Improving the security of the current network

Assignment Help Computer Network Security
Reference no: EM13191034

Based on the following background information and project requirements, complete a project making use of OPNET:

Background: AusCloud Brisbane is an IT company located in Brisbane. The company has offices in Melbourne and Sydney. They are now planning to extend the businesses to Singapore and Hong Kong. The company has experienced several security attacks in the
past, for example, some business data labelled as "sensitive" and "confidential" has been found in a report published on the Internet, and a number of malicious intrusions to the network of the company have been detected. The company has just made a budget to support a plan for improving the security of the network and information system. The plan includes improving the security of the current network and establishing a secure environment for data exchange between the headquarters (Brisbane) and other offices.

Project Description: The objectives of the project include: (1) to study how the database and web services can be protected against unauthorized use while maintaining access for authorized users by using firewall and VPN techniques; and (2) to study how secure data exchange over the Internet can be achieved by using encryption.

For the project, you are required, based on the background information given above, to implement a simulator using the OPNET IT Guru. On completion of the project you are expected to submit a report. (The requirements for the simulator and the report will be given below).

Requirements for the simulator:
(a). The simulator will have at least two servers: database server and web server.
(b). The offices in Melbourne and Sydney can access all the data, web services, and other applications.
(c). The office in Singapore cannot access the database.
(d). The office in Hong Kong cannot access the web services.
(e). The information exchange between the headquarters and authorized offices should be protected by encryption (hints will be given below on simulating the effect of encryption by using OPNET).

(f). The simulator should include the following scenarios for comparison purpose:

- Scenario 1: No firewall, VPN, or encryption is employed, that is, a network without any protection.

- Scenario 2: Only firewall is implemented.

- Scenario 3: Employing both firewall(s) and VPN(s) to meet the requirements (a) - (d) given above.

- Scenario 4: Implementing firewall(s), VPN(s), and encryption to meet the requirements (a)-(e). 

Reference no: EM13191034

Questions Cloud

How much money was put into each type of investment : To pay for their child's college education, the parents invested $10,000, part in a certificate of deposit paying 8.5% annual interest, the rate in a mutual fund paying 7% annual interest. The annual income from the mutual fund. How much money was..
Define chemical is measured under the same conditions : Another solution of the same chemical is measured under the same conditions and has an absorbance of 0.81. What is its concentration?
Find the lcm of each set of polynomials : Find the LCM of each set of polynomials
State how many years would it take : how many years would it take for a 10-gram sample of U-238 to decrease to 2.5 grams?
Improving the security of the current network : The plan includes improving the security of the current network and establishing a secure environment for data exchange between the headquarters (Brisbane) and other offices.
How many ways can the manager choose which routines : A dance team knows 14 routines of which 7 are tap, 5 are ballet, and 2 are modern. The program can consist of any four routines. In how many ways can the manager choose which routines to present if there are no restrictions?
How many rabbits does the farmer have : How many hens and how many rabbits does the farmer have? I know the answer is 20 rabbits and 30 hens. I need the algebraic formula. Can you help?
Depict a potential energy diagram for the reaction : Please draw a detailed, arrow-pushing mechanism for the addition of HBr to trans-2-butene. 4. Please draw a potential energy diagram for this reaction
What is the subgame perfect equilibrium of the game : Now suppose that there is a second ?rm with cost function c1 (q) above. Whichever cost function ?rm 1 chooses, the second ?rm will observe this choice and then have the option of entering the market or not. If he does not enter, ?rm 1 remains a mo..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Attacking the devises by doing buffer overflow

Implement buffer overflow in c++ And attacking the devises by doing buffer overflow.

  Content of e-mail rightfully belongs to sender-receiver

Who does content of e-mail rightfully belongs to sender or receiver? Are security threats overblown? Present the example to support response.

  Understanding project priorities and scheduling issues

hat general suggestions would you give for helping to promote common understanding of project priorities and critical scheduling issues,

  Determine primary security risk that users must acknowledge

Based on the article by Lenning (2005), determine a primary security risk that users must acknowledge when using macros? Why is it significant to educate users of these risks once their dilemma is resolved?

  Configuring dhcp with alternate ip address configuration

By configuring DHCP with an Alternate IP Address Configuration. Describe how this technique could be used in an IT environment of your choosing.

  Explain hardware and software used to support personal

Write 700-1050 word paper explaining hardware and software used to support personal, workgroup, and enterprise computing within current organization, an organization.

  Prepare a diagram using rationale

Analyse the article/case study from the perspective of at least two different classical ethical theories and present well reasoned arguments for your assessments and recommendations.

  Define physical secuirty and three types of threats

Define Physical secuirty and three types of threats related with physical security. Write down the steps in designing and choosing a secure site in detail.

  Reasonable to compute rsa signature on long message

Would it be reasonable to compute an RSA signature on a long message by first finding what the message equals, mod n, and signing that?

  Question on security infrastructure and protocols

Question on Security infrastructure and protocols

  Udp programs to establish a secure communication channel

Write UDP programs allowing two parties to establish a secure communication channel and perform a security analysis for the key exchange protocol

  Effective biometric systems

Discuss why are many of the reliable, effective biometric systems perceived as intrusive by users and what are stateful inspection firewalls and how do the tables track the state and context of each exchanged packet?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd