Order For Similar Custom Papers & Assignment Help Services

Fill the order form details - writing instructions guides, and get your paper done.

Posted: February 1st, 2024

Implement a secure network infrastructure

Assignment – NETWORK SECURITY POLICY & INFRASTRUCTURE

Aim

To provide learners with opportunities to manage, support and implement a secure network infrastructure for a commercial LAN or WAN environment.

Learning outcomes

On successful completion of this unit a learner will:

1. Understand the impact on the social and commercial environment of network security design
2. Be able to design network security solutions
3. Be able to implement network security solutions
4. Be able to manage network security solutions

SCENARIO: Genesis Online Company

Genesis Online is a medium sized e-commerce company that sells student resources like books and pens online. On average, it has about 300 customers a day accessing the company e-commerce site.

Genesis Online has offices at three locations supporting a total of 250 employees. The company has a file and print server as well as a public web server that hosts the e-commerce website

The internal network for Genesis Online is logically divided according to the departments in the company. The departments include HR (Human Resources), IT (Information Technology), Accounting, Customer Service, Sales and Marketing, and Inventory.

The management of Genesis Online has decided that you should go ahead with the development of Project as detailed below:

Project :

Genesis Online requires a new security policy for the design, implementation and management of the company’s network security solutions. As part of the contract between your company and Genesis Online, you are also required to analyse the current network of Genesis Online and suggest alternative secure network designs.

The Genesis Online IT department has provided you with a diagram of the company’s suggested network layout. The network diagram, entitled Genesis Online Network, is attached below. You have been asked to review the design and provide technical support for the implementation of the proposed network. Genesis Online would like you to make suggestions on how the security of their network can be improved.

PART 1 – Network Security Concepts

Learning Outcomes

LO1: Understand the impact on the social and commercial environment of network security design

Instructions

Write a report to present the work for the following tasks to help Genesis Online management understand their current network security vulnerabilities and what can be done to counter them:

Task 1:

a) Study the Genesis Online Network diagram provided to understand their current system’s network security. Genesis Online uses an online form to collect customer payment information. They then use the information to manually request payments from banks and credit card companies of customers.

Evaluate thesecurrent processes and methods of implementing Secure Electronic Transaction for e-commerce applications that Genesis Online could possibly use

b) Upon further investigation into Genesis Online current system’s network security 3 issues were noted, which you are also mandated to resolve, thus:

a. Describe types of potential malicious threats and their impacts against the Genesis Online network to help its IT department understand how their network, especially its e-commerce website can be compromised. Identify and critically evaluate the security technologies, products and solutions that could be used to counter such threats

b. Homework help – Discuss the security measures that could be implemented to ensure messages passed over the LAN and the internet between remote users and Genesis online are not accessible to unauthorised users

c. The management of Genesis Online are concerned about having very little data on the security and usage of their network infrastructure equipment. Suggest and describe a network management tool that could be used to obtain such data on the genesis Online network.

c) Tunnelling protocols have assumed increased importance in the need to establish secure point-to-point communication over public networks to help create VPNs (Virtual Private Networks). Homework help – Discuss the potential impact of a proposed network design such as this, which embraces tunnelling and other options for creating VPN for secure data transmission across the Internet that could be used for Genesis Online network.

d) Write my Essay Online Writing Service with Professional Essay Writers – Explain what is meant by trusted and untrusted network, and DMZ (Demilitarised Zone). Homework help – Discuss the following types of firewalls: Packet filtering, State filtering and Application Layer Gateway (Proxy).

Part 2 – Security Design, Emulation, Testing & Evaluation

Learning Outcomes
LO2: Be able to design network security solutions
LO3: Be able to implement network security solutions
LO4: Be able to manage network security solutions

Instruction:
In relation to the network design provided and your proposed network security design in Part 1, Task 1c above, you are required to develop an IT Security Policy for Genesis Online. You need to gather the security requirements for the company by creating a list of questions that you will ask the genesis Online management team and its IT department to better understand the company’s security requirements.

Task 1:

• Using the security requirements gathered, explain and identify network boundaries, analyse and create a security policy for Genesis Online. Write my Essay Online Writing Service with Professional Essay Writers – Explain what is meant by Security Wheel and why it would be important to Genesis Online even after the new security policy is implemented.

Task 2:

• Before you produce a final network design for Genesis Online which is based on the network diagram specifications provided, try out possible site protection mechanisms that could be used to design the network

• Evaluate the design and analyse any feedback received from client workshops and/or meeting (including feedback from your colleagues/tutor)

Task 3:

• Using your proposed design, construct a complex network security solution

• Systematically test the complex network security solution, and evaluate live emulations for at least two (2) firewall/DMZ architectures

• Use a test plan to document your analysis and test results

Task 4:

• Provide evidence that you have/can manage a network security solution by performing the following change management and ICMP protocol activities with printouts in evidence:

Checklist

Yes

No

Tutor Sign

1

Backup and restore files

2

User group creation/deletion; user account creation/deletion

3

Design and develop login scripts

4

Install and/or update antivirus software; perform virus scan

5

Perform File clean-up

Understand and perform the following ICMP Protocol (echo-request) commands:

6

Ipconfig/all

7

Arp-a

8

Ping/ping-s

9

Tracert

10

Netstat

11

Nslookup

12

Pathping

13

Finger -l [user]@host

Order | Check Discount

Tags: Best Research Paper Topics for Examples, Dissertation App, Dissertation Topics for Students in, I need help writing a doctoral thesis online, I need help writing a page paper assignment

Assignment Help For You!

Special Offer! Get 20-25% Off On your Order!

Why choose us

You Want Quality and That’s What We Deliver

Top Skilled Writers

To ensure professionalism, we carefully curate our team by handpicking highly skilled writers and editors, each possessing specialized knowledge in distinct subject areas and a strong background in academic writing. This selection process guarantees that our writers are well-equipped to write on a variety of topics with expertise. Whether it's help writing an essay in nursing, medical, healthcare, management, psychology, and other related subjects, we have the right expert for you. Our diverse team 24/7 ensures that we can meet the specific needs of students across the various learning instututions.

Affordable Prices

The Essay Bishops 'write my paper' online service strives to provide the best writers at the most competitive rates—student-friendly cost, ensuring affordability without compromising on quality. We understand the financial constraints students face and aim to offer exceptional value. Our pricing is both fair and reasonable to college/university students in comparison to other paper writing services in the academic market. This commitment to affordability sets us apart and makes our services accessible to a wider range of students.

100% Plagiarism-Free

Minimal Similarity Index Score on our content. Rest assured, you'll never receive a product with any traces of plagiarism, AI, GenAI, or ChatGPT, as our team is dedicated to ensuring the highest standards of originality. We rigorously scan each final draft before it's sent to you, guaranteeing originality and maintaining our commitment to delivering plagiarism-free content. Your satisfaction and trust are our top priorities.

How it works

When you decide to place an order with Dissertation App, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.