LD7007 Network Security Assignment

Assignment Help Computer Networking
Reference no: EM132437092

LD7007 - Network Security - Northumbria University

Learning Outcomes

The following learning outcomes will be assessed by this assignment:

• Develop an in-depth understanding of fundamental concepts and challenges in data and network security
• Demonstrate concepts related to basic cryptography
• Critically evaluate threats to data and network security; design and implement security solutions using networking IOS

Introduction

You are an independent consultant, part of the consultancy firm responsible for designing and implementing secure VoIP systems. Your main task is to implement a dedicated open source VoIP system with direct links to the mailbox of users using Asterisk IP-PBX in a series of Block Tasks. You should be able to design and implement secure VoIP calls in a local area network with appropriate dial plans in a fully virtualised environment. Your VoIP system should allow seamless integration with a unified communication (UC) system that allow unified email and desktop services.

Assignment Tasks:

Your work must be presented in the form of a Project Report and be no longer than 3000words (excl. references, figures, tables and appendices) plus a facing page that includes the executive summary. This should be typed on A4 paper and use a font size Arial 11 single spacing. For completeness, you may if you wish include additional material in an appendix but this will not contribute to the marks.

Portfolio Task(s):

Block A: Architecture and Communication

1. Configure a Linux server with Asterisk IP-PBX fully installed and configured with an appropriate logical addressing scheme. Your Linux server must be an authoritative DNS server for a domain of your choice.

2. Create a dial plan to serve up to 150 different extensions with at least two (2) soft phones attached and configured into your environment.

3. Design and implement a Postfix MTA in such a way that all voicemail from extensions it is forwarded to users' mailboxes.

4. Configuring appropriate IAX trunks to demonstrate connectivity between two different Asterisk servers.

Block B: Secure Operations and Service Delivery

5. Fully demonstrate at least three (3) attacks against your VoIP system with evidence on their sophistication and impact. At least one of these attacks should demonstrate pivoting against users' mailboxes.

6. Design and implement a comprehensive security policy for your VoIP system and clearly articulate adequate security controls against the attacks demonstrated in the previous step. Evidence must be provided on how the controls implemented can mitigate the attacks demonstrated.

7. Implement a comprehensive Network-based Intrusion Detection and Prevention system (NIDS) and test its efficiency in your VoIP deployment.

Block C: Research & Development

8. Deploy at least two (2) strong authentication mechanisms for your user agents (UA). You should be able to discuss critically the efficacy of those mechanisms into your VoIP environment and the cryptographic overhead produced as part of their deployment.

9. Encrypt VoIP traffic using standardised security protocols for the media part of the call. Critically discuss strengths and limitations of the protocol(s) selected with evidence on their efficacy in your environment.

10. With references to the public domain, critically discuss how cyber resilience can be achieved in unified communications. Identify the levels of UC reliability and redundancy companies must take to assure critical mission processes from the integration and adaptation of UC in traditional IT infrastructures.

Report Structure:
1. Executive Summary
2. Block A: Architecture and Communication
2.1 Asterisk design and Implementation
2.2 Dial Plan Implementation and Testing
2.3 Postfix MTA implementation and Testing
2.4 Configuration and demonstration of IAX trunk(s)
3. Block B: Secure Operations and Service Delivery
3.1 Attack demonstration and impact
3.2 Holistic security policy and controls
3.3 NIDS implementation and testing
4. Research & Development
4.1 Authentication mechanisms and Cryptographic overhead
4.2 VoIP media encryption: Implementation & Testing
4.3 Overview of Cyber resilience in UC: State-of-the-art
5. Conclusion and Future Work

Attachment:- Network Security.rar

Reference no: EM132437092

Questions Cloud

Preferable to base the assessment of learning on retention : Is it preferable to base the assessment of learning on retention or transfer test rather than on only performance during skill acquisition? Why or why not?
Describe the behavioral challenges in achieving efficiency : Describe the behavioral challenges in achieving efficiency. Discuss the three forms of market efficiency. What are the implications to corporate finance?
Determine effectiveness of workshop via evaluation method : Create a logical and comprehensive design document that governs the conduct of the workshop.Determine the effectiveness of the workshop via an evaluation method
Discuss dietary solutions to increase the intake : Discuss dietary solutions to increase the intake and absorption of iron. How can a vegetarian avoid this deficiency?
LD7007 Network Security Assignment : LD7007 Network Security Assignment Help and Solution, Northumbria University - Assessment Writing Service - Develop an in-depth understanding of fundamental
Data collection tools : Statistically speaking, does your data collection method have high or low participation rate? Does your survey instruments violate HIPAA or healthcare laws?
Discuss examples of relationships to obesity : What are the cultural, economic, and social factors that may result in obesity? Discuss examples of their relationships to obesity.
Healthful diet and the role of each in daily meal plans : Describe the four characteristics of a healthful diet and the role of each in daily meal plans.
Describe two types of fat patterning of the body : Fluids serve many functions for the body. Provide the four critical functions of fluids.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd