Improving the security of the current network

Assignment Help Computer Network Security
Reference no: EM13191034

Based on the following background information and project requirements, complete a project making use of OPNET:

Background: AusCloud Brisbane is an IT company located in Brisbane. The company has offices in Melbourne and Sydney. They are now planning to extend the businesses to Singapore and Hong Kong. The company has experienced several security attacks in the
past, for example, some business data labelled as "sensitive" and "confidential" has been found in a report published on the Internet, and a number of malicious intrusions to the network of the company have been detected. The company has just made a budget to support a plan for improving the security of the network and information system. The plan includes improving the security of the current network and establishing a secure environment for data exchange between the headquarters (Brisbane) and other offices.

Project Description: The objectives of the project include: (1) to study how the database and web services can be protected against unauthorized use while maintaining access for authorized users by using firewall and VPN techniques; and (2) to study how secure data exchange over the Internet can be achieved by using encryption.

For the project, you are required, based on the background information given above, to implement a simulator using the OPNET IT Guru. On completion of the project you are expected to submit a report. (The requirements for the simulator and the report will be given below).

Requirements for the simulator:
(a). The simulator will have at least two servers: database server and web server.
(b). The offices in Melbourne and Sydney can access all the data, web services, and other applications.
(c). The office in Singapore cannot access the database.
(d). The office in Hong Kong cannot access the web services.
(e). The information exchange between the headquarters and authorized offices should be protected by encryption (hints will be given below on simulating the effect of encryption by using OPNET).

(f). The simulator should include the following scenarios for comparison purpose:

- Scenario 1: No firewall, VPN, or encryption is employed, that is, a network without any protection.

- Scenario 2: Only firewall is implemented.

- Scenario 3: Employing both firewall(s) and VPN(s) to meet the requirements (a) - (d) given above.

- Scenario 4: Implementing firewall(s), VPN(s), and encryption to meet the requirements (a)-(e). 

Reference no: EM13191034

Install a new network consisting of a dozen computers

Your electronics manufacturing company is working on a new product. The board of directors thinks that this product will revolutionize the travel industry and generate huge pr

Case study on network infrastructure

You are the Information Security Officer at a medium-sized company (1,500 employees). The CIO asks you to explain why you believe it is important to secure the Windows and U

Difference between a rainbow table and a hash lookup table

Explain the difference between a rainbow table and a hash lookup table in respect to trying to compromise a computer system's password? What is reduction function, what doe

Discusses the possible role of encryption

Write a 5-6-page research paper that discusses the possible role of encryption in preventing the breach described in the scenario. You may take either a pro or con position.

What is data mining and why is it considered controversial

What exactly is "cyber ethics" How is it different from and similar to computer ethics information ethics and Internet ethics and Identify and describe some key aspects of

Discuss how standards for encryption modules

Go to the NIST FIPS 140-2 standards Website and read about the 140-2 encryption standards along with its annexes, discuss how standards for encryption modules and algorithms

Analyze the fundamentals of pki

Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department.

Describe the implementation of secure sockets layer

Describe the implementation of Secure Sockets Layer (SSL) in support of Hypertext Transfer Protocol Secure (HTTPS). Assess how you are assured that your browser is secure. D


Write a Review

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd