Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Title: Perimeter Network Security System

Outline Requirements:

The University is based in Glasgow, and offers higher education services to its students and staff. It is situated on a single campus called Campus A. Students and staff employs the network services from hosts on various different user networks, as shown in figure below:

1691_campus netwok.jpg

Due to a raising number of security violations, a possible redesign of the network infrastructure is to be investigated. You have been hired as a consultant to offer security enhancements, and produce a report. The main aim of the exercise is to present a possible solution to the problem at hand by making a prototype of the new network security infrastructure. This new design must tackle the given components:

• Offer best practice network egress and ingress filtering at the network perimeter.

• Make a perimeter firewall, with a suitable topology to give the organizations services, comprising public web and mail servers. The firewall must have a closed security stance, and provide public services in a secure manner.

• Offer secure access to all devices, from the security management subnet.

In addition, research must be carried out into increasingly common Advanced Persistent Threats (APT), and ways to defend against such using network defenses. This section of the coursework will be research only and be confined to a part of the Research Section.

You will be needed to analyze the new system needs and design, implement and justify a prototype for each and every component of the proposed system. Your proposed system can be implemented on Cisco hardware deployed in the network lab, or on the virtual networking software (like GNS3). The system must clearly demonstrate your mastery of the course material. Each and every component of the system must be developed separately, and it is not essential to implement an entire working system.

Introduction:

describe an understanding of the problem specification, the challenges and research, design and implementation.

Research and Design:

This must exhibit an outline of the proposed system and the main design features.

• Offer short literature review for each of the proposed key components (describeing research from a variety of sources, critical evaluation and personal reflection).

• Provide design of network security system components and justify your decisions.

Prototype Implementation:

This must define an outline prototype implementation of the system.

• Implement the key components of the proposed network system design (describes and show illustrations of your implementation comprising diagrams as there will not be practical demonstration).

Testing and Evaluation:

This must show testing, and outline the outcomes of any evaluations that you have made.

• describe and demonstrate the testing methods used, and show the outcome of the testing.

• Include evaluation of the systems and technologies used, by using references to the literature and personal reflection.

Conclusions:

This must reflect the methods you have used in the report, and to assess their benefits and limitations, and any observations that you have gained.

• Draw conclusions regarding the network security systems created, comprising conclusions regarding your design and also the implementation.

• Any recommended future enhancements, based on your findings.

References/Presentation:

Full academic referencing of books, web sites, and papers, by using thorough APA/Harvard referencing format.

• All references should be defined in an APA/Harvard format, and must be listed at the end of the report.
• Reference all materials employed, and cite every reference in the body of the report.
• Total report size must be 15-20 pages that do not comprise cover page, and appendix - if any.
• The report must be in 11 point text with normal margins.
• The similarity must be below 7%. Numbers above 7% indicate a possible problem.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9206

Have any Question? 


Related Questions in Computer Network & Security

Write one paragraph only for each questions1- can a

Write one paragraph only for each questions. 1- Can a business survive in today's world without a website or a poorly maintained website? Why or Why not? 2- What's your biggest fear about using the Internet? Why? Can you ...

Discussion questions -optimizing your network design please

Discussion Questions - "Optimizing Your Network Design" Please respond to the following: Select and describe one (1) of the queuing methods described in the readings. Present a real-world example of the method you select ...

Part-1given the following design for a money transfer

Part-1 Given the following design for a money transfer protocol which utilizes public key cryptography to assure confidentiality and authenticity of the transmission. Issuing a Check: 1. Payee (A) will contact the bank r ...

Learning team apply encryption standardsyour team was

Learning Team: Apply Encryption Standards Your team was invited to present to a high school IT class to explain how cryptography works. In order to explain the basics, you decide to show the class a tool called, CrypTool ...

Scenario additional detailshealth care hq has a

Scenario: Additional Details Health Care HQ has a client-server network architecture. The chief information officer (CIO) wants to understand the difference between a client-server and a peer-to-peer network. She also wa ...

Case projectnbsp law firm companynbsp law firm lincoln

CASE PROJECT:  LAW FIRM Company:  Law Firm: Lincoln Partners, Esq. A law firm has hired you as a Network Security Consultant to help its operations by providing a secure network to support its growth.  The Law firm curre ...

Security management assessmentimplementing basic security

Security Management Assessment Implementing basic security management is an important task for system administrators, as security is important to today's organizations. IT specialists are on the front lines of protecting ...

Assignmentplanning is an important aspect with any

Assignment Planning is an important aspect with any enterprise network structure. However, planning must encompass several aspects including not only the assessment of the technology required, but also keeping the stakeh ...

Module case studythe purpose of this assignment is for

Module Case Study The purpose of this assignment is for students to write a case study based on a common information security scenario. Prompt: You are the senior information security manager for a federal agency. You re ...

Analyzing network trafficone of our goals for this week is

Analyzing Network Traffic One of our goals for this week is to install and run a packet-capture utility, such as Wireshark. If you are successful with this task, run the packet capture while you do a familiar online task ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen