Understanding of network security fundamentals

Assignment Help Computer Networking
Reference no: EM133774023

Network Security Concepts

Assessment item - Report & Presentation

Objectives
This assessment item is designed to test your understanding of network security fundamentals, administering a secure network, mobile security, access control, identity management and wireless network security relating to the contents of the whole unit.

Assessment task

Assessment task contains two parts; part A is writing a report on the given topic (weighting: 35%) and part B is the presentation on the written report.

Part A: The report must focus on the case study scenario related questions given in the assessment task section. Any answers provided that do not address the case study scenario and the given questions may be awarded 0 (zero) marks. Your report should include the following sections (detailed marking criteria is given at the end):
Executive summary including assumptions.
Discussion (on the given tasks).
List of Reference (please use at least four sources for your discussion).
Reflection on the assessment task.

Reference list is not included in the word count. Some other parts, such as Table of contents, Introduction, and Conclusion may be included.

Part B: Part B of this assessment task is the presentation of your work. Your presentation should include:

Introduction.
Brief description of your proposed solution with justification (referring to the unit material as appropriate).
In-depth demonstration of one chosen topic on the given tasks in the report discussion.
Note: You may include your reflection as well as the list of references in your presentation.

Case scenario:
Aussie Mining Corporation (AMC) is planning to establish a new coal mining site in the west-north region of Queensland, situated 100 km west of Mount Isa City. The new mining site covers an area of 5 km by 5 km, where heavy-duty mining machinery will be in operation. Additionally, AMC intends to construct a single 5-story office building located 1 km away from the mining site.
The anticipated workforce at the mining site comprises approximately 100 employees across various roles: 10% executives, 10% marketing professionals, 10% financial and human resource personnel, and 70% engineers and technicians. This workforce may be expanded up to 300 employees in the next 10 years.

To address the diverse needs of the business, AMC aims for a hybrid infrastructure that incorporates both on- premises networks and cloud computing solutions. The local network will connect local servers, workstations, laptops, and mobile devices for all staff and visitors. Simultaneously, the cloud computing platform will host important servers, including company websites and trading information, store critical data, and manage authentication, authorization, and permission controls. To ensure data integrity and confidentiality, a secure VPN is desired.

However, in consideration of the security of company employees and assets, CCTV systems will be deployed. Video footage from CCTV cameras will be stored on a local server and can only be accessed from the computers inside the office build. A dedicated local control system will be implemented to monitor all mining machines and vehicles, which requires a robust firewall to protect against cyber threats. Private IP addresses will be employed within the mining site, a few public IP addresses will be purchased from Internet Service Provider (ISP) for mapping purposes.

To establish a robust connectivity backbone, the company plans to install a dedicated fibre optic network connecting to Mount Isa City, leveraging the NBN network infrastructure node for access to the public Internet. This fibre optic network will link to major routers located in the office build communication closet. Within the office building and mining site, cost-effective solutions like general Ethernet cables and mesh wireless networks are preferred. The network is expected to be operational 24/7, ensuring continuous communication and monitoring of the whole mining site.

AMC is currently in the network planning and design stage. However, cybersecurity considerations must be integrated at this stage. As a cybersecurity expert, you are approached to provide the network designers with comprehensive strategies for securing their network, applications, and data/information.

Identify two types of potential attacks you have studied from the unit lecture materials that might occur in the above-mentioned scenario. Describe each of them and explain how these attacks could occur in the given case (explain with a diagram or list the possible steps if applicable).

Propose at least three networking technologies/methods/protocols that could have been used to enhance the network (wired and/or wireless) security in the above case. Explain in detail how these technologies that you proposed would enhance this company's network security (justify your answer). You could describe them within the OSI model.

Various hardware devices should be used to protect the company's network, such as firewall or AP device with VLANs. Explain the use of such secure devices and how they can improve network security and maybe the network performance. Explain with a simple diagram where you would put the firewall/s in this company's network. Firewalls for both on-premises and cloud platforms must be considered. For the cloud-based firewall, you should include at least three screenshots from your tutorial activities (Azure Firewall) in your report to demonstrate your ability to configure a firewall on the cloud.

The company executive needs to utilize role-based access control (RBAC) to manage permissions and access to company resources, which should be implemented via a cloud platform. Elaborate on the advantages and disadvantages of this access control technique and its possible implementation. Please include at least two screenshots from your tutorial activities (Role-Based Access Control) to demonstrate your ability in configuring such an access control model, its implementation, and the related policy in your report.

Name two of the authentication methods/techniques that you recommend for this company (choose any two you studied from the unit lecture materials). Do some research and explain those two techniques. Your explanation should include brief description of the techniques, advantages, and disadvantages (if any) of those two techniques and the justification of your choice.

Reference no: EM133774023

Questions Cloud

Drag and drop application : Drag and drop the tasks from leaders against the corresponding team processes. Drag and drop application. Accountability Accountability drop zone empty.
Variety in Communication : Given that project teams are made up of people with varying ways of absorbing information, what is the value of the team communicating in different ways?
What effect does punishment of criminals have on criminal : What effect does the punishment of criminals have on the criminal? What effect does it have on society? Explain your answer with an example.
What type of contract termination : You manage a commercial contract for a supply item. what type of contract termination?
Understanding of network security fundamentals : Understanding of network security fundamentals, administering a secure network, mobile security, access control, identity management and wireless network
Define system boundaries Perform trade-off analysis : Identify elements and their interrelationships Define system boundaries Perform trade-off analysis Evaluate and elevate system constraints
How can roles be translated into micro social work practice : Discuss a few social work roles used by practitioners in macro practice. How can these roles be translated into micro social work practice?
Goals while continuing to maintain supportive group climate : Roles and responsibilities are conducive to achieving goals while continuing to maintain a supportive group climate.
What are your dependent and independent variables : What are your dependent and independent variables? What are the operational definitions of your independent and dependent variables?

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd