This question has been answered
Question

ICTNWK509 Design and implement a security perimeterBackground

(pratical project)

Ford Pty Ltd is big enterprise company that manufacture and supply electronic good all over Australia. It has manufacturing plant and sales office in Brisbane as the Head office. Ford Pty has enterprise network with the basic infrastructure. The basic network has Server side, client side, wireless and remote access aspects.

Ford Pty Ltd is going through recent changes and wants to upgrade its security so that any security breaches won't occur in the future.


This assessment task requires the design and implementation of a network security perimeter on a network simplified as follows in a simulated environment:




wqerqwrwe.png




Task-1 Identify threats


In this task you are required to identify security threats and solutions in the given network. This security threat can be described for following aspect of the network:


⦁   Edge devices in the network like Router and Switches

⦁   Servers like DNS, Exchange, Web

⦁   Data flowing across the network.

⦁   End User aspect like Application, Individual Host.

⦁   Wireless devices and mobile devices in the network.


Task-1A


For the given network analyse and determine different threats. Research about different threats that exist in the network and fill the following table


Network Devices    Threats

  1. Edge Devices as Router and Switch  -   <Write determined threats here>
  2. DNS, Exchange and Web Server   -  <Write determined threats here>
  3. Data in the transit (flowing data)    - <Write determined threats here>
  4. Host devices/ End User Devices  -   <Write determined threats here>
  5. Wireless Connection and Devices   -  <Write determined threats here>




Task 1B


In any Enterprise environment Threats to the Network should be minimized. From the Task - 1A you have identified Threats to the Network. Now find the solution to the threats and suggest the ways to minimize them considering the perimeter security. After the research fill the following table with the required solution for the respective threats.


Threats Identified   -  Solutions to the Threats


<Write threats determined in the Task 1A here> -   <Write determined solutions here>

<Write threats determined in the Task 1A here>  -  <Write determined solutions here>

<Write threats determined in the Task 1A here>  -  <Write determined solutions here>

<Write threats determined in the Task 1A here>   -  <Write determined solutions here>

<Write threats determined in the Task 1A here>   -  <Write determined solutions here>

<Write threats determined in the Task 1A here>   -  <Write determined threats here>




Task-2 Develop the design


In this task you are required to design Network Infrastructure considering perimeter Security. Your design must minimize the analysed threat using solution provided in the Task-1.


To design the suggested Network, you can use Microsoft Visio or https://www.draw.io/ (Online Diagram Software) or Packet Tracer.


<Write Response Here>

Image transcriptions

Wireless-01 Router-01 SMB Internet Servers ISAServer-01 Clients Remote During this whole task you need to consider layered security enterprise architecture. 8 Internal devices 7 Internal network O 6 5 Host-based IDS 4 Internal Web proxy firewall 3 DMZ(S) Host-based FW Network Access 2 Stateful Control application firewall @ 1 Security router O Host-based DNS Network AV Intrusion Detection (IDS) www Layered security-enterprise architecture

Answered by Expert Tutors
Step-by-step explanation
Wireless-01 Router-01 SMB Internet Servers ISAServer-01 Clients Remote During this whole task you need to consider layered security enterprise...
Get unstuck

378,310 students got unstuck by Course
Hero in the last week

step by step solutions

Our Expert Tutors provide step by step solutions to help you excel in your courses