Provide a literature review on layered security architecture

Assignment Help Computer Network Security
Reference no: EM131481161

Task 1:

Submit a work proposal for this assignment which must include:
- Understanding of deliverables - a detail description of deliverables
- General overview of proposed plan - initial understanding of solution to all the tasks
- Resources identified

Task 2: This part evaluate students' perceptive of Security Architecture.

It is becoming increasingly critical that financial institutions ensure their banking customers are able to access their accounts with the highest reasonable security, using a process that is very straightforward and approachable. Technology has made it possible for hackers to extend their reach to vast number of potential victims through a wide variety of attack vectors. Therefore, banks are required to use a secure architecture to provide convenient and secure online services. Secure architecture can be achieved by having layered security. Layered security is a defensive strategy featuring multiple types of security measures, each protecting against a different vector for attack.

Students are required to do the following tasks:

a. Provide a literature review on layered Security Architecture.

(Hint: This should include: the understanding of layered security concept, detailed description of security layers, advantages and disadvantages of using layered security architecture)

b. As a network security consultant, suggest a layered security architecture for a small company's network.

(Hint: Your architecture should include five levels of IT infrastructure)

c. The concept of layered security is commonly applied by banking system to provide a secure mobile banking services. From user side, Explore and identify what are security controls in your mBanking application. Evaluate the efficiency of these controls.

(Hint: provide screen shoots for all security messages appears in your application)

Task 3:

You are the network administrator for 7colores Company. The company has implemented Microsoft Forefront TMG as the firewall. The company works 5 days a week (Sunday to Thursday) from 8am to 4pm. The company has the following requirements:

1. The Company management wants to implement Network Inspection System (NIS). The goal is to enable NIS to all networks except for servers located in the range 10.20.20.10 to 10.20.20.30. Those servers are considered administration servers, and do not require NIS traffic evaluation. TMG should check for updates every 25 minutes to obtain new signatures. The company wants to follow the default Microsoft policy when network traffic matches one of the active signatures.

2. The TMG intrusion detection should be able to detect Ping of death, UDP bomb and IP half scan attacks and all sorts of DNS attacks. TMG should filter the Time stamp and Loose Source Route during the IP options filtering. The Company management wants to block packets containing IP fragments, but wants to give the default settings for the SIP parameters.

You are required to complete the following configuration

a. Configure network Inspection System (NIS) as following :
- Configure an exception named ‘admin' for the NIS
- Configure the address rule Element called ‘administration server'.
- Configure the excepted IP addresses range to be 10.20.20.10 to 10.20.20.30.
- Configure the signature update to be every 25 minutes


b. Configure an intrusion detection System (IDS):
- Enable detection for Ping of death, UDP bomb and IP half scan attacks
- Enable detection for all types of DNS attack.
- Configure Time stamp and Loose Source Route during the IP options filtering.
- Block packets containing IP fragments.

Verified Expert

The paper discusses about six later architecture fr system security. The paper explains the problem faced by different organization in system security. How the firewall and router are helpful in preventing the security are also discussed. The paper is prepared for 3000 words. referencing in Harvard style. Times new roman, 12 size font used. Single spaced.

Reference no: EM131481161

Questions Cloud

Review the current literature surrounding your given topic : Review the current literature surrounding your topic. Appropriate sources may include scholarly, peer-reviewed journals in field of college student development.
Where do you think this salary negotiation will end up : Where do you think this salary negotiation will end up? Why?
Phase of the labor relations process : Which of the following is not a phase of the labor relations process?
What is an explanation of the civil rights act : What is an explanation of the Civil Rights Act, Title VII 1964 Legislation where it talks about reasonable accommodation for religious practices?
Provide a literature review on layered security architecture : Network Security (COMP 30019) - Provide a literature review on layered Security Architecture and suggest a layered security architecture
Output rate when system cycle time is the minimum cycle time : An assembly line with 20 tasks is to be balanced. What is the daily output rate when the system cycle time is the minimum cycle time?
What is the dominant strategy of the pizza factory : A small town has only one pizza place, The Pizza Factory. A small competitor, Perfect Pies, is thinking about entering the market.
What has worked for you to get students engaged in classroom : Effective teachers know their students, know their content areas. What has worked for you to get students engaged in your classroom?
What evidence does the author present to support her points : What evidence does the author present to support her/his main points? Now assess whether the author's evidence is convincing.

