logo

Design and Implementation of a Secure Campus Network

   

Added on  2020-04-21

18 Pages4673 Words162 Views
Running head: RESEARCH PROPOSALDesign and Implementation of a Secure Campus Network: Research ProposalName of the StudentName of the UniversityAuthor’s Note
Design and Implementation of a Secure Campus Network_1
1RESEARCH PROPOSALTable of ContentsProposal...........................................................................................................................................2Topic Description............................................................................................................................2Outline.............................................................................................................................................3Abstract............................................................................................................................................4Introduction......................................................................................................................................5Literature Review............................................................................................................................5Research Methodology..................................................................................................................11Conclusion.....................................................................................................................................13References......................................................................................................................................15
Design and Implementation of a Secure Campus Network_2
2RESEARCH PROPOSALProposal The proposal in this agenda is prepared to consider secure campus network concept alongwith suggesting security model. The paper provides proposal for showing security considerationsand the factors that should be addressed for implementing network. The proposal furtheraddresses checklist for showing certain aspects in the discussion in order to evaluate the campusnetwork as to provide recommendations of best practice of reducing data confidentiality issue.The primary aim of the study is to address designing and providing security mitigation practices.Topic DescriptionThis particular proposal aims to state the process of designing and implementing a securecampus network. Primary consideration of the proposal is to convey security over a campusnetwork as enterprise. Innovation and new technology utilization such as universal computing,enterprise mobility, cloud computing, and e-commerce (Scott-Hayward, Natarajan and Sezer2016). However, network security is considered as essential part for campus networkimplementing and increasing challenge for securing network. Generally, campus network facesseveral vulnerabilities in addressing major issues such as network architecture vulnerabilities.The problem occurs during open area network access such as wireless access for severalstudents, the secured network access should cover security attacks associated with network(Dacier et al. 2017). Any secured network should be able to mitigate certain attacks duringteaching, learning, and research activities. Furthermore, theoretical contribution from thisproposal is to provide a reference model so that campus network can be adopted or followed withrobust and flexible network design.
Design and Implementation of a Secure Campus Network_3
3RESEARCH PROPOSALOutline Outline of the study is to collect data from secondary sources for studying the topic. Theapplication of practical data is to be considered in designing secure network and implementsecurity in terms of campus network. The outline of the research should incorporate theoreticalframework for designing the security in LAN and WAN connection configuration. Moreover, theproposal should adhere to security issues and threats for mitigation. Some attack scenarios suchas Denial of Services, ARP spoofing attack, and mitigation of them should be depicted in thisstudy. In short, the study should be conducted with presenting collected information aboutsecurity issues and analyzed data over security scenarios.
Design and Implementation of a Secure Campus Network_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security: Concepts and Techniques
|11
|718
|27

Virtual Private Network and Wireless Network Assignment
|10
|2990
|176

Evaluation of the Network Security
|14
|4297
|495

Security of Emerging Connected Systems Assignment PDF
|17
|3637
|141

Threats in Information Technology Network Study
|9
|1792
|86

Securing the Enterprise Infrastructure Report 2022
|4
|772
|15