Propose methodical concept of defending network architecture

Assignment Help Other Subject
Reference no: EM132354582

PRACTICAL ACTIVITY -

ASSESSOR NOTE - These instructions must be followed when assessing the student in this unit. The checklist on the following page is to be completed for each student. Please refer to separate mapping document for specific details relating to the alignment of this task to the unit requirements.

This competency is to be assessed using standard and authorized work practices, safety requirements and environmental constraints. Assessment of essential underpinning knowledge will usually be conducted in an off-site context. Assessment is to comply with relevant regulatory or Australian standards' requirements.

Resource implications for assessment include:

  • an induction procedure and requirement
  • realistic tasks or simulated tasks covering the mandatory task requirements
  • relevant specifications and work instructions
  • tools and equipment appropriate for applying safe work practices
  • support materials appropriate to the activity
  • workplace instructions relating to safe work practices and addressing hazards and emergencies
  • material safety data sheets
  • research resources, including industry-related systems information.

Reasonable adjustments for people with disabilities must be made to assessment processes where required. This could include access to modified equipment and other physical resources, and the provision of appropriate assessment support.

This assessment task requires the student to:

  • Configure security in the routers
  • Implement authentication, authorisation and accounting
  • Configure IP ACL to mitigate threats and to Ip address spoofing
  • Secure management of router by implementing SSH
  • Configuring routers to send log messages to a log server
  • Configuring the switch to mitigate layer 2 attacks.
  • Implementation of zone-based firewall
  • Configuration of IDPS
  • Configuration of IPSec site to site VPN with PSK authentication

This project should be completed with reference to a simulated ICT/Business environment. For the practice environment, noise levels, production flow, interruptions and time variances must be typical of those experienced in the ICT project management field of work and include access to:

  • relevant computer software packages
  • suitable hardware
  • codes, standards and legislation relevant to the jurisdiction and the project
  • project documentation
  • research resources, including product information and data, theoretical texts and other information.

Please refer to the assessment document for the specifications. Note that this is an individual task.

Throughout the assessment task, ensure that you refer to and apply the Australian Computer Society Code of Ethics.

Develop Specifications and Terms of Reference for the project that includes:

Within your practice environment, complete each of the following parts (Note: Parts of this assessment task, such as project execution, will be simulated in your practice environment):

Practical Activity - Australian Institute of Business and Technology College provides opportunity to students to acquire a technical education and offers variety of courses. The AIBT network is used by all the staff and students. Recently there has been a breach of data and has raised serious issues. AIBT now has got very serious and want to implement the extensive security system. AIBT has two sites currently in Sydney one in Ultimo and one in Blacktown. You have been asked to secure all the network devices.

Objectives: You are to write a report and include your practical lab activity outcomes in your report as evidence of achievement of objectives.

Your trainer will provide you the configuration related information and network diagrams.

1. Evaluate network security system threats and requirements.

2. Propose a methodical concept of defending the network architecture.

3. Get client sign off.

4. Implement the system.

a. Secure the routers.

b. Implement AAA.

c. Implement ACL (Access Control List) mitigate threats.

d. Configure SSH.

e. Send log messages to the log server; configure syslog.

f. Mitigate common layer 2 attacks.

g. Implement Zone based firewall.

h. Implement Intrusion detection and Prevention in the routers.

i. Implement site to site VPN between two sites.

Throughout the assessment task, ensure that you refer to and apply the Australian Computer Society Code of Ethics.

Note - Please use the sample solution to provide configuration information and network diagrams to the students during lab activities.

Reference no: EM132354582

Questions Cloud

Calculate how much you will have in each fund in 12 years : (a) Calculate how much you will have in each fund in 12 years' time. (b) Analyse which investment product you will choose if you wanted to retire in 30 years'
Analyse ethical situations using critical thinking technique : ITC506 - Topics in Information Technology Ethics - analyse ethical situations using critical thinking techniques and Make a recommendation
Why is this important to field of early childhood education : Why is this important to field of early childhood education? Be specific in explaining the connections of your resource to course materials and topic for week.
What is the expected return on portfolio : The relevant risk -free rate is 7%, and the expected return on the market portfolio is 18%. What is the expected return on your portfolio?
Propose methodical concept of defending network architecture : Propose a methodical concept of defending the network architecture. Evaluate network security system threats and requirements
What is firm equity market beta : An identical firm that is entirely equity -financed has a market beta of 1.2. What is your firm's equity market beta?
What is the cost of the ending inventory at january 31 : At January 31, 190 units are still on hand. What is the cost of the ending inventory at January 31 if Tomasino uses the FIFO method?
What is bram market beta : The average annual return of the market portfolio is 12.5%, with a standard deviation of 4%. The covariance of the returns is 28.8%%. What is Bram's market beta
What is the? firms debt? ratio : Dearborn Supplies has total sales of $ 207 ?million, assets of $ 97 ?million, a return on equity of 35 ?percent, and a net profit margin of 7.8 percent.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd