Design and Implementation of a Secure Campus Network

Added on - 21 Apr 2020

  • 18

    pages

  • 4673

    words

  • 5

    views

  • 0

    downloads

Showing pages 1 to 4 of 18 pages
Running head: RESEARCH PROPOSALDesign and Implementation of a Secure Campus Network: Research ProposalName of the StudentName of the UniversityAuthor’s Note
1RESEARCH PROPOSALTable of ContentsProposal...........................................................................................................................................2Topic Description............................................................................................................................2Outline.............................................................................................................................................3Abstract............................................................................................................................................4Introduction......................................................................................................................................5Literature Review............................................................................................................................5Research Methodology..................................................................................................................11Conclusion.....................................................................................................................................13References......................................................................................................................................15
2RESEARCH PROPOSALProposalThe proposal in this agenda is prepared to consider secure campus network concept alongwith suggesting security model. The paper provides proposal for showing security considerationsand the factors that should be addressed for implementing network. The proposal furtheraddresses checklist for showing certain aspects in the discussion in order to evaluate the campusnetwork as to provide recommendations of best practice of reducing data confidentiality issue.The primary aim of the study is to address designing and providing security mitigation practices.Topic DescriptionThis particular proposal aims to state the process of designing and implementing a securecampus network. Primary consideration of the proposal is to convey security over a campusnetwork as enterprise. Innovation and new technology utilization such as universal computing,enterprise mobility, cloud computing, and e-commerce (Scott-Hayward, Natarajan and Sezer2016). However, network security is considered as essential part for campus networkimplementing and increasing challenge for securing network. Generally, campus network facesseveral vulnerabilities in addressing major issues such as network architecture vulnerabilities.The problem occurs during open area network access such as wireless access for severalstudents, the secured network access should cover security attacks associated with network(Dacieret al.2017). Any secured network should be able to mitigate certain attacks duringteaching, learning, and research activities. Furthermore, theoretical contribution from thisproposal is to provide a reference model so that campus network can be adopted or followed withrobust and flexible network design.
3RESEARCH PROPOSALOutlineOutline of the study is to collect data from secondary sources for studying the topic. Theapplication of practical data is to be considered in designing secure network and implementsecurity in terms of campus network. The outline of the research should incorporate theoreticalframework for designing the security in LAN and WAN connection configuration. Moreover, theproposal should adhere to security issues and threats for mitigation. Some attack scenarios suchas Denial of Services, ARP spoofing attack, and mitigation of them should be depicted in thisstudy. In short, the study should be conducted with presenting collected information aboutsecurity issues and analyzed data over security scenarios.
desklib-logo
You’re reading a preview
card-image

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Download This Document