BN203 Network Security

Hello, this question is here because we've worked on this and other similar assignments. If you don't know the answer, you can ask us for help. We guarantee an original paper free from Plagiarism.

Order a Similar Paper Order Different Paper

We got you covered for the whole semester.

Question:

You are a Network Security architect at B2B solutions and you manage a team consisting of Network Administrators.

B2B Solutions is a medium-sized organization and is currently expanding.

Six sites were acquired by the company in Melbourne to house its different departments.

The company has asked you to create a secure network at six sites.

You will need to make sure that data flows across networks are secure and that web-based filtering is used.

A role-based access system for each department is another requirement.

To join the networks, the network must span six buildings and each building should have a router.

It is expected that each building will have its subnet.

With approximate numbers for each building, the company anticipates 500 workstations on all the sites.

Finance Office – 100 workstations

Transport Office – 50 workstations

Research Office – 25 workstations

Sales Office – 25 workstations

Information technology – 250 workstations

50 workstations in the Head Office

Write a report regarding a secure network plan, including the following:

Create a network layout for the scenario above.

(Include a block diagram of each SITE.

What are the security risks to a network without security?

Take down all assumptions that you made when designing a secure network.

Name of security network device, along with series, manufacturer and type of cables, are required for the project hardware.

List the cryptographic standards your Prosed Networking devices can use for security.

Use cryptographic algorithms for justification of the proposed secure network design.

Answer:

Introduction

The report includes information about the network design of the B2B solution.

As the Network Security Architect, I have been given the role of Network Administrator. This is where I design the company’s network.

The company plans to implement a subnet system for its network. It would divide the network into six sections and increase security and authentication.

This report includes information about the company’s network layout and sub-networking requirements.

This report includes information about the network and a brief discussion.

This report provides details about the network as well as the hardware requirements to construct the network.

Requirements for Networks

B2B company wants to improve security and thus the network structure.

The company has provided information on the network type they want to establish for their offices as well as the various departments.

The network must be sub-netted into six sub nets.

The various departments of the company include the finance office, head office, transport, research, sales, information technology, and the head offices.

The company also provided additional requirements regarding the network to me, as I am the network’s designer.

The company would like to have around 500 workstations installed in their networks.

The following criteria will be used to determine the layout of the network.

Finance Office – 100 workstations

Transport Office – 50 workstations

Research Office – 25 workstations

25 Workstations in the Sales Office

Information technology – 250 workstations

50 workstations in the Head Office

The company also plans to create a sub network system within its organization. It would be fully secure logically, as well encryption techniques, so that authentication within the network can be maintained.

Description of The Security Network

This network solution can be divided into six different sub networks.

Below you will find information about subnetting techniques that are used on physical networks and a logical calculation for the network.

Major Network 10.0.0.0/22

Available IP addresses within major network: 1022

500 required IP addresses

564 IP addresses available in subnets allocated

Around 56% is used for major network addresses.

Nearly 89% of subnetted networking address space are used.

Name of subnet

Size Required

Allocate Size

Address

Mask

Assignable Range

Broadcast

This configuration would be applied to the network. It would allow sub-netting of the network.

Network Security Risks

The implementation of a network within a company can present many risks.

The following are the most likely risks to occur in a network:

Data breaches: There can be many data breaches within the network.

It is possible for data theft to occur within the network.

Data can also be compromised and altered within the network.

Information about the organization may be leaked. This can lead to serious problems.

Employee Theft: Data from within an organization can be leaked by employees.

The company’s data can be obtained and handed to a rival organization. If they have access to the network, they are able to easily launch a DoS attack against the network.

Weak Access Controls: A weak access control in the network could allow attackers easy access. They could perform the man-in-the middle attacks within it to obtain sensitive data. Security within the network would also be compromised.

Privilege misuse: There would be different levels for authentication, so different staffs would have different privileges.

The staff would have the opportunity to misuse these privileges.

The company’s requirements and risks were taken into consideration before designing the network.

It was assumed that the subnet 10.0.0.0/21 would be used to build the network.

This is in addition to the fact that additional systems could be installed in the network. Therefore, the potential for the installation and maintenance of additional machines within this system was also assumed.

The Network’s Hardware Requirements

Cisco SPA122 Small Business ATA With Router is being used for the implementation of the network.

These routers are a Cisco product.

Each router is approximately $1000.

The CAT5 cables are also available to connect the router to the machine.

To spread the network across six different departments, and within the departments, additional switches would be required.

The D-Link 24-port switches can be used in this network. They cost around $150 each.

Justification For The Network Design

The company will direct the design of the network. They also provide the criteria.

This design helps to ensure that the network is secure and can be used to divide it into six different divisions.

The network design could be used to provide authentication for systems. This would also help in avoiding external intrusions into the networking system.

Below are the sub-divisions of the network:

Information Technology- 10.0.0.0/24 255.255.255.0 10.0.0.1- 10.0.0.254 10.0.0.255

Finance Office- 10.0.1.0/25 255.255.255.128 1.0.0.1.1 – 10.0.1.126 11.0.1.127

Head Office- 10.0.1.128/26 255.255.255.192 100.1.129 -10.0.1.190 100.1.191

Transport Office – 10.0.1.192/26 255.255.255.192 10.0.1.254 10.0.1.255

Research Office- 10.0.2.0/27 255.255.255.224 10.0.2.31

For the protection of data packets within the network, firewalls are also installed.

Networks can also be equipped with encryption and decryption tools.

The network is protected by the 3 DES encryption algorithm.

Conclusion

In conclusion, it is important to ensure that any network is secure.

The main concern in our report concerns the