firewalls (only required in Manchester).
• Intrusion Prevention Systems.
• Layer 2 security.
• Virtual Private Networks (to communicate Manchester and Cambridge).

FOR SIMPLICITY PURPOSES YOU ARE NOT REQUIRED TO SECURE THE DMZ_NAT,
Cambridge_NAT NOR Manchester_NAT routers.

The analysis must be thorough and can include the addition of new elements to the networks that belong to the company. If your security analysis is incomplete, then this will also have an effect on your final configuration.

Assessment
Students must submit the security analysis by week 7 of the teaching semester as a formative assessment so they can receive feedback from the module tutor.

Design and Implement the security of the network
Once you are happy with the security mechanisms to implement you must configure them in the topology. The use of Packet Tracer is permitted, and the initial topology is provided in Canvas Element 010 assessment literacy page.

Testing the security of the network

Finally, you must provide a test plan of the security mechanisms. Your test plan doesn't need to include screenshots and it should just indicate the test that needs to be done to verify that the security mechanism is working properly. Table 3 shows an example on how to do the test plan, please note that show run must NOT be used as a command to verify a protocol.

Attachment:- Network Security Principles.rar

Reference no: EM133044411

Questions Cloud

Prepare the journal entry for the debt service fund : Prepare the journal entry for the debt service fund to reflect the transfer of funds from the General Fund to the debt service fund in anticipation
Considering agile approaches and handling conflict : As an IT leader, reflect on how important it is to understand what it takes to transition to an Agile philosophy.
How much interest expense should Mary report : Assume the bonds are isseued at a price of $5,135,430. How much interest expense should Mary report on their annual income statement (12/31/X1)
Evaluate the losses to an enterprise that cannot retain : Evaluate the losses to an enterprise that cannot retain the employees it wants.
Write a security analysis of current network : Write a security analysis of current network and come up with the security mechanisms needed to achieve basic network security
Compute the company net sales for the year : Beginning merchandise inventory was $32,280. Invoice cost of merchandise purchases $117,600. Compute the company's net sales for the year
Challenges of canada or quebec pension plans : Identify some of the challenges of Canada or Quebec Pension Plans (CPPor QPP)
Organization return on training investment : The TNA exercise must be skillfully planned to generate maximum benefits to help improve the organization's return on training investment.
Case study of boeing airplanes : "All Boeing airplanes are certified and delivered to the highest levels of safety consistent with industry standards. Airplanes are delivered with baseline conf

Reviews

len3044411

12/9/2021 10:07:57 PM

We need to write analysis of a particular company''''s security. We will be given a packet tracer topology, We have to analyze and implement few security devices such as firewalls, IPS, layer 2 security, Passwords if required for required devices, VPNs. You can see what all we need to implement in the below attachment. - The main thing is in analysis part( carries 30%) we need to explain the security policies connecting to company and explain why we need to implement these policies and where we need to place them in the packet tracer. - After analysis, If the analysis is correct, then we can move ahead with testing and implementation.

Write a Review

Computer Network Security Questions & Answers

  It infrastructure management what to do for task 2a

what to do for task 2a 15 ltbrgt ltbrgtsubmit your enterprise architect blog as a single page with the web address of

  What do you believe are the motives of a cybercriminal

What are the main investigative tools that all cybercrime investigators should have? What are some of the specialty tools that investigators would require for specific type of investigation such as network intrusion or mobile investigation?

  Calculate the ratio of useful data to the entire frame

Calculate the ratio of useful data to the entire frame size in a classic Ethernet frame containing 26 bytes of the data received from the Network Layer

  Security by obscurity

Defacement, Infiltration, Phishing, Pharming, Insider Threats, Click Fraud, Denial of Service, Data Theft/Loss, IP Whitelisting and IP Spoofing, recursive PHP functio, worm and a virus, hash on a string using MD5

  Assignment on network security policy plan

Research and discuss the items that you would place in such a plan, and justify your reasoning for the items that you have decided to include.

  COSC2536 Security in Computing and Information Technology

COSC2536/2537 Security in Computing and Information Technology Assignment Help and Solution, RMIT University Australia - Privacy Preserving Online Voting System

  Essence of a digital signature is ensures authentication

1. The essence of a digital signature is that it ensures authentication. Explain how and why it does that.

  Design and simulate a network fulfilling the requirement

MIT Australia - MN503 Overview of Internetworking Assignment - Design and simulate a network fulfilling the gvien requirement

  Evaluate computer forensic analysis procedures and

computer crime and forensic analysisprovide two examples to distinguish the difference between what is considered a

  Is there any way that eve can read encrypted communications

Suppose that Eve runs a key server. Alice downloads a key from the key server which Eve claims is Bob's public key. Bob downloads a key from the key server which Eve claims is Alice's public key.

  Question about communication

Communication is valuable; a main part of this is the ability to provide management the information they required, when they require it.

  How processing proceeds when a packet is received

A replay attack is one in which an attacker obtains. How processing proceeds when a packet is received and explain how this counters the replay attack.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd