Order For Similar Custom Papers & Assignment Help Services

Fill the order form details - writing instructions guides, and get your paper done.

Posted: February 1st, 2024

Evaluate a current system network security

Programme Title: HND Computer System & Development

Assessment Title:  Video and Audio Components Ltd

Learning outcomes (Awarding body Specification)

  • Understand the impact on the social and commercial environment of network security design.
  • Be able to design network security solutions.
  • Be able to implement network security solutions.
  • Be able to manage network security solutions.

Assessment Research Topics – Criteria (Awarding body Specification)

  • Evaluate a current system’s network security
  • Homework help – Discuss the potential impact of a proposed network design
  • Homework help – Discuss current and common threats and their impact
  • Design a network security solution to meet a given specification
  • Evaluate design and analyse feedback
  • Using a design, implement a complex network security solution
  • Systematically test the complex network security solution
  • Document and analyse test results
  • Manage a network security solution
  • Analyse ongoing network security policies and practices
  • Recommend potential change management

Assignment Scenario

In today’s world of the internet and ecommerce, many companies lack the expertise and training to secure their critical network infrastructure and data.  Because of this fallacy, many companies’ infrastructures are subject to being compromised.  With extortion, cyber theft, malicious attacks and internal theft occurring at an unprecedented pace, many companies are just becoming aware of the aforesaid problems.  While a few companies and corporations awaken to a new world of problems, many continue to sleep, totally oblivious to what is happening as they go about their daily work.

Video and Audio Components Ltd (VAC) is a small company which specialises in the sourcing and distribution of high-end video and audio components for audiophiles and organisations which have large-scale, and sometimes complex, requirements for the components that they stock or can procure, including large flat panel TVs, surround sound systems of varying scale and complexity, and a huge range of accessories which can be connected to these.

Currently, VAC has an internal chain of supply that is networked using a local area network (LAN). So far, this has helped the company reduce costs and respond to customer orders quickly. Company communications and data relating to component stock planning, distribution, and support are increasingly being undertaken using this network, which the company is constantly upgrading to increase sales performance.

Although VAC’s supply chain data and company communications have been secure so far in accordance with its current size as a local area network, the company plans to significantly increase the size of its supply chain to include outside suppliers and customers, with whom it wishes to communicate using its current network and the new Wide Area Network (WAN) which will give it connectivity nationally.

Assignment Tasks

Task 1 –

This task concerns you understanding the impact on the social and commercial environment of managing a complex network security solution.

The general manager has requested that you discuss the impact on social and commercial environment of network security on VAC Ltd. (about 1500 words).

Section A: Your answer should include the discussion of the following:

Threats: Management of threats eg awareness, current threats, access policies

Social impact: Organisation trust eg data credibility, corporate trust, financial trust; social engineering; law enforcement involvement

Security policy: Review and management eg access to systems, forensic analysis of systems

Impact on productivity: Loss e.g., systems recovery, data recovery, loss of services; legal proceedings

Estimating risk: Penetration testing; audits eg internal and external; procedures eg contingency planning

Further compare and contrast 5 of the above elements

Material should be of appropriate levels and presented in a logical and accurate manner matching the stated requirements for each task.  Some use of referencing is made.

Make 3 recommendations for the importance of the Network Security

Independent research, outside that provided in course materials, has been utilised to prepare the work and appropriate assumptions are made and justified where detailed scenario information is not available

Task 2 –

This task concerns you being able to design complex network security solutions.

The general manager has requested that you use the following principles to design a network solution for VAC Ltd using CISCO Packet Tracer. (About 1500 words).

Section B: Your answer should include the discussion and design and implementation of the following:

LAN design: Technical response eg, MAC control, VLAN (Virtual Local Area Network) security, ARP (Address Resolution Protocol) poisoning, VLAN design; trunk design

WAN design: Technical response eg, access control lists, traffic filters, DMZ (Demilitarised Zone) management

Server deployment: Security needs according to server specification eg printer access, file management, data management, email

Border systems: Intrusion Detection Systems (IDS) eg firewalls filters and rules, application and packet monitoring, trust

User access: User group e.g., group membership, user group allocation, attribution of rights; rights eg file, server, service, data, hardware, printer, email

Physical security: Power resilience and supply; physical access control eg lock and key, electronic access control, biometrics; backup eg data, configuration, imaging; recovery policies

Implement IP Addressing on all your Devices

Material should be of appropriate levels and presented in a logical and accurate manner matching the stated requirements for each task.  Some use of referencing is made. Using annotated screen shots.

