Log Analysis - SolutionTech Consulting Services Case Study - Active Attacks and Passive Attacks - Network Security Assignment Help

Download Solution Order New Solution
Assignment Task:

Assessment 1 - Knowledge Assessment (Written Tasks) 
1.1
What are the network threats to consider? How can an enterprise achieve the right level of security? 

1.2 Identify what Security Goals in Network Security you need to consider while design and deploy a secure perimeter? List some examples of Active Attacks and Passive Attacks. 

1.3 Explain in detail Windows Firewall with Advanced Security? What Can Be Monitored from the Windows Firewall with Advanced Security? How to Manage Existing Windows Firewall Rules? How to Create an inbound and Outbound Rule for the Windows Firewall? 
 
1.4 Discuss VPN according to Protocol scalability and Device scalability considerations to assess your needs? 

1.5 An organization is considering conducting a network perimeter penetration test based on general industry concerns. What is a Security Audit and Penetration Test? Discuss Key Benefits of Security Audits and Penetration Tests? 

1.6 Discuss different perimeter security solutions? 

1.7 Why it is important to back up network configuration? How you will do that, discuss with an example? 

1.8 What is Log Analysis? How does log analysis work? Point out the purposes of Log analysis? 

1.9 Because of digitization rules the technical world, it’s important for organizations to design security mechanisms for their network infrastructures. Discuss. 

1.10 Explain how mobile devices and emerging applications can create weaknesses in installed perimeter design. How might these weaknesses be addressed? 

Requirements 
Read the case study carefully then answer the questions following. You may assume any information that has not been mentioned in the case study, however, any assumptions you make must be clearly identified as assumptions.

 
Case Study: Penetration Testing 
SolutionTech Consulting Services is a company that provides IT services to local businesses. It employs 250 people. They want to deploy the latest technological advancements to their office. 
At its main site (HQ) it has a small server room (in-house datacentre) provision of 10 servers to provide authentication and directory services, resource sharing, printing and hosts two large database systems. 
They have 3 department sales capacity needs of 200 hosts including wifi users, Research with 50 hosts and management with 25 hosts. Additionally, they need an in-house datacentre of 10 servers. 
SolutionTech will procure their new router and switches to manage their network. 
Their current internet connection is provided by an ISP (Internet service provider) with public IP (88.40.12.0/30) and a private DNS (10.10.10.1/24). They are planning to keep the service with the same provider service for their new network. 
Currently, they don’t have any security perimeter implemented at their network and they are planning to use 172.16.10.0/23 IP address block for their new network. 
2.1 Identify some threats to SolutionTech perimeter security? 

2.2 Develop Network design for SolutionTech considering a secure perimeter and explain your design considerations? (You may use any network design software, A demo design provided here to give you some idea) 

2.3 Deploy the network for SolutionTech to meet perimeter security requirements by cisco packet tracer? (Show related device configuration) 
• Build Network topology 
• Connect all devices using the correct type of cables 
• Configure layer 2 switches (Trunk Links, VTP, VLANs, and Sub-interfaces) according to their requirements. 
• Show IP address allocation for all departments (Static and DHCP) 
• Configure routes (Routing to connect internet and intranet, DHCP pool for departments) and wireless Access point, DNS and Webserver 
• Annotate the diagram (including IP Addressing) 
• Configure username and password and privileges levels in SolutionTech’s switches and routers 
• Configure password encryption, idle timeout, login blocking, and a banner 
• Configure telnet remote access 
• Configure switch ports Port security. 

2.4 Configure following additional security feature in SolutionTech’s Edge Router 
• Configure SSH (Secure Shell) protocol for remote login. 
• Configure access control lost to prevent sales Dept. to ping the DNS 
2.5 Configure a remote access VPN to access SolutionTech's network from the outside world. 

2.6 Test and show all your configuration to your Assessor for acceptance (Additionally, attach your test screenshot). 

This Network Security Assignment has been solved by our Network Security Experts at My Uni Paper. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our experts are well trained to follow all marking rubrics & referencing style.

Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

Get It Done! Today

Country
Applicable Time Zone is AEST [Sydney, NSW] (GMT+11)
+

Every Assignment. Every Solution. Instantly. Deadline Ahead? Grab Your Sample Now.