logo

Threats in Information Technology Network Study

   

Added on  2020-04-07

9 Pages1792 Words86 Views
Table of Contents1.Introduction.......................................................................................................................................22.Network Design Project Scope..........................................................................................................23.Security Threats.................................................................................................................................24.Secure Network Design.....................................................................................................................35.Hardware requirements and devices................................................................................................66.CIAA...................................................................................................................................................87.Conclusion..........................................................................................................................................88.References..........................................................................................................................................91

1.IntroductionThe present IT infrastructure of B2B Company will be investigated. The exisiting threats of the present network will be studied. The secured network design with necessary IP addressing , hard ware and software requirements will be studied. The network devices that are needed to implement the secured network design will be explained briefly. Network diagrams and IP addressing designs will be made.2.Network Design Project ScopeThe network planning[1] by keeping security as one of the important parameters.B2B company has six departments and the requirement is a router across each department and hence the network is designed with 6 routers and these six router share 500 workstations. Finance department has 100 workstations. Transport office has 50 workstations. Research office has 25 workstations. Sales office has 25 workstations. Information technology has 250 workstations. The head office has 50 workstations. Security devices are provided in layers to implement the safe handling of the network. As a network security architect, the criteria to be implemented are taken into consideration. The network is designed in such a manner that it has proper flow of information [2]. To implement the confidentiality, the network is protected or crypted with passwords. Web based filtering is also implemented by using proper certified website through a web filter and also by blocking the insecure sites. Role based access control is also implemented in the network. RBAC is used to aid the users perform specific tasks according to the departments. The network also has IPS, firewall and webservers[3].3.Security Threats A security threat[5] is nothing but a risk that can create harm or damage the network's working environment. The threat mostly comes in the form of a software threat. There are many threats that can affect the network. Some of the security threats areRansom wareSoftware vulnerabilitiesHacktivismOnline hackingCloud attacks2

The threats may also come in the form of virus, Trojans. DoS attack is nothing but the denial of service attack that is used to create data traffic artificially and can make a server drown very easily. The threats can also be categorized into physical and non-physical threats. The physical threats are nothing but the threats that cause damage to the devices. The types of physical threats are internal, external and humans. Nonphysical threat is the one that creates loss of data or information. The nonphysical threats are also called the logical threats. The logical threats aremore dangerous.4.Secure Network DesignSecurity is considered as a major factor in designing the network. More layers of security are provided. The first layer of security is provided by the VPN[7][8]. The second layer of security isprovided by the firewall. The third layer of security is provided by IPS. VPN diagram is shown below.InternetVPN TunnelIP Address[External]192.168.1.10IP Address[External]192.168.1.1/30IP Address[External]192.168.3/30IP Address[External]192.168.2.25/30Open VPN IP192.168.2.241255.255.255.0Open VPN clientOpen VPN Server192.168.5.86255.255.255.0192.168.5.252[Internal]192.168.2.1/24[Internal]193.10.5.250/24192.168.5.136255.255.255.0192.168.5.172[Internal]192.168.3.121/24[Internal]192.168.5.250/24192.168.3.240Tunnel point 1Tunnel point 23

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
The B2B Solution Secure Network Design
|10
|1808
|272

Network Design Proposal for XYZ Retails
|15
|873
|395

ICTNWK509 Design and Implement a Security Perimeter for ICT Networks | Assessment Task
|12
|877
|15

Presentation on VPN Networks
|14
|743
|173

Virtual Private Network Implementation for PenCapital Organization
|14
|1505
|144

AgroXYZ Network & Communications Presentation
|13
|902
|79