Implement Router Security and Wireless security on your devices

Independent research, outside that provided in course materials, has been utilised to prepare the work and appropriate assumptions are made and justified where detailed scenario information is not available using annotated screenshots.

Task 3 –

This task concerns using a given design to implement and manage a complex network security solution.

The general manager has requested some aspects of the network security applied to devices and troubleshooting process to be documented as a guidance for their technician. In this task you are given a copy of VAC’s current network on a USB (see below the diagram). This is fully set up and configured in Cisco Packet Tracer virtual tool. All branches are operational but configurations alone do not completely secure a network.  You are required to secure some critical areas of this network and its devices as listed below under section A. After applying these security solutions, the outcome needs to be checked, reviewed and fully documented (about 1500 words).

Section C:

Device hardening

Apply encrypted passwords to all routers and switches in VAC’s network. List commands used and produce screen shots of configuration files and enable access mode to show the outcome.

Configure Packet filtering

Currently everyone in Branch 1 has access to the FTP server in the server farm. This needs to be limited to only Branch1 admin Laptop. Use an ACL to allow access only from the Admin laptop while denying everyone else in that subnet. List the commands used and take screenshots to show the process involved in both access and fail connections to the FTP server.

Setup a remote secure tunnel

Use SSH to establish a secure remote access to one of the routers. List the commands used and take screenshots to show the process involved while attempting secure connection.

Section D: Configure a packet inspection security

The company has recently purchased a Cisco’s Adaptive Security Appliance (ASA5505) as a firewall and the general manager would like you to provide them with information, showing how to set it up with a packet inspection security between 2 VLANS. Use the following diagram to set it up in Packet Tracer, configure and document the results and any troubleshooting aspects.

• Provide some guidance on Software Restriction Policy

  • Research and list some potential vulnerabilities that could be exploited in a network environment.

Section E:

  • Evaluate one specific policy on the periodic review of user access (physical and system level).
  • Evaluate 2 commercial security audits e.g. source code analysers, password and encryption crackers, proxy tools.
  • Evaluate 2 changes in infrastructure/procedural management e.g. network device removal/addition and/or service/user group addition/removal.
  • Use a segment of your network security solution in Section B to deploy an IP management tool to monitor traffic, peak flow and user access patterns. Troubleshoot the process and produce relevant documentation.

Present and Communicate Findings

Material should be of appropriate levels and presented in a logical and accurate manner matching the stated requirements for each task. Some use of referencing is made.

Take responsibility for managing and organising activities.

Independent research, outside that provided in course materials, has been utilised to prepare the work and appropriate assumptions are made and justified where detailed scenario information is not available.

3000 words

Order | Check Discount

Tags: Best Research Paper Topics for Examples, Dissertation App, Dissertation Topics for Students in, I need help writing a doctoral thesis online, I need help writing a page paper assignment

Assignment Help For You!

Special Offer! Get 20-25% Off On your Order!

Why choose us

You Want Quality and That’s What We Deliver

Top Skilled Writers

To ensure professionalism, we carefully curate our team by handpicking highly skilled writers and editors, each possessing specialized knowledge in distinct subject areas and a strong background in academic writing. This selection process guarantees that our writers are well-equipped to write on a variety of topics with expertise. Whether it's help writing an essay in nursing, medical, healthcare, management, psychology, and other related subjects, we have the right expert for you. Our diverse team 24/7 ensures that we can meet the specific needs of students across the various learning instututions.

Affordable Prices

The Essay Bishops 'write my paper' online service strives to provide the best writers at the most competitive rates—student-friendly cost, ensuring affordability without compromising on quality. We understand the financial constraints students face and aim to offer exceptional value. Our pricing is both fair and reasonable to college/university students in comparison to other paper writing services in the academic market. This commitment to affordability sets us apart and makes our services accessible to a wider range of students.

100% Plagiarism-Free

Minimal Similarity Index Score on our content. Rest assured, you'll never receive a product with any traces of plagiarism, AI, GenAI, or ChatGPT, as our team is dedicated to ensuring the highest standards of originality. We rigorously scan each final draft before it's sent to you, guaranteeing originality and maintaining our commitment to delivering plagiarism-free content. Your satisfaction and trust are our top priorities.

How it works

When you decide to place an order with Dissertation App, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.