An Interim Report on: Securing a Local Area Network

Added on -2020-02-18

| ICT219| 14 pages| 2793 words| 72 views

Trusted by 2+ million users,
1000+ happy students everyday

Showing pages 1 to 4 of 14 pages

Running head: NETWORK AND SECURITYAn Interim Report on: Securing a Local Area NetworkName of the StudentName of the UniversityAuthor’s Note
1NETWORK AND SECURITY AbstractThe report is prepared for planning a local area network and application of security techniquesfor securing the network from external access. The different layers of the OSI models areanalyzed for the development of the network. The security threats associated with each of thelayers are analyzed for application of the preventive measures and reduce the risk ofunauthroised access in the network. Thee security principles are evaluated for theimplementation of the security protocol in the network and the report is documented based on thesecurity principles that can be applied for the development of the project. The security threatsassociated with a network can be identified by monitoring the network using network analysistools and the security levels that are required to be applied.
2NETWORK AND SECURITY Table of Contents1. Introduction......................................................................................................................31.1. Aims..........................................................................................................................32. Background......................................................................................................................33. Methods...........................................................................................................................44. Results..............................................................................................................................85. Conclusion.....................................................................................................................11Bibliography......................................................................................................................12
3NETWORK AND SECURITY 1. IntroductionA network is developed using four routers and each of the routers communicates witheach other using the border gateway protocol and also uses VPN tunneling for establishmentremote connection for allowing the remote users to access the network. A frame relay cloud isrequired to be used for setting the VPN connection and data packets can be transmitted to thedestination using the frame relay. A username and a password is required to be provided to theremote user to connect with the VPN server and access the network of the organization. Aseparate VLAN is required to be created for the different group of users for increasing thesecurity of the network.1.1. AimsThe main aim of the report is to analyze the vulnerability of a network with VPN serverwhen compared with the OSI model and different layers of the model. The different controlmeasures could be applied for the mitigation of the threats associated with the development ofthe network solution and appropriate protocol and cabling is required to be used for thedevelopment of the local area network. 2. BackgroundThere are three areas that are required to be covered in the local area network for theproposed solution and it is required to be secured from unauthroised access. A router isconnected with the areas and transmits the data packets from different source to the destinationaddress. The security threats associated with each of the areas are required to be analyzed and itis compared with the OSI layers such as the presentation, application and session layers. A VPNserver is required to be set up for allowing the remote user to connect with the network and

Found this document preview useful?

You are reading a preview
Upload your documents to download
or
Become a Desklib member to get accesss

Premium

$45

Q&A Library Access

Chat support

12

Document Unlocks

4

Answer Unlocks

Students who viewed this