Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Comprehensive Authentic Assessment Plan Deliverables

For this course AAP is a response for customer's RFP or customer's design requirements and type of solution used in network design. Typically a customer's RFP includes following topics.

• Business goals for the project
• Scope of the project
• Information on existing network
• Information on new applications
• Technical requirements, including scalability, availability, network performance, security, manageability, usability, adaptability, and affordability
• Warranty requirements for products
• Environmental or architectural constraints
• Training and support requirements
• Preliminary schedule with milestones and deliverables
• Legal contractual terms and conditions

Your AAP should include responses to all of customer's RFP and should include logical and physical component pf the design, information on technologies used in design solution, and proposal to implementing the design.

Design Requirements

Network Requirements

• Design & configure enterprise campus model design
o State of the art VoIP and Data Network
o Modular, scalable network
o Provide faster Network services
- LAN speed minimum 100 MB and Internet speed minimum 54 MB
o Use appropriate Cisco switch models
o Integrate voice and data network to reduce cost
o 100% connectivity with a minimum number of outside lines for dialing outside numbers.
o Access layers switches
- One port for each device
- Provision for 100% growth
o Server farm switches
- Assume 6 NIC cards in each server and one NIC card uses one port of switch
- Dual processors and dual power supply
- Centralize services and servers
o Built-in redundancy at:
- building core layer and building distribution layer and access layer
- workstation level
- uplinks connection to Building Distribution layer for Building Access layer
o Aggregate routing protocols with hierarchal IP scheme
o TCP/IP protocols for the network
- Guest network must support AppleTalk protocol

• Fast and secure wireless services in the lobby and two large conference rooms
o minimum 54 Mbps of bandwidth

• Video conference and multicast services

• Extra switch capacity at for authorized users to attach their notebook PCs to the network
o Port Security, Sticky MAC, 802.1x protocols to ensure only authorized systems

• IP addressing redesign that optimizes IP addressing and IP routing with IPv6 migration provisions
o Internal/External DNS
o Dual stack, 6to4 tunnel capability or NAT-PT for IPv6 transition

• Site-to-site VPN must be mutually authenticated and utilize cryptographic protection

• PSTN dial-up
o must authenticate with username and OTP
o RADIUS/NAP

• Based on equipment inventory and other requirements:
o Access Layer port count:
- 94 ports for phones, but by utilizing network port on phone this number can be reduced in half to 47. 47 additional ports will be needed for the extra phone in offices.
- 107 ports for desktop/workstation. In most cases a workstation will connect to a phone using the trunking capability of the access switch and the phone.
o Distribution/datacenter
- 240 ports (6 ports per server; 40 servers total)

Security Requirements

• Multilayer security or defense-in-depth security
o Smart card w/ PIN

• Classified Network
o Data Separation from Unclassified network
o Physical Security
- Locks / Smart Cards to access area/systems (multi-factor authentication)
o IPSEC
o No Internet Access
o No USB/Removable Media/Printers/CD Burners (disabled by GPO)

• Encrypted network must use SSL

• Public Servers
o HTTPS (SSL)
- Provide secure means of customer purchase and payment over Internet
o Inside DMZ
o NAT
o Identity Check (User authentication/ Certificate)

• Secure key applications and servers without using encryption on all devices

• Security policies in place to stop sniffing and man-in-the-middle attacks

• Data transmitted on the classified network must be cryptographically protected throughout the network

• Data crossing wide-area links should undergo another layer of cryptographic protection

• All devices must be mutually authenticated and cryptographic protection should be provided.

• Users should undergo periodic user awareness training program on network threats and good security practices
o Acceptable Use Policy to define appropriate user behavior and security configuration settings

• Resolve current security audit problems

• Physical security

• Email protection to protect unclassified and sensitive business emails

Active Directory Requirements

• Servers
o Centralize all services and servers
o Implement Failover cluster services
o File classification infrastructure feature
o IP Address Management (IPAM)
o DHCP (for employee systems)
o Exchange/Outlook (Sending and receiving e-mail)
o Windows Deployment Services
o File Server
- FSRM (quota & file screening)

• OU Infrastructure
o Role-Based
o Department-based OUs
o Global/ Universal/ Local groups
- Utilize least privileged principle for membership
- (delegate group ownership for adding/removing users)

• GPOs
o Bitlocker
o Configure Netscape or Microsoft's Internet Explorer
o Block removable media on classified network
o Create appropriate GPO and GPO policies

• Bitlocker
o BitLocker encryption technology for devices (server and Work station) disc space and volume
o Enable a BitLocker system on a wired network to automatically unlock the system volume during boot
o GPO enforced Used Disk Space Only or Full Encryption is used when BitLocker is enabled

• Enable BranchCache

• Implement Cache Encryption to store encrypted data by default.

Attachment:- Assignment.rar

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91417095
  • Price:- $150

Priced at Now at $150, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Final project incident response exercise amp reportyour

Final Project: Incident Response Exercise & Report Your Task You have been assigned to work incident clean-up as part of the Sifers-Grayson Blue Team. Your task is to assist in analyzing and documenting the incident desc ...

Objectivesthis assessment item relates to the unit learning

Objective(s) This assessment item relates to the unit learning outcomes as in the unit descriptors. This checks your understanding about configuring and troubleshooting medium-size networks. PART-1 IP Addressing: 1. Subn ...

About rsa please answer the following questionsa suppose

About RSA, please answer the following questions. (a) Suppose p=11 and q=7. What is ? (n), where n=p?q? (b) If the public key e is 11, find the private key d. (c) If the ciphertext is 4, what is the plaintext? (d) For en ...

Objectives-to learn about more advanced network security

Objectives -To learn about more advanced network security and vulnerability scanning tools Lab Outcome: · To complete the lab procedures & correctly answer the questions in the Blackboard quiz. Lab Deliverables · Answer ...

Question suppose you work in a network security company and

Question: Suppose you work in a network security company, and you need to prepare a survey report of a particular security issue of wireless networking. To start with, select an area of wireless network security. We have ...

Wireless networks and security assignment - design and

Wireless Networks and Security Assignment - Design and implementation of secure enterprise wireless network Purpose of the assessment - The purpose of this assignment is to design and implement a secure enterprise wirele ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

Network project management assignment -purpose of the

Network Project Management Assignment - Purpose of the assessment - The purpose of this assignment is to build a clear understanding of project management fundamentals and their application, specifically: demonstrate pro ...

Question what is active threat in terms of network security

Question: What is active threat in terms of network security? Provide an example. The response must be typed, single spaced, must be in times new roman font (size 12) and must follow the APA format. Note: minimum 300 wor ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As