Reviews

len1481161

5/2/2017 2:55:20 AM

Guidelines: Follow the guidelines mentioned below for your assignment: ? The document should not be more than 15 to 19 pages in (size A4) paper. ? The document should be well presented and neatly done. ? Assignment should be submitted through Moodle (Turnitin). ? Handwritten assignments will not be accepted. ? Assignment should have a title page. Title page should contain the following information: o Title of the assessment, o Names of the student, o Student ID, o Session, o Department Name, o Semester Name, Academic Year ? It should have Table of Contents, references. ? Use page numbers ? Assignment should be computer typed using Calibri size 12 font and the Softcopy is to be submitted through Moodle (Turnitin). ? Heading should be with Font Size 14, Bold, Underline ? Use Diagrams and Examples to explain your topic. ? Copy paste from the Internet is strictly not acceptable. ? In-text citation and referencing using CU Harvard referencing Style.

len1481161

5/2/2017 2:55:12 AM

• Assignment report submission 90 Marks Submit the assignment report on or before, which must include: Task 2: Students are required to write a report, not more than 3,000 words, the report should include: • Understanding of layered security architecture. • A layered security architecture for a small company network. • Listing and evaluating of security controls in an mBanking application Task 3: TMG configuration • Configuration of NIS to satisfy the given requirements • Configuration of IDS to satisfy the given requirements

len1481161

5/2/2017 2:55:03 AM

Evaluation Criteria: The evaluation will be done on the strength of analysis presented in the assignment: • Task 1: Assignment work proposal submission: 10 Marks Submit a work proposal for this assignment on or before, which must include: ? Understanding of deliverables – a detail description of deliverables ? General overview of proposed plan - initial understanding of solution to all the tasks ? Resources identified

len1481161

5/2/2017 2:54:46 AM

• Present the relevant citation / references at the end of document • Marks will be awarded for the content written in your own words • All the tasks will be evaluated through viva. Students absent for viva will be awarded zero marks for the assignment. • Report must be uploaded on Moodle on or before the date of submission.

Write a Review

Computer Network Security Questions & Answers

  Identify the type of internet access that you use at home

Identify the type of Internet access that you use at home or in school. Discuss the pros and cons of the service available within your area. Justify your response.

  Calculate an rsa signature on a long message

Would it be reasonable to compute an RSA signature on a long message by ?rst computing what the message equals mod n, for some ?xed n and then signing this computed value only. Why or why not?

  How to calculate signatue for arbitrary integers

Describe how Trudy can now calculate your signature on (m1j m2k) mod n for arbitrary integers j and k. (you will also require to describe how she can also compute m1-1 mod n).

  Research the possible ways of creating such a cctv system

MN603 Wireless Networks and Security Assignment. Research the possible ways of creating such a CCTV system for the above Case study to help Raju out. Which way would be the best possible approach. Justify your answer

  Victim of cyberstalking while using social networking?

victim of cyberstalking while using social networking?

  Dubbing was coined as a term of copying

Dubbing was coined as a term of copying media in the 1980's for all mediums. What term was a major issue during the process of continously dubbing media? Digitization cured this issue.

  What does kleopatra allow you to do once it is installed

What does Kleopatra allow you to do once it is installed? What key type was used to create the certificate on Kleopatra? What other types of encryption key types are possible?

  Describe the key issues or challenges from this case study

Describe the key issues/challenges/crisjs from this case study. Based on the information provided in the case study, describe and document the recommended security strategy to mitigate the issues/challenges identified.

  Write udp programs to establish communication channel

Write UDP programs allowing two parties to establish a secure communication channel. For simplicity, let us call the programs "Host" and "Client", which are executed by Alice and Bob, respectively.

  Network design and analysis

You have been asked to design a Banking Network with two primary types of locations: a Branch location and a Campus location. The bank has a total of 2,220 branch locations and 85 Campus locations. What routing protocol(s) would you recommend for thi..

  Modern networks have to support a number of digital data

modern networks have to support a number of digital data protocols as well as digital audio protocols. the ability to

  Identify the anomaly in the traffic organisation going

Identify the anomaly in the traffic this organisation is going through. What sort of evidence do you have to make this claim. What sort of utility or tool do you think the "attacker"is using to conduct this attack

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd