ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Network Security Solutions and Design

Verified

Added on  2020/10/22

|14
|4297
|495
AI Summary
This study aims to provide a clear understanding of network security solutions and design. It highlights the increasing use of technology and maximized risk factors in storing private data and information. The assignment also explores the use of tools and techniques for generating effective network security solutions.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Network security

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
INTRODUCTION...........................................................................................................................4
TASK 1............................................................................................................................................4
P 1.1 Evaluation of the network design on the basis of physical and logical network security. 4
P1.2 Potential security impact on the introduced network..........................................................5
P1.3 Common types of network attacks, the threats and their impacts, your discussion should
include up-to-date statistical information and in accordance to respected source of information
.....................................................................................................................................................5
TASK 2............................................................................................................................................7
P 2.1 With the aid of diagram design a new secured and reliable network, your network
design should include the following...........................................................................................7
P 2.2 Evaluate your network design and analyse feedback in terms of Security, Redundancy,
Availability, Scalability and Manageability................................................................................9
TASK 3..........................................................................................................................................11
P 3.1 Your design was accepted by the director and has asked you to build and configure the
entire network. Your implementation should include...............................................................11
P 3.2 Networks in terms of security should be tested rigorously. Systematically test and
document the result showing the process of testing the network, including: ...........................11
TASK 4..........................................................................................................................................11
P 4.1 Explain the Security System monitoring including physical and system level of access
security showing your proposed management procedures ......................................................11
P 4.2 The ongoing network security requires continuous review and analysis of security
policies and practice. Analyse and recommend tools that can be used to monitor the network,
use one of the recommended tools to produce baseline security report including (Patch &
Security updates, IIS Security, Windows vulnerability, weak password, etc...........................12
P 4.3 Recommend potential change management to improve on security and reliability of
your designed network..............................................................................................................12
CONCLUSION..............................................................................................................................13
REFERENCES..............................................................................................................................14
Document Page
INTRODUCTION
Network security is one of the greatest concerns in this modernised world because
technology have rapidly increased the variety of options towards the growth and development of
the organisations. In order to efficiently perform all the tasks using the effective technology it
need to be highly protected as this have also increased criminal attacks on the highly confidential
data. This study will be based on the Star up company i.e. Digisyst. This organisation consists of
only 15 staff members who manages the work of almost three departments such as HR, Design
and consultant developers. This study will help in designing a new network security solution in
order to provide secure the confidential information of the company. The report will also
concentrate towards the implementing the network security solutions which supports the data
security by using different types of wireless networking devices. The research will also provide
various features that help in effectively managing various network security solutions in
organisation.
TASK 1
P 1.1 Evaluation of the network design on the basis of physical and logical network security
The network design for the company helps in maintaining the data security in
order to provide security to confidential information of the company. Network design in the
Digisyst allows the flow of data which helps in providing the security to highly confidential
information of the company such as financial data etc. In order to introduce the wireless
technology in the company, Computer network engineer needs to adopt reliable and effective
techniques to increase the number of users (Prasad and Prasad, 2005). Digisyst recently uses the
existing servers such as Domain name server, Web based network and email server which is
found to be a less reliable source to protect the data security of the company.
As the company currently uses dedicated server for each department and these servers are
accessible in Digisysts using the internet connection. Due to the limited number of users in the
company. Being a computer network engineer, it was analysed that existing network design of
the company could not match the improved technology so it has to be continuously paramount
for the sake of growth and future development in terms providing additional functionalities to
establishing a powerful logical as well as physical network security within the Firm. For
accomplishing the main objective of the organisation managers of the company need to isolate
the server distribution fatalities of the company with users might prove threat to the network
Document Page
security of the Digisysts. For this purpose, logical and physical networking security need to be
converged that will include the implication of devices, services and IP addresses towards
establishment of secured physical and local connection in the company. Such measures are
largely separated as below:
Human resource and finance department need to establish an isolated network connection
from all the users to other types of group. This department need to develop 4 hosts in
order to separate the networks which help in reducing the constraints in the company.
In order to reduce the server management, each server will be established as close to the
server which will be easily managed by the staff members.
There is need to design and develop a wireless network which enable all the mobile users
in order to use the network.
P1.2 Potential security impact on the introduced network
Networking technology allows the interaction of large number of users on a specific
network and therefore this needs a security in order to protect the confidential data from an
unauthorised user (Border, 2007). Digisysts required to restructure their system security so this
involves a large risks factor that impacts on the introduced network security in the company.
Implication of the latest networking policies in the company have large chances cyber attacks
and these attacks can be ultimately affects the system security and it might decrease the
performance of the Digisyst.
Being the network security engineer, one has to also focus towards determining various
insights and disadvantages of the securing a huge network in an organisation. When the servers
and workstations are redesigned considering various security threats to the network that supports
the privacy of the confidentiality of data. Network security engineers have to carefully
implement the networking technology by carefully considering attention to the dangers to their
computers and networks.
P1.3 Common types of network attacks, the threats and their impacts, your discussion should
include up-to-date statistical information and in accordance to respected source of
information
Social networking have introduced various ways for promoting interaction between
different users that also allows the use of data and secured network. So, Advancement of
technology have also established various ways to protect such confidential data and information

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
of the company and thus various security measures are adopted by Digisysts in order to secure
the confidential information of the company. Emerging use of technology by all the organisation
in order to improve the efficient performance so it is paramount to secure the data from such
threats. There are various potential impacts of network security on an introduced network of the
company. Such impacts are as follows: Virus attacks: These attacks may harm the network security by reducing the speed of the
systems which is basically generated at the time when the servers are poorly configured.
This virus enters into the system and destroys all the confidential data available in the
system (Farrell, and et.al., 2009). Once the virus enters into the networking security of
Digisyst then criminals adopts all possible attempts to gain the unauthorised access which
result in loss of data and lack of network security. These attacks may include Trojjan
horse, worms and Danial of services (DOS). Logical attacks: Being a network security engineer of the Digisyst, such attacks are
mainly already existing vulnerabilities or bugs that are available in the programs. Such
cyber security threats are practiced intentionally for causing the system to crash. Such
attacks are mainly performed to gain the illegal access to the system which affects the
overall performance of the business. For example, such types of practice generally
revolve around the intruder such as Microsoft PNP MS05-039. Another example of this
types of security threats may include nutritious ping of death which allows the hacking of
the ICMP packets directly from the way of the where such packets are required to be
delivered. Resource attacks: These attacks such are attacks are mainly aimed at overwhelm the
important system resource such as CPU and RAM. This attacks are mainly accomplished
by dispatching the numerous forged requests or IP packets to the network. Various
application are introduced in order to perform such cyber security attacks such are Ville
Cyber-criminal which is capable of launching a greater or more potential assault that
result in compromising the integrity of multiple hosts. These may be resulted in stealing
of data, credit card data or passwords. Such cyber security threats might include
utilisation of the computer systems as a portion for botnet attack for spamming or
creating the denial of service attacks.
Document Page
Data leaks: Social networks are all about sharing unfortunately share the network
connection which each user to access the main data (Dabbagh, and et.al., 2015). This may
be responsible for loss of confidential data of the Digisyst. This issue may include legal
issues and it may emerge the damaging. This can be considered as the biggest threat as
criminals may perform such criminal activities in order to attack the confidential
information of the organisation. This leads to the great impacts on the company as such
activities are intentionally done to gain the unauthorised access of the information.
TASK 2
P 2.1 With the aid of diagram design a new secured and reliable network, your network design
should include the following
Being the network security engineer, one has analysed various improvements in order to
improve the networking policy of the company. This is mainly done to establish powerful and
secure network for the company which ensures the access of data and information towards the
large number of users and this help in improving the operational efficiency of the company.
Network design is the main concept for each and every organization because all the firms used
the network for sharing data from one node to another. It is also providing the safety and security
to their network system. The business running which is required for designing network and it
also maintaining the performance and efficiency in proper ways (Sklavos, Moldovyan and
Koufopavlou, 2005). Network engineer is maintain their integrity and storage that provide the
industry to meet the need and requirement of business.
Document Page
(Source: Network system, 2018)
This is the network system that designed according to the need and requirement of organization.
There are different devices applicable for the purpose of communication because hardware
devices always share the information from one node to another. It consists of devices such as
Modem, router, Firewall, workstations, computer system, Wi-Fi etc.
Router- Router is the hardware device that contain the specific IP Address in the network system
which is the unique address of each and every routers. This is basically helps for sending the
information from one place to another.
P 2.2 Evaluate your network design and analyse feedback in terms of Security, Redundancy,
Availability, Scalability and Manageability
Network is a crucial part of each and very organization that help for managing the
business operations and function. Network is playing important role in the organization where
the information share from one node to another that's why, it is required for managing the
network system in effective manner. Modern machines are available in marketplace that help for
creating effective network. Network security is a term that composite the different device that
Illustration 1: Network System

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
used for the communications. Security, Redundancy, Availability, Scalability and Manageability
are the overall requirement of network system because these are important features that allows
managing the network system.
Security- Network security is the most common part of overall system that maintain the
small and physical isolated application system. Each and every organization should have
ability to proivde the access for controlling all decisions regarding the network. Network
security is based on the organization strategy for ensuring the security of the network
traffic. It is the implementation of security software and hardware.
Manageability- Management system is important part of organization that support to the
virtual Machine. It is the most common part of administration to control the entire
network system (Kou, 2012). This feature is useful in the network system to measure the
need and requirement of resources that applicable in the network design. It can be divided
into different ways.
Health monitoring and Altering- This function is mainly tracked all the functionality and
ability for network system. Sometimes, it provides the valuable information which required for
the organization to maintain their services in proper manner.
Control and configuration- Hardware devices are configured the entire system in proper
manner. It is optimal key performance that needed for the real time control. In this way, it also
accesses the right nodes of network system.
Scalability- Virtual machine can be implemented in the different platform that found in
the network system. It is based on the diverse architecture and platform for managing the
business operations and functions.
Performance- It is important for administrator to provide the minimum processing and
they have less burden to the client machine. It is required for the organization to invest
large number of the entire service infrastructure.
Document Page
TASK 3
P 3.1 Configuration of entire networking
In a networking environment, various systems are connected together to perform the
tasks effectively. Interconnected networks helps in sharing the networking resources of the
Digisyst in order to establish an efficient and effective networking between different departments
of the company. Director of the Digisyst actually likes the idea of provisioning of isolated
network to each department but all the networks are interconnected in order to share
technological resources of the company. This require a proper configuration of the entire
networking components within the business. Following things are required to implement the
networking solutions in the Digisyst which are described below:
Configuration: In order to establish a connection between different system various switches and
routers need to be configured which ca be done through providing the IP addresses of the
different workstations within Digisyst.
Security: Implementation of VLAN's and various networking concepts in the company this
increases the chances of data loses which is the the major point of concern for the industry.
Designing the secured networking policy in the company helps in protecting the confidential
information of the Digisyst.
Documentation: This includes the configuration of the technical devices such as networking
server of each department in the company in oredr to share the actual status of the company to all
the staff members.
Technology: This helps in connections of VLAN's which helps in increasing the bandwidth in
the company. Implementation of Dynamic Host Control protocol in Digisyst also helps in
improving the performance of data delivering capacity of web mails and servers within the
company
P 3.2 Process of testing the network
System testing can be termed as computing the effectiveness of the programmed software
which may be performed on a separate module in order top determine the performance of the
hardware and software. This is done to deliver high quality of products to customers. This can be
considered as the process of testing of an integrated hardware and software in order to verify that
the system meets its specified requirements. Following tests are being performed in order to
Document Page
estimate the efficient and effective working of the designed program. Such tests are as follows
below:
Server: Window server testing is a strained oriented testing which helps in testing the client
server coordination, proper management of input output, CPU consumption etc. this type of
testing helps in promoting the systematic functioning of the programs in managing the
networking in Digisyst.
VLAN's: A virtual LAN is any broadcast domain that is isolated and partitioned in a computer
network at the data link layer i.e, Open system interconnected model. Implementation of Virtual
local area network in allows the administrator to group hosts together even when the host are
directly not connected to a common networking switch.
Technology: This is concerned with the network performance test that helps in measuring the
qualitative and quantitative performance of the computer network in Digisyst (Evans, Wang and
Ewy, 2006). Technology policy tests for and records the certain behaviour and processes that are
attached to a network. It basically defines the performance of the networks in order to deliver the
quality of services to customers.
DMZ: This networking policy basically helps in testing the configurations and connectivity of
the systems. This is commonly called as demilitarised Zone of networking that supports the
connectivity of different systems in order to share the resources in Digisyst.
TASK 4
P 4.1 Explain the Security System monitoring including physical and system level of access
security showing your proposed management procedures
Security system monitoring is a type process that provide the security in the entire
network system. There are different devices and components interconnected to each other
because all the system needs to communicate with one device to another in proper manner. These
devices used for control the central panel to protect towards the intruders. Security monitoring
system is the simple concept that securing the data of each level of organization. The sensor are
present the device that always monitor to the performance of the entire network system in
effective ways. These are different monitoring tool that protect the entire network system in
proper manner.
Control Panel – control panel is the based on the computer system that provide the
security to the overall network because it can be used the device communication for

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
providing the security alarm where the unwanted authorized can damage the network
system that's why, it is required for organization to use these components to manage the
entire network system in proper manner. Sensor is placed in the different area that easily
detect the unwanted distraction in the network system.
Windows Sensors- windows sensor are comprised into different parts that installed the
network system, First of all, device can be installed in the different places and it also
connected with the security circuit so that this sensor easily communicate with the other
device to provide the security alarm and notification to the network administrators.
Motion Sensors- This sensor will create an invisible zone for the designer to protect their
data with help for the unauthorised partner. This sensor is detected with the help of
motion. It is basically protected the network room where the all the system is designed
and protected in proper ways.
P 4.2 Analysis of network security and tools which help in monitoring the network that includes
Patch & Security updates, IIS Security, Windows vulnerability, weak password, etc.
A networking security requires the availability of security policies in order to determine
the risk which may leads to modification of existing policies to support the secure networking
management. It basically defines the rules and legal procedure to access the network.
Implementation of the security policy requires the following steps such are as:
Creation of usage policy statements which helps in identifying the general policies and
guidelines for improving the security practices within the company.
Conducting the analysis of risk that determines the risk to the network, resources and
data. It may be low, medium or high risk that may or may not be recovered.
Establishment of security team structure which leads to cross development for cross
functional security team.
Some security policies are described below:
Patch and security updates
This type of security policy sets a modification in computer programs that supports the
updated or improved the design of the system. Patches and security updates may be defined as
installation of the Operating software updates in order to support high technology updates that
Document Page
supports the privacy of network. It will be updated by clicking on software update option in
desktop. IIS securities
Internet information server is the most popular networking security that helps in
provisioning the secured architecture to web server. Upgraded IIS ensures the implementation of
IIS module that helps in transforming the configuration of the servers into an executable
documentation. Proper configuration of web server provides rights to application administrator in
order to make application-level configuration changes without the need to provide them access to
the server (Network Performance Test, 2018). Windows vulnerability
In a computer security, a vulnerability can be considered as the weakness that may be
exploited by attacker in order to gain the access of unauthorised practices. In order to exploit the
vulnerability of criminal require at least one applicable technique for establishing the connection
to weak system. Weak password
It is one of the major reason amongst all that help the attacker in breaking the system
security easily. The password is the main entrance and performs the role of key lock which may
become the weak link in the company's network security plan. Technological improvement have
also introduced various techniques for hackers which helps them to break, crack or deliberately
share the secured information in any organisation.
P 4.3 Suggestions and recommendations to improve the security and reliability of the network
that develops the potential change development in a Digisyst
Company need to manage the network configuration of the that will be able to support
the confidential data and information of the Digisyst. Various suggestions and recommendations
are as follows:
Networking security manager of the Digisyst should change the network management of
the company by introducing the cr ash recovery and various applications regarding such
issues.
In order to establish reliable networking security managers of the Digisyst should also
relay on command line interface to form a secure and reliable network by adopting
various standards and protocols (Evans, Wang and Ewy, 2006).
Document Page
Company should also need to design an isolated network of all departments in order to
provide dedicated server for every department. This will help in change development for
improving the networking security in the company.
CONCLUSION
It has been concluded that increasing use of technology have also maximised different
risk factors in order to store private data and information of the organisation. This study had also
provided a clear understanding about the use of different tools and techniques which help in
generating effective network security solutions for maintaining the huge confidential data of the
firms and this could make it possible by introducing the latest devices for providing a secure
network to the company. It has been also concluded that a reliable network design by adopting
various networks such as topology, security, physical security etc. The research also
implemented the appropriate security solutions to configure the network and protect it against the
unauthorised users.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
REFERENCES
Books and Journals
Prasad, A. and Prasad, N., 2005. 802.11 WLANs and IP networking: security, QoS, and mobility.
Boston: Artech House.
Border, C., 2007. The development and deployment of a multi-user, remote access virtualization
system for networking, security, and system administration classes. ACM SIGCSE
Bulletin. 39(1). pp.576-580.
Farrell, S., Symington, S., Weiss, H. and Lovell, P., 2009. Delay-tolerant networking security
overview. IRTF, draft-irtf-dtnrg-sec-overview. 6.
Dabbagh, M., Hamdaoui, B., Guizani, M. and Rayes, A., 2015. Software-defined networking
security: pros and cons. IEEE Communications Magazine. 53(6). pp.73-79.
Sklavos, N., Moldovyan, N.A. and Koufopavlou, O., 2005. High speed networking security:
design and implementation of two new DDP-based ciphers. Mobile Networks and
Applications. 10(1-2), pp.219-231.
Kou, W., 2012. Networking security and standards (Vol. 394). Springer Science & Business
Media.
Evans, J.B., Wang, W. and Ewy, B.J., 2006. Wireless networking security: open issues in trust,
management, interoperation and measurement. International Journal of Security and
Networks. 1(1-2), pp.84-94.
Online
Network Performance Test. 2018. [online]. Available
through:<https://www.techopedia.com/definition/29991/network-performance-test>
Network system. 2018. [online]. Available through:<https://www.conceptdraw.com/How-To-
Guide/picture/Network-diagram-System-design.png>
1 out of 14
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]