logo

An Interim Report on: Securing a Local Area Network

14 Pages2793 Words72 Views
   

Network and Security (ICT219)

   

Added on  2020-02-18

An Interim Report on: Securing a Local Area Network

   

Network and Security (ICT219)

   Added on 2020-02-18

ShareRelated Documents
Running head: NETWORK AND SECURITYAn Interim Report on: Securing a Local Area NetworkName of the StudentName of the UniversityAuthor’s Note
An Interim Report on: Securing a Local Area Network_1
1NETWORK AND SECURITY AbstractThe report is prepared for planning a local area network and application of security techniquesfor securing the network from external access. The different layers of the OSI models areanalyzed for the development of the network. The security threats associated with each of thelayers are analyzed for application of the preventive measures and reduce the risk ofunauthroised access in the network. Thee security principles are evaluated for theimplementation of the security protocol in the network and the report is documented based on thesecurity principles that can be applied for the development of the project. The security threatsassociated with a network can be identified by monitoring the network using network analysistools and the security levels that are required to be applied.
An Interim Report on: Securing a Local Area Network_2
2NETWORK AND SECURITY Table of Contents1. Introduction......................................................................................................................31.1. Aims..........................................................................................................................32. Background......................................................................................................................33. Methods...........................................................................................................................44. Results..............................................................................................................................85. Conclusion.....................................................................................................................11Bibliography......................................................................................................................12
An Interim Report on: Securing a Local Area Network_3
3NETWORK AND SECURITY 1. IntroductionA network is developed using four routers and each of the routers communicates witheach other using the border gateway protocol and also uses VPN tunneling for establishmentremote connection for allowing the remote users to access the network. A frame relay cloud isrequired to be used for setting the VPN connection and data packets can be transmitted to thedestination using the frame relay. A username and a password is required to be provided to theremote user to connect with the VPN server and access the network of the organization. Aseparate VLAN is required to be created for the different group of users for increasing thesecurity of the network.1.1. AimsThe main aim of the report is to analyze the vulnerability of a network with VPN serverwhen compared with the OSI model and different layers of the model. The different controlmeasures could be applied for the mitigation of the threats associated with the development ofthe network solution and appropriate protocol and cabling is required to be used for thedevelopment of the local area network. 2. BackgroundThere are three areas that are required to be covered in the local area network for theproposed solution and it is required to be secured from unauthroised access. A router isconnected with the areas and transmits the data packets from different source to the destinationaddress. The security threats associated with each of the areas are required to be analyzed and itis compared with the OSI layers such as the presentation, application and session layers. A VPNserver is required to be set up for allowing the remote user to connect with the network and
An Interim Report on: Securing a Local Area Network_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Infrastructure Component 2022 Report
|10
|2182
|17

Riordan Network Security Recommendations Assignment
|5
|923
|161

VPN: Virtual Private Network - Categories, Types, Topology, Advantages, Disadvantages, Components, Protocols, and Benefits
|16
|342
|394

WAN Technologies: Dial-up, Broadband, Frame Relay, ADSL, ISDN
|6
|1653
|246

AgroXYZ Network & Communications Presentation
|13
|902
|79

BN106 Networking Fundamentals Each Virtual Private Network
|7
|1112
|154