Network Security Assignment - Solved

Added on - Jan 2021

Trusted by 2+ million users,
1000+ happy students everyday
Showing pages 1 to 4 of 14 pages
Network security
Table of ContentsINTRODUCTION...........................................................................................................................4TASK 1............................................................................................................................................4P 1.1 Evaluation of the network design on the basis of physical and logical network security.4P1.2 Potential security impact on the introduced network..........................................................5P1.3 Common types of network attacks, the threats and their impacts, your discussion shouldinclude up-to-date statistical information and in accordance to respected source of information.....................................................................................................................................................5TASK 2............................................................................................................................................7P 2.1 With the aid of diagram design a new secured and reliable network, your networkdesign should include the following...........................................................................................7P 2.2 Evaluate your network design and analyse feedback in terms of Security, Redundancy,Availability, Scalability and Manageability................................................................................9TASK 3..........................................................................................................................................11P 3.1 Your design was accepted by the director and has asked you to build and configure theentire network. Your implementation should include...............................................................11P 3.2 Networks in terms of security should be tested rigorously. Systematically test anddocument the result showing the process of testing the network, including:...........................11TASK 4..........................................................................................................................................11P 4.1 Explain the Security System monitoring including physical and system level of accesssecurity showing your proposed management procedures......................................................11P 4.2 The ongoing network security requires continuous review and analysis of securitypolicies and practice. Analyse and recommend tools that can be used to monitor the network,use one of the recommended tools to produce baseline security report including (Patch &Security updates, IIS Security, Windows vulnerability, weak password, etc...........................12P 4.3 Recommend potential change management to improve on security and reliability ofyour designed network..............................................................................................................12CONCLUSION..............................................................................................................................13REFERENCES..............................................................................................................................14
INTRODUCTIONNetwork security is one of the greatest concerns in this modernised world becausetechnology have rapidly increased the variety of options towards the growth and development ofthe organisations. In order to efficiently perform all the tasks using the effective technology itneed to be highly protected as this have also increased criminal attacks on the highly confidentialdata. This study will be based on the Star up company i.e. Digisyst. This organisation consists ofonly 15 staff members who manages the work of almost three departments such as HR, Designand consultant developers. This study will help in designing a new network security solution inorder to provide secure the confidential information of the company. The report will alsoconcentrate towards the implementing the network security solutions which supports the datasecurity by using different types of wireless networking devices. The research will also providevarious features that help in effectively managing various network security solutions inorganisation.TASK 1P 1.1 Evaluation of the network design on the basis of physical and logical network securityThe network design for the company helps in maintaining the data security inorder to provide security to confidential information of the company. Network design in theDigisyst allows the flow of data which helps in providing the security to highly confidentialinformation of the company such as financial data etc. In order to introduce the wirelesstechnology in the company, Computer network engineer needs to adopt reliable and effectivetechniques to increase the number of users (Prasad and Prasad, 2005). Digisyst recently uses theexisting servers such as Domain name server, Web based network and email server which isfound to be a less reliable source to protect the data security of the company.As the company currently uses dedicated server for each department and these servers areaccessible in Digisysts using the internet connection. Due to the limited number of users in thecompany. Being a computer network engineer, it was analysed that existing network design ofthe company could not match the improved technology so it has to be continuously paramountfor the sake of growth and future development in terms providing additional functionalities toestablishing a powerful logical as well as physical network security within the Firm. Foraccomplishing the main objective of the organisation managers of the company need to isolatethe server distribution fatalities of the company with users might prove threat to the network
security of the Digisysts. For this purpose, logical and physical networking security need to beconverged that will include the implication of devices, services and IP addresses towardsestablishment of secured physical and local connection in the company. Such measures arelargely separated as below:Human resource and finance department need to establish an isolated network connectionfrom all the users to other types of group. This department need to develop 4 hosts inorder to separate the networks which help in reducing the constraints in the company.In order to reduce the server management, each server will be established as close to theserver which will be easily managed by the staff members.There is need to design and develop a wireless network which enable all the mobile usersin order to use the network.P1.2Potential security impact on the introduced networkNetworking technology allows the interaction of large number of users on a specificnetwork and therefore this needs a security in order to protect the confidential data from anunauthorised user (Border, 2007). Digisysts required to restructure their system security so thisinvolves a large risks factor that impacts on the introduced network security in the company.Implication of the latest networking policies in the company have large chances cyber attacksand these attacks can be ultimately affects the system security and it might decrease theperformance of the Digisyst.Being the network security engineer, one has to also focus towards determining variousinsights and disadvantages of the securing a huge network in an organisation. When the serversand workstations are redesigned considering various security threats to the network that supportsthe privacy of the confidentiality of data. Network security engineers have to carefullyimplement the networking technology by carefully considering attention to the dangers to theircomputers and networks.P1.3 Common types of network attacks, the threats and their impacts, your discussion shouldinclude up-to-date statistical information and in accordance to respected source ofinformationSocial networking have introduced various ways for promoting interaction betweendifferent users that also allows the use of data and secured network. So, Advancement oftechnology have also established various ways to protect such confidential data and information
Desklib Logo
You are reading a preview
Upload your documents to download or

Become a Desklib member to get access