Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Title: Perimeter Network Security System

Outline Requirements:

The University is based in Glasgow, and offers higher education services to its students and staff. It is situated on a single campus called Campus A. Students and staff employs the network services from hosts on various different user networks, as shown in figure below:

1691_campus netwok.jpg

Due to a raising number of security violations, a possible redesign of the network infrastructure is to be investigated. You have been hired as a consultant to offer security enhancements, and produce a report. The main aim of the exercise is to present a possible solution to the problem at hand by making a prototype of the new network security infrastructure. This new design must tackle the given components:

• Offer best practice network egress and ingress filtering at the network perimeter.

• Make a perimeter firewall, with a suitable topology to give the organizations services, comprising public web and mail servers. The firewall must have a closed security stance, and provide public services in a secure manner.

• Offer secure access to all devices, from the security management subnet.

In addition, research must be carried out into increasingly common Advanced Persistent Threats (APT), and ways to defend against such using network defenses. This section of the coursework will be research only and be confined to a part of the Research Section.

You will be needed to analyze the new system needs and design, implement and justify a prototype for each and every component of the proposed system. Your proposed system can be implemented on Cisco hardware deployed in the network lab, or on the virtual networking software (like GNS3). The system must clearly demonstrate your mastery of the course material. Each and every component of the system must be developed separately, and it is not essential to implement an entire working system.

Introduction:

describe an understanding of the problem specification, the challenges and research, design and implementation.

Research and Design:

This must exhibit an outline of the proposed system and the main design features.

• Offer short literature review for each of the proposed key components (describeing research from a variety of sources, critical evaluation and personal reflection).

• Provide design of network security system components and justify your decisions.

Prototype Implementation:

This must define an outline prototype implementation of the system.

• Implement the key components of the proposed network system design (describes and show illustrations of your implementation comprising diagrams as there will not be practical demonstration).

Testing and Evaluation:

This must show testing, and outline the outcomes of any evaluations that you have made.

• describe and demonstrate the testing methods used, and show the outcome of the testing.

• Include evaluation of the systems and technologies used, by using references to the literature and personal reflection.

Conclusions:

This must reflect the methods you have used in the report, and to assess their benefits and limitations, and any observations that you have gained.

• Draw conclusions regarding the network security systems created, comprising conclusions regarding your design and also the implementation.

• Any recommended future enhancements, based on your findings.

References/Presentation:

Full academic referencing of books, web sites, and papers, by using thorough APA/Harvard referencing format.

• All references should be defined in an APA/Harvard format, and must be listed at the end of the report.
• Reference all materials employed, and cite every reference in the body of the report.
• Total report size must be 15-20 pages that do not comprise cover page, and appendix - if any.
• The report must be in 11 point text with normal margins.
• The similarity must be below 7%. Numbers above 7% indicate a possible problem.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9206

Have any Question? 


Related Questions in Computer Network & Security

Concepts and strategies for managing securityassignment

Concepts and Strategies for managing security Assignment Brief As part of the formal assessment for the MSc Information Systems you are required to submit a Information Systems Security assignment. Please refer to your S ...

You are to write your own connectionless udp client print

You are to write your own connectionless (UDP) client. Print out everything. You can start with any open-source UDP client as a template and may want to include some parts of the template from Program 1. UDP packets will ...

Assignment data and pbx physical layer cabling designa

Assignment: Data and PBX Physical Layer Cabling Design A building you plan to use as an office has four floors; each floor is a rectangle 1000 ft. long and 300 ft. wide.  The vertical separation between the floors is 20 ...

Project- sample cyber security profileevery organization

Project- Sample Cyber Security Profile Every organization must create a cybersecurity profile (system security plan (SSP)) for all of its major and minor information systems. The cybersecurity profile documents the curre ...

Cyber crime and security 2168alleged computer hacker gary

Cyber Crime and Security (2168) Alleged computer hacker Gary McKinnon of the United Kingdom has publicly admitted to compromising computer systems belonging to NASA and the Department of Defense. Using information from y ...

Assignmentinstructionsutilizing your comprehensive security

Assignment: Instructions: Utilizing your comprehensive security plan outline as a guide, develop the identity management and security awareness training plan strategy for the organization. Upload the assignment in Micros ...

Assignment questionsquestion 1 assuming you can do 230

Assignment Questions Question 1. Assuming you can do 2 30 encryptions per second and key size is 64 bits: i. How long would a brute force attack take? (Both maximum and average values) ii. Give a scenario where this woul ...

Introductionthis case study has been divided into six

Introduction This case study has been divided into six components. You are to design a network, research and source appropriate devices justifying choices (feasibility, efficiency, etc), subnet the network using VLSM, an ...

Assignment xyz company troubleshooting and maintenance

Assignment: XYZ Company Troubleshooting and Maintenance Plan In XYZ Company is heavily invested in e-Commerce with all retail locations' Point of Sale systems connected so that it maintains a dynamic inventory and automa ...

Write answer to each question - two paragraphs for each

Write answer to each question - two paragraphs for each question with single spaces. Format : Single Spaced Strong Paragraphs Two paragraphs for each question Times New Roman - 12 subject: Data Communication and Network ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate