BIT243 Network Security: A Comprehensive Network Security Report
VerifiedAdded on 2023/04/20
|15
|873
|395
Report
AI Summary
This report outlines a proposed network design and security implementation for XYZ Retails, addressing vulnerabilities in their current LAN-based system. The proposal includes network planning, hardware and software requirements, security measures (like firewalls, IDS/IPS, and encryption), disaster recovery strategies, and cost analysis. It emphasizes cyber-security standards, data integrity, and business continuity, aiming to improve security, data backup, and network scalability. The report also covers testing methodologies and provides references for further information, ultimately suggesting a more secure and scalable network infrastructure for XYZ Retails. Desklib provides solved assignments and past papers for students.

Computer-
Networks
A connected group of
computer systems.
Networks
A connected group of
computer systems.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Content
Introduction
XYZ retails current network
Network planning
Inventory of network devices
Necessary Software Required
Security implementation
Disaster recovery & cost analysis
Proposed Network design
Implementing new network
Training and education
Introduction
XYZ retails current network
Network planning
Inventory of network devices
Necessary Software Required
Security implementation
Disaster recovery & cost analysis
Proposed Network design
Implementing new network
Training and education

Introduction
This proposal of network design will
provide security to the XYZ retails from
different types of the cyber-attacks
This will provide flexibility in these
areas
Security
Data backup
Network scalability
This proposal of network design will
provide security to the XYZ retails from
different types of the cyber-attacks
This will provide flexibility in these
areas
Security
Data backup
Network scalability
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Present network of XYZ Retails
Present network is not having a proper
connectivity. All the departments are
based on the Local Area Network s(LAN)
There is no proper security in the their
network from the public network
Basic network devices are used to
connect system using LAN’s and internet
They have three store in a same city but
not connected separately
Present network is not having a proper
connectivity. All the departments are
based on the Local Area Network s(LAN)
There is no proper security in the their
network from the public network
Basic network devices are used to
connect system using LAN’s and internet
They have three store in a same city but
not connected separately
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Network Planning
Milestone #1 : Find basic requirements
Milestone #2 : Inventory equipment, such as
servers, and networking device
Milestone #3: find required software to solve
security issues
Milestone #4 : Networking and configuration of
servers as well as configuration of network
devices
Milestone #5: user’s permissions and
performance check
Milestone #1 : Find basic requirements
Milestone #2 : Inventory equipment, such as
servers, and networking device
Milestone #3: find required software to solve
security issues
Milestone #4 : Networking and configuration of
servers as well as configuration of network
devices
Milestone #5: user’s permissions and
performance check

Hardware requirements
Audit for network devices
Usages of current network devices
New network devices
Calculate basic things, such as number
of systems, servers, cables, connectors
and many more (Dye, McDonald, & Rufi,
2007).
Audit for network devices
Usages of current network devices
New network devices
Calculate basic things, such as number
of systems, servers, cables, connectors
and many more (Dye, McDonald, & Rufi,
2007).
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Network devices inventory
Servers
• 10 print servers
• 1 web servers
• 1 application server
• 1 servers (Linus
based)
• 1 directory server for
the Windows server
2016
• 1 database server
Workstation
• 94 workstations
• 25 print
Need of network
devices
• 20 switches
• 10 routers
• 10 DSU/ CSU
(Certiology, 2018).
Servers
• 10 print servers
• 1 web servers
• 1 application server
• 1 servers (Linus
based)
• 1 directory server for
the Windows server
2016
• 1 database server
Workstation
• 94 workstations
• 25 print
Need of network
devices
• 20 switches
• 10 routers
• 10 DSU/ CSU
(Certiology, 2018).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Software Requirements
All nodes will be configured in same
manner (Dosal, 2018).
Antivirus, Microsoft office 2016, backup
utility installed in each node
Basic applications will installed in all the
nodes, such as retail software, SQL, and
Fedora 8 and connect all the location via
VPN
All nodes will be configured in same
manner (Dosal, 2018).
Antivirus, Microsoft office 2016, backup
utility installed in each node
Basic applications will installed in all the
nodes, such as retail software, SQL, and
Fedora 8 and connect all the location via
VPN

Security Implementation
Cyber-security standard will implemented , such as ISO/IEC
27001 to prevent from cyber-attacks
Firewall configuration with high security and security
policies (Forouzan, 2007)
public key encryption
Data Integrity, Confidentiality
Non-Repudiation
Remove vulnerabilities
identity management
digital signatures
Access Control
Authentication
Cyber-security standard will implemented , such as ISO/IEC
27001 to prevent from cyber-attacks
Firewall configuration with high security and security
policies (Forouzan, 2007)
public key encryption
Data Integrity, Confidentiality
Non-Repudiation
Remove vulnerabilities
identity management
digital signatures
Access Control
Authentication
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Firewall and IDS/IPS
Firewall: it is used for the network security from
suspicious packets from outside of network. it filter
all the packets, which are coming from outside of
network.
IDS: it is a system that have special instruction to
detect suspicious activities in the network and
inform about it to the network administrator
IPS: Instruction protection system is used to secure
network from internal and external threats. It find
out suspicious things in the network and make them
in a list, which are trying for unauthorized access.
Firewall: it is used for the network security from
suspicious packets from outside of network. it filter
all the packets, which are coming from outside of
network.
IDS: it is a system that have special instruction to
detect suspicious activities in the network and
inform about it to the network administrator
IPS: Instruction protection system is used to secure
network from internal and external threats. It find
out suspicious things in the network and make them
in a list, which are trying for unauthorized access.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Disaster Recovery
Business continuity: data and information
are so important for business continuity
(Cowley, 2012).
Installed new hardware
Backup of all the data in data centers and
backup servers
Software patches
Implement legal things
Disaster recovery benefits
Business continuity: data and information
are so important for business continuity
(Cowley, 2012).
Installed new hardware
Backup of all the data in data centers and
backup servers
Software patches
Implement legal things
Disaster recovery benefits

Network design proposal
Benefits of new
network
Scalability of business
Data center and
backups
Multiple networks
Cyber security
Remote access for IT
administrator
(Lammle, 2011).
Benefits of new
network
Scalability of business
Data center and
backups
Multiple networks
Cyber security
Remote access for IT
administrator
(Lammle, 2011).
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 15
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.