Preview

Project 1

Satisfactory Essays
Open Document
Open Document
300 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Project 1
Bryan Kelly
02/09/2014
NW 306 Project 1 Deliverables: Two Diagrams, One Summary

Bryan Kelly
02/09/2014
NW 306

“Intro to Network Security”
Project 1: Network Diagram with Security Features Defense in Depth and Web Security Summary Report

The purpose of this summary is to explain the changes made in the to-be diagram from the previous as-is diagram. Also, to note the protective hardware added, and the justification for the changes made. The to-be diagram has been changed or altered to reflect a defense in depth approach. This diagram is upgraded with the addition of multiple security layers. This diagram has the removal of its wireless access points and the addition of VLAN subnetting for improving network performance and reducing network congestion.
Creating layers of firewalls and subnetting prevents other compromised devices from being used as an attack platform against the entire network. An additional firewall security layer is added to the two firewalls from the as-is diagram. This is a storage firewall to protect the back-up server. The back- up storage layer is an added layer of security that’s more controlled and will be less likely to security breaches from the other layers.
A DMZ network has been set up to add another layer of security. A DMZ is layered defense created to limit access deeper into the network. Connected to that particular firewall is the addition of a storage router, that makes it now three routers in the network diagram as oppose to the two routers in the as-is diagram. To ensure software countermeasures, the deployment of anti-virus and firewall software for servers and computers are implemented. Anti-virus software for servers would operate at the database layer while other antivirus and software firewalls would operate at the client layer. The use of a personal firewall protects each of the client machines, creating a virtual layer.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Multiple layers can be used to secure internal threats like keeping employees from accessing inappropriate material, update and patch workstations and run current anti-virus/malware on workstations daily. The layers also help mitigate external threats like hackers by using firewalls and shutting traffic out of the internal network.…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    -In reference to previous network plan U1A1 a firewall will be in place in the LAN/WAN Domain & System/Application Domain to protect internal network from potential external threats.…

    • 565 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Is3440 Project Part 1

    • 3157 Words
    • 13 Pages

    I would recommend that we use a "Defense in Depth" strategy, having multiple layers of access protection. We need to have an IDS/IPS on both sides of our edge firewall. The inside IDS/IPS will be used as additional protection for our network and the outside IDS/IPS will serve as an early warning system from attacks. We will also use the outside IDS/IPS for additional protection and to monitor what types of attacks are occurring. Our web server and mail server should be completely separated from the rest of our network in a de-militarized zone (DMZ). We need to have a network firewall between our DMZ and our internal network, between the outside world and our internal network, and between our DMZ and the outside world.…

    • 3157 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Between every network and the outside host of threats there is a first line of defense. For almost every network this will be a firewall. A firewall can be both hardware and software and is usually a combination of the two. A firewall creates a barrier between networks. Any outside computer or client must pass through the firewall to access the network or its resources. Only a computer or system that has proper access can easily access a network protected by a properly configured firewall. Though it is not infallible, a firewall is the first and perhaps best means of security…

    • 855 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    Firewalls are hardware or software-based network security system that controls the outgoing and incoming network traffic by analyzing the data packets and determining whether they should be allowed through or not based upon the settings. A firewall establishes a barrier between a trusted, secure internal network and another network that is not assumed to be secure and trusted. Many computers and other hardware such as routers and modems have built-in firewall capabilities. These firewalls can be effective with little or no configuration. Software firewalls can be installed on your computer and can be configured according to your needs. Many software firewalls have user defined controls for setting up safe file and printer sharing and to block unsafe applications from running on your computer. Software firewalls may also incorporate privacy controls and web content…

    • 498 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    a. Placing a firewall between two routers and another firewall before a DMZ would be the best requirement choice to use…

    • 928 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    I have been asked to implement a system design for Acme Manufacturing, linking all their computers to each other with a (WAN). The WAN network has all the features that all are used to in the current LAN. With the WAN network, employees are able to connect to another network remotely. As a system designer, it is my privilege to implement such a design. This document will show the design system in detail, with a follow-up section for someone that may have a system design question. I hope everyone will find this document informative as well as instructive.…

    • 1101 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Individual Vlan

    • 644 Words
    • 3 Pages

    Due to the changes happening within the company, expansion of the call center, employees moving around within the building, and employees moving off site there is a need for change to the network. Virtual Local Area Network (VLAN) is the most obvious choice because “the VLAN solution can help reduce costs by allowing us to purchase fewer router ports. It also gives us the flexibility of physically placing and moving our clients anywhere in the organization, while still including them virtually within their own subnet. We can also contain broadcasts within the network, thereby freeing up network resources. From a security perspective, it allows us very granular control of the network.” (McIntire, 2001)…

    • 644 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Justification: Since there is an influx of internet business, a secured router on each floor would provide the network administrator with a central location to complete the security administration while retain the ability to connect to the central servers on the primary hub. Additionally, a secured hub would provide functionality to encrypt data between the primary hub and each hub on each floor. This would provide additional security to business sensitive data.…

    • 874 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    5. How does your design provide security for ElectroMyCycle’s network? I will be doing security in layers; Firewalls, ACLS, Vlans, security policies, Anti-virus, Physical security, port parking, Monitoring software.…

    • 280 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    A job brief is the clients understanding of their requirements. You need to prepare a plan of your secured network for the client’s approval. A network design plan consists of the physical and the logical views of the network. A physical network is the hardware such as cables, switches, hub etc. A logical network is the addressing used to connect these devices…

    • 944 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Ccna3 Case Study

    • 4832 Words
    • 20 Pages

    The following case study is used to illustrate the process required for designing a redundant switched network. This case study presents a scenario in which XYZ Insurance Company has hired a Network Consultant Group to design their network. In order to help you organize this project, the scenario has been divided into phases listing the requirements for each task.…

    • 4832 Words
    • 20 Pages
    Satisfactory Essays
  • Better Essays

    Its main functions include protecting the network from Threats such as Denial OF Service and unauthorized usage.…

    • 754 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Chapter 8 Computer

    • 2419 Words
    • 10 Pages

    Once the hacker gains access to the network, four types of threat may arise. List and explain each of these four threats.…

    • 2419 Words
    • 10 Pages
    Good Essays