Explain a security threat and one potential network problem

Assignment Help Computer Networking
Reference no: EM133129300

Task: Secure Network Design

SCENARIO

Company A is a property and casualty insurer underwriting multiple types of insurance. Company A is acquiring Company B, a ?nancial services organization, in order to diversify and increase market share. Company B conducts business in the same geographical area as Company A and delivers business and individual ?nancial planning services. Both companies provide services from their respective of?ces and at the customer's site. Both companies use broadband connectivity.

You are the IT director for Company A and will be the chief information of?cer (CIO) for the merged organization. You are tasked with analyzing, designing, and presenting the proposed IT integration project. Company A has clear IT infrastructure documentation, including a logical diagram, an organizational chart, and a recent security risk analysis. Company B does not have any IT infrastructure documentation, and several security and integration issues are evident. Company B outsources any IT-related needs to a consultant. Leadership for the merged organization has allocated a limited budget of $35,000 for this project and will expect justi?cation for recommended expenditures.

Integration project requirements include following secure network design principles, selecting or repurposing secure network components, assuring secure communication channels, addressing relevant regulatory compliance, minimizing potential network problems and security threats, delivering integration cost savings, and aligning IT to meet the business needs of the post-merger organization. This post-merger organization will re?ect one corporate of?ce and a branch of?ce.

REQUIREMENTS
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. The originality report that is provided when you submit your task can be used as a guide.

You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.

Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless speci?ed in the task requirements. All other submissions must be ?le types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).

A. Describe the problems Company A has with network security and infrastructure using details from one or more of the "Company A Organizational Chart," "Company A Risk Analysis," and "Company A Visio Diagram" supporting documents.

B. Run Zenmap and OpenVAS on Company B's network(s) using the "Performance Assessment Lab Area" web link. Your submission should include the following documents:
• a screenshot of the completed Zenmap scan-should be taken within the lab environment and should
include your name and student ID
• a screenshot of the OpenVAS report result-should be taken within the lab environment and should include your name and student ID
• the completed Zenmap PDF ?le(s)
• the completed OpenVAS PDF ?le-should include your name in the summary of the report

Note: This assessment requires you to submit pictures, graphics, and/or diagrams. Each ?le must be a supporting document no larger than 30 MB in size. Diagrams must be original and may be hand-drawn or drawn using a graphics program. Do not use CAD programs because the ?le will be too large. Your ?nal network drawing should be saved in *.vsd format using Microsoft Visio or a similar software tool.

C. Describe the potential impact of two network security or infrastructure problems of Company B using details from the outputs of Zenmap and OpenVas (see supporting documents below), including rationale for each problem.

1. Explain how correcting each of these problems will improve the functioning of the merged network.

D. Provide a network topology diagram using Microsoft Visio or a similar software tool that represents the proposed merging requirements from the scenario of Company A and Company B, including remediation of all existing infrastructure problems described in part A and part C.

Please follow the web link listed below to download a free student version of Visio Professional 2019.

E. Identify which layer of the OSI model and layer of the TCP/IP protocol stack apply to each component in the merged network topology diagram.

F. Justify the retention or deletion of four existing components as suggested in your proposed network topology diagram. Include how each component's retention or deletion and any newly required additions to the network address both security concerns and budgetary restrictions found in the scenario.

G. Explain how two secure network design principles are included in your proposed merged network topology diagram.

H. Describe two secure hardware and/or software components integrated into the proposed network topology and how each component will address the security needs of the merged organization.

I. Explain how the proposed network topology diagram for the merged organization addresses security safeguards based on a regulatory compliance requirement.

J. Explain a security threat and one potential network problem that would become a risk as part of the implementation of the proposed network topology diagram, including why each would become a risk.

1. Explain how the security threat and potential network problem should each be managed or mitigated as part of the implementation of the proposed topology diagram.

K. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

L. Demonstrate professional communication in the content and presentation of your submission.

Attachment:- Performance Assessment.rar

Reference no: EM133129300

Questions Cloud

Position of an economic relationship : Using the relationship between the price of a visit to a physiotherapist and the quantity of visits demanded, define and distinguish among the direction, the sl
Why would economists use simplified models : Why would economists use simplified models, like this one, when they can be challenged as being too simple to be realistic?
How a dialogue between turkey and uk focusing on trade : Explain how a dialogue between Turkey and Uk focusing on trade can help a win-win situation beneficial for both countries.
Methods to evaluate the need for change : Methods to evaluate the need for change. Strategies to gather stakeholder support and overcome resistance. Implementation strategies
Explain a security threat and one potential network problem : Identify which layer of the OSI model and layer of the TCP/IP protocol stack apply to each component in the merged network topology diagram
Analyse the strengths and weaknesses of the miners : Analyse the strengths and weaknesses of the Miners/Trade Union, Police and Government from the 1984-85 miners strike. (The one that took place in the UK)
Miners strike marked a turning point : In the wider context of employment relations in the UK. Consider the extent to which the miners' strike marked a turning point, leading to lower levels of indus
Is the article made by public or private entity : Name of the article and its author. Is the article made by a public or private entity? Who is the author trying to reach (audience)?
Contemporary challenges in transformational leadership : Describe the contemporary challenge. Apply three theories to evaluate the issue. Critically analyze the application of the theories.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd