Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Task 1:

Submit a work proposal for this assignment which must include:
- Understanding of deliverables - a detail description of deliverables
- General overview of proposed plan - initial understanding of solution to all the tasks
- Resources identified

Task 2: This part evaluate students' perceptive of Security Architecture.

It is becoming increasingly critical that financial institutions ensure their banking customers are able to access their accounts with the highest reasonable security, using a process that is very straightforward and approachable. Technology has made it possible for hackers to extend their reach to vast number of potential victims through a wide variety of attack vectors. Therefore, banks are required to use a secure architecture to provide convenient and secure online services. Secure architecture can be achieved by having layered security. Layered security is a defensive strategy featuring multiple types of security measures, each protecting against a different vector for attack.

Students are required to do the following tasks:

a. Provide a literature review on layered Security Architecture.

(Hint: This should include: the understanding of layered security concept, detailed description of security layers, advantages and disadvantages of using layered security architecture)

b. As a network security consultant, suggest a layered security architecture for a small company's network.

(Hint: Your architecture should include five levels of IT infrastructure)

c. The concept of layered security is commonly applied by banking system to provide a secure mobile banking services. From user side, Explore and identify what are security controls in your mBanking application. Evaluate the efficiency of these controls.

(Hint: provide screen shoots for all security messages appears in your application)

Task 3:

You are the network administrator for 7colores Company. The company has implemented Microsoft Forefront TMG as the firewall. The company works 5 days a week (Sunday to Thursday) from 8am to 4pm. The company has the following requirements:

1. The Company management wants to implement Network Inspection System (NIS). The goal is to enable NIS to all networks except for servers located in the range 10.20.20.10 to 10.20.20.30. Those servers are considered administration servers, and do not require NIS traffic evaluation. TMG should check for updates every 25 minutes to obtain new signatures. The company wants to follow the default Microsoft policy when network traffic matches one of the active signatures.

2. The TMG intrusion detection should be able to detect Ping of death, UDP bomb and IP half scan attacks and all sorts of DNS attacks. TMG should filter the Time stamp and Loose Source Route during the IP options filtering. The Company management wants to block packets containing IP fragments, but wants to give the default settings for the SIP parameters.

You are required to complete the following configuration

a. Configure network Inspection System (NIS) as following :
- Configure an exception named ‘admin' for the NIS
- Configure the address rule Element called ‘administration server'.
- Configure the excepted IP addresses range to be 10.20.20.10 to 10.20.20.30.
- Configure the signature update to be every 25 minutes


b. Configure an intrusion detection System (IDS):
- Enable detection for Ping of death, UDP bomb and IP half scan attacks
- Enable detection for all types of DNS attack.
- Configure Time stamp and Loose Source Route during the IP options filtering.
- Block packets containing IP fragments.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92289897
  • Price:- $80

Priced at Now at $80, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

This is from a practical exercise the answers are below but

This is from a practical exercise. The answers are below BUT, I do not know how they came up with them. I'd like a step-by-step explanation of how they got the answers. Practical Exercise 1: Assume the demand for teacher ...

Income effects depend on the income elasticity of demand

Income effects depend on the income elasticity of demand for each good that you buy. If one of the goods you buy has a negative income elasticity, that is, it is an inferior good, what must be true of the income elastici ...

Assignment -need project made by packet truce follow the

Assignment - Need project made by packet Truce. Follow the given report and please don't make the project big and video will describe full project in details and with configuration. Project - Design and Implementation of ...

What are three ways that even every forecast model should

What are three ways that even every forecast model should be evaluated to obtain the best forecast result.

Toms income is 480and he spends it on two goods x and y his

Tom's income is $480and he spends it on two goods, X and Y. His utility function is U = XY. Both X and Y sells for $8 per unit.   a. Use lagrangian function to calculate Tom's utility-maximizing purchases of X and Y.  b. ...

Question explain the meaning of computer networkingexplain

Question: Explain the meaning of computer networking. Explain the meaning of Information and give at least three examples of it. The response must be typed, single spaced, must be in times new roman font (size 12) and mu ...

A certain device is used to determine the sex of an unborn

A certain device is used to determine the sex of an unborn baby, but the device is not very reliable. If the fetus is truly a boy, the device says BOY with probability 0:8 (but, mistakenly, GIRL with probability 0:2). If ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

Question for the remaining questions consider a 4-bit block

Question : For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 ...

Question a small company is assigned the class c network

Question : A small company is assigned the class C network 205.67.35.0. You need to divide this network to provide subnets for three departments using fixed-length subnetting. The departments are approximately the same s ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As