Designing a network architecture

Assignment Help Computer Engineering
Reference no: EM131582477

NETWORK DESIGN PROJECT - INSTRUCTIONS

Overview

For this project, you will utilize the security policies and the high-level network diagram created in Lab 2 to create a report describing the network design necessary to address common security issues.

Inputs:

1. Lab 2 outputs - security policies and high-level network diagram

2. Course textbook - Vaca, J. R. (2014). Network and system security (2nd ed.). Waltham, MA: Syngress/Elsevier. ISBN: 9780124166899.

3. Other external resources as needed

Instructions:

1. Assume that you are designing a network architecture for a complex enterprise with a diverse application, user community, and device mix.

2. Incorporate and modify the security policies and network diagram created in Lab 2 as needed to elaborate on a more comprehensive network design.

3. Describe how the overall network architecture addresses the security threats and vulnerabilities:
a. Denial of Service (DOS) and Distributed Denial of Service (DDOS) attacks
b. Worms, virus, and Trojan horses
c. Man-in-the-middle (MITM) attacks
d. Rootkit injections
e. Data security/privacy on remote mobile devices

4. Document how each component in the network architecture addresses the security issues from step 2 (and others).

5. Beyond the network design, what additional measures do you recommend to address security concerns?

Outputs:

Write a 5-page research -based paper in current APA format that focuses on a network solution design using best practices in network security. The paper must include at least 5 references in addition to the course textbook and the Bible. Include the security policies, network diagram, and answers to steps 3-5 in the instructions.

Verified Expert

Hence in this assignment we have discussed the security policy of enterprise network architecture. When your business is completely dependent on, website, internet or server then the company administration should focus on various aspects to make it secure. Six security policy has been discussed above which should be adopted keenly to protect the network.

Reference no: EM131582477

Questions Cloud

What is the average price of the tickets per game : Roger bought season tickets to professional basketball games. The cost was $945.60. The season package included 36 home games.
Improve communication within the organization : Address two additional leadership traits that can assist in managing conflict and improve communication within the organization.
Write an equation in standard form of the parabola : Write an equation in standard form of the parabola that has the same shape as the graph of f(x) = 2x2, but with the given point as the vertex (5, 3).
Discuss the importance of standard costing : Discuss the importance of standard costing and understanding variances. If a supplier were to offer you cheaper goods (price and quality)
Designing a network architecture : Describe how the overall network architecture addresses the security threats and vulnerabilities
Calculate the cash provided in operating activities : Scranton, Inc. reports net income of $257,000 for the year ended December 31. Calculate the cash provided in operating activities using the indirect method
Address two additional leadership traits : Identify the top two leadership points you would want to share at the workshop, and discuss why you selected those points.
What opinions have you read that peaked your curiosity : What opinions have you read that peaked your curiosity. What new information did you learn. What would you like to know more about
What you think should be included in a future reform : Write a paper (1,250-1,500) on what you think should be included in a future reform of the health care system, focusing on financial operating changes.

Reviews

inf1582477

9/25/2017 6:24:57 AM

I have received the assessment even before the given deadline. I hope that the answers are right. There is no issues of price when you ask expertsmind. Just submit your task with all the relavant informations and forget about the quality what else a student require more. Service is always great as usual. thanks

inf1582477

8/18/2017 5:32:23 AM

It is from ch-2 and 3 from book , bible and additional 5 references. I have made payment. Please submit as soon as you can. I have to submit by 30th. I am sending you lab steps and 2 submission of What i did. 24505143_1Lab steps.docx 24505143_2Lab 2.docx 24505175_3Shah WirelessCommunicationStandard.docx Please check your work for Plagiarism also. did you add bible and book in reference? Book should be Vaca listed in the I nstructions and regular bible where you have to relate to it. Reference should be regular bible and vaca author book listed in instructions. I want those two references. It is not same that was listed at the end. I have to part 2 for this assignment. I have attached document. 24505178_1Network Design Project Part 2 Instructions1.docx take 5 pages from last assignment and this assignment so that will be 10 pages. combine both assignment so it will be 10 pages all together. Do same thing as last paper for reference with APA format. work will also checked for plagiarism.

Write a Review

Computer Engineering Questions & Answers

  Write a program that plays a game called catch-the-creature

Write a program that plays a game called Catch-the-Creature. Use an image to represent the creature. Have the creature appear at a random location for a random.

  Questionsuppose that you are the project leader for the

questionsuppose that you are the project leader for the campus housing system that you have been developing however as

  Electricity and magnieism state and explain ampere law

state and explain ampere law ? ltbrgtstate and explain biot savert law ? ltbrgtstate and explain ohm3939s law ?

  How to identify a task you perform regularly

define the architectural differences between the object-oriented and structured designs. Which of the designs makes more sense to you? Why?

  Create a rfp that will minimize procurement related risks

Create a 2- to 3-page Request for Proposal (RFP) that will minimize procurement related risks for this project. The RFP should contain the following components.

  Write down an sql statement

Write down an SQL statement

  Write clearly and concisely about systems analysis and

application architecture due week 8 and worth 50 points you have been tasked with building a payroll program for a

  Suppose that x is a vector that allready exists

Which is the right matlab logical expression to check whether the value of x is between -10 and 10 (inclusive).

  Exchange knights in the minimum number of turns

On a 3 x 4 chessboard there are 3 black knights (B B B) and three white knights (W W W). Exchange knights in the minimum number of turns.

  Examine benefits that an organization could experience

Examine at least three benefits and three drawbacks that an organization or individual could experience using virtualization. Recommend one individual or organization that would highly benefit from using virtualization.

  Initialize the given software stack pointer

Write a PIC18F assembly program at address 0x150 to compare two strings of 10 ASCII characters. The first string is stored starting at 0x30.

  At what airspeed does direct cooling become impossible

An aircraft oil cooler is to be constructed using the skin of the wing as the cooling surface. The wing may be idealized as a flat plate over which air.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd