Preview

Assess the Security Threats Facing Network Infrastructure

Good Essays
Open Document
Open Document
944 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Assess the Security Threats Facing Network Infrastructure
Design and implement a security system ICANWK601A

Case study Design and implement a security system

Project

Assess the security threats facing network Infrastructure
Evaluate mitigation methods for network attacks and different types of malware
Propose a methodical concept of defending network architecture
Network architecture defense
A job brief is the clients understanding of their requirements. You need to prepare a plan of your secured network for the client’s approval. A network design plan consists of the physical and the logical views of the network. A physical network is the hardware such as cables, switches, hub etc. A logical network is the addressing used to connect these devices
Job brief-secure wireless network for a coffee shop
You need to install a wireless network for a coffee shop. They require certain network devices such as a firewall, router computers etc. It is a coffee shop where they want a wireless access point for their customers to login while drinking coffee. They have an Cisco approved wireless access point that you can use. They also require computers for front and back of desk. They require a server and hard drive backup with offsite storage capability.
They have given you a floor plan layout of the coffee shop (Coffee shop.pdf). You will need to construct an elevation plan.
Wireless networks have strengths and weaknesses. A strength is the flexibility as there are no wires making it easier to install. There is no need for wall outlets with hidden cable. The weaknesses are security, speed and interference.
Security solution documentation

Performance criteria
Written reports using the following headings
Assess the security threats facing network Infrastructure
Secure edge devices (routers)
Implement authentication, authorisation and accounting (AAA) and secure access control system (ACS)
Mitigate threats to routers and networks using access control lists (ACLs)
Implement secure network management

You May Also Find These Documents Helpful

  • Good Essays

    NT 1310 Unit 5 LAB 1

    • 417 Words
    • 2 Pages

    If I choose to use a wireless network in the designing of the new building the obvious benefit is a wireless network is neater. This means getting rid of all those unsightly cables that usually run around a building. The mobile computers do not need to be tied to an Ethernet cable and can roam freely within the WLAN range. By using wireless network it is vital that users have access to the network from anywhere in the building and that means giving them wireless access. As well as being able to use their own devices, wireless infrastructure means freedom to move around the building, from meeting room to meeting room.…

    • 417 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Week 4 INDP NTC 362

    • 821 Words
    • 3 Pages

    Wireless Networks connect devices without wires, some examples are cellular networks, Wi-Fi networks or terrestrial microwave networks. Wireless LANSs (WLAN) usually connect devices that are very close to each other using the IEEE 802.11 WLAN standards that are marketed under the Wi-Fi name. Kudler plans to utilize WLANs in each location to connect their office computers and printers to the main network. A wide area network will be setup to connect each locations LAN enabling the centralization of the company’s servers and afford real time access to database information.…

    • 821 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Activity 1

    • 667 Words
    • 3 Pages

    Although the freedom to roam the facility and always be connected to the LAN can be a great advantage for network users, the amount of support needed to manage the system and users is much higher than that required by a wired network. Due to the broadcasting nature of a wireless system, security is an important concern and provisions should be made for guest / unauthorized users to use the system in a limited and controlled way. Additional support by the IT Team is often required to configure a user to use the wireless network, to ensure the wide variety of hardware will work with the College’s wireless system, and to provide Help Desk support for wireless…

    • 667 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    The new location in South Dakota will need an Internet modem and wireless router. The modem will be used to connect the office to the Internet, and the router will be used to connect the workstations of the new locations together to create a LAN. A wireless router will allow authorized users to connect to the network from a wireless device. The settings in the router itself will be used to control what devices can connect to the network by using MAC filtering. User account controls will be set on all workstations to control which users have access to sensitive materials.…

    • 2001 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    a. Wireless networks are less secure than wired networks, both in terms of access and in terms of user information. Because the information to and from the computer is broadcast instead of traveling over a wire, it is much easier to intercept.…

    • 807 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 8 Questions

    • 306 Words
    • 1 Page

    6. Connecting network elements by radio waves instead of wires presents many challenges. From the reliability standpoint, it is difficult to predict a priori the dependable coverage of a wireless network radio inside a building. Wireless LANs broadcast data into space, where they can be intercepted by anyone with the ability to listen in at the appropriate frequency.…

    • 306 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Wireless networks have become very popular in many households this is in part because it makes things convenient for the user. They physically do not have to sit in front of a computer to get access to it. I have a wireless network in my home and it is at times very useful. I have the freedom to move around and access the internet from anywhere in my home. I do not have to sit in front of my computer and use the computer which would be wired. With that one advantage will also come a disadvantage one that comes to mind is video streaming which would be a little stronger coming from a wired network. New security has been configured also and would make it hard to access as it would have to be in a certain operating distance. In doing my research I came across a variety of hotspots. These hotspots are businesses that will offer wireless internet access to its customers. Some of these businesses will offer this access free while you are in their establishment others will offer a paid service fee for the privilege to access the internet. In my research I found that one establishment The FedEx Office requires a fee of $29.99 a month to use it wireless networks. Two others that I researched the local train station and a Dunkin Donuts offers its customers free wireless access. All three also provide a user agreement and in that agreement it states that the establishment is not responsible for the user content and is not liable for what downloads that the user will…

    • 281 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The management of Riordan Manufacturing has requested an analysis of adding wireless technology to the existing wide area network (WAN). The organization's goal in considering wireless technology is to keep the network current while controlling costs. The purpose of this document is to provide a basic understanding of wireless technology and outline what the organization must consider in determining the viability of wireless within the organization.…

    • 929 Words
    • 4 Pages
    Good Essays
  • Good Essays

    iLab 6

    • 403 Words
    • 2 Pages

    What are the three primary methods for implementing security on this network, as well as the…

    • 403 Words
    • 2 Pages
    Good Essays
  • Better Essays

    2. For the client situation described in Discussion Topic 1, use Microsoft Visio 2007 to generate a diagram for a proposed network design. Write a 1-2 page proposal for the research group explaining why that design would best meet their needs.…

    • 925 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Security is a fundamental aspect of any network infrastructure. The goal is to always have the most up to date programs and protocols to ensure the protection of the network. No aspect is too small to over look. That could mean the difference between a secure network and a compromised network. The best way to achieve this is to break down every level and approach each one as a separate entity and secure it. Then you can modify it to suit the needs of your network.…

    • 1508 Words
    • 7 Pages
    Good Essays
  • Good Essays

    The 16 critical infrastructure sectors identified by the Department of Homeland Security (DHS) include; Chemical, Commercial facilities, Communications, Critical manufacturing, Dams, Defense industrial base, Emergency services, Energy, Financial services, Food and agriculture, Government facilities, Health care and public health, Information technology, Nuclear reactors, nuclear materials, and waste, Transportation systems, and Water and wastewater systems. Technological advancement, increasing use of the internet, coupled with the interdependencies of information technology had and continue to have a direct effect on critical infrastructure attacks. These attacks and threats unfortunately have grown and sophisticated level of cyberattacks…

    • 323 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Incident response begins with prevention and security awareness (figure 1). In the case of malware attacks such as viruses, worms or Trojan horses, defense-in-depth plays a large role in the defense and early detection of potential threats to information systems connected to the internet. Personnel utilizing these assets also play a large role in defending and protecting these assets. Authorized users should be aware of all policies and procedures pertaining to the proper use of all networks, applications, and systems within the organization. The frequency of incidents can be greatly reduced through user awareness (Whitman, Mattord, & Green, 2014).…

    • 805 Words
    • 3 Pages
    Good Essays