logo

Network Security | Task Report

   

Added on  2022-09-12

11 Pages661 Words21 Views
Running head: NETWORK SECURITY
Network Security
Name of the Student
Name of the University
Author’s Note
Network Security | Task Report_1
1
NETWORK SECURITY
Task 1 – Mapping Security Adjustment
The floor plan of Jim’s Trade Supplies (ITS) is evaluated for the development of the
network infrastructure and identify the network devices that would be needed to provide end to
end connectivity in different areas of the network. The floor plan helps in identification of the
number of users and the position for the installation of the network device. An estimation is
made on the coverage area for analyzing the number of access point that is needed to be
deployed for providing connectivity to the users. The floor plan layout is secured with the
addition of a partition in the floor and creating a DMZ zone for installation of the core network
device equipment’s and increasing the security of the network framework (Cuppens, Cuppens-
Boulahia and Garcia-Alfaro 2019). The DMZ zone adds an security layer in the proposed local
area network and it provides connectivity to the external nodes only the exposed devices in the
DMZ zone and the rest of the devices are behind the firewall. It isolates the sensitive devices
from the internet and thus helps the organization to get time for the detection of security breach
attempt made by a user and blocking them to access the internal resources. The network
infrastructure is developed after performing a detailed analysis of the ICT environmental and
physical security policy for its application (Perlman, Kaufman and Speciner 2016). The attempt
of unauthroised access is needed to be identified and the servers are needed to be secured such
that the risk of misuse of data by fraudulent can be eliminated.
An incident response plan is also needed to be created for taking action against violation
of security policy or in case of cyber security incidents. The routers and the other network
devices are needed to be password protected such that the risk of changes in configuration is
eliminated and the wireless access points are also needed to be configured following the security
policy of the organization and unauthorized access is needed to be restricted. Internet access
Network Security | Task Report_2
2
NETWORK SECURITY
policy is needed to be used for the configuration of the router and FTP protocol is blocked such
that files cannot be transferred in the network and the risk of data stealing is reduced. For
limiting the wireless network usage and improving the performance the maximum user is limited
to 27 and the coverage range is reduced to 100 meters. To wireless router is used one for
connecting the laptop and the other for connecting the mobile devices. The SSID broadcasting of
the wireless router is blocked such that it cannot be found by the mobile device users and it
provides dedicated service to the laptop users. The PCs are configured with DHCP to
automatically get the IP address from the router but the printer is assigned with static IP address
such that it can be access by the users as shared printer. The delivery staffs would only have the
access of the wireless network via the mobile phone and the mapping shows the use of
appropriate cables used for interconnecting the secure network equipment’s.
Network Security | Task Report_3
3
NETWORK SECURITY
Task 2 – Packet Tracer
Changing Router Password
Network Security | Task Report_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Design for Top Network Company
|11
|1135
|334

Advanced Network Design Name of the Student Name of the University Authors Note
|21
|3526
|196

IT Networking and Designing: Proposal for MonkeyNet
|11
|1524
|110

Technology Implementation of Security Controls Template
|14
|4879
|482

Network Design Report for ICT106 Data Communications and Networks
|10
|1566
|337

Network Security Implementation
|20
|3861
|478