logo

ICTNWK509 Design and Implement a Security Perimeter for ICT Networks | Assessment Task

   

Added on  2022-08-17

12 Pages877 Words15 Views
Running head: ASSESSMENT TASKS 2
ICTNWK509 Design and implement a security perimeter for ICT networks
Name of the Student
Name of the University
Author’s Note

1
ASSESSMENT TASKS 2
2.1. Identify some threats to SolutionTech perimeter security?
The following are the threats identified for the perimeter security of the SolutionTech network:
Stopping the attack barrage – There are multiple threats such as hacking, cracking and
other attacks due to malware, virus, worms and persistent threats. The default configuration of
the targeted system is attacked or improper configuration for misusing the technological
resources. The attacks are made for capturing valuable contents such as personnel data and
financial assets.
Effectively management of perimeter security system – There are different disparate
solution that can be used for ineffectively communicating with each other. Independent
management is needed for enabling the security measures such as web filtering or firewall
configuration and it have limitation in logging which can create issue for the organization for
attempting to react or detect the attack (Puthal et al. 2016). The management of security program

2
ASSESSMENT TASKS 2
can create limitation in time and money and cause barrier for the IT department for mastering
configurations.
Lowering cost of ownership – The management of geographically diverse offices, data
centers can incur extra cost since each of the location is needed to be assigned with an IT staff. It
can also hike the renewal cost for the multitude perimeter security and thus shorten the IT
budgets.
2.2. Develop Network design for SolutionTech considering a secure perimeter and explain your
design considerations? (You may use any network design software, A demo design provided
here to give you some idea)
For the development of the secure network design the information system that can create
risk for the organization is needed to be evaluated such that the level of risk and is acceptance is

3
ASSESSMENT TASKS 2
measured. Different control measures such as implementation of firewalls, isolation of resources,
hardening the configuration of network devices, access control and authentication system is
implemented for the development of the network design for SolutionTech. For designing the
network it is needed to be considered such that it can provide ability to support the growth and
expansion of the network in future.
2.3. Deploy the network for SolutionTech to meet perimeter security requirements by cisco
packet tracer?
Build Network topology
Connect all devices using the correct type of cables
For interconnecting the network devices the following cabling plan is needed to be
followed:
Device Cable type

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Selecting a WAN Link and Debugging
|20
|1398
|35

Report On Development of Network Design
|12
|2179
|592

Internetworking with TCP/IP. Assignment
|39
|1742
|157

Network Topology and Configuration
|19
|1156
|25

Configure, verify and Troubleshoot WAN links and IP services in a Medium Enterprise Network
|10
|1032
|423

Assignment on TCP/IP Networking
|36
|1389
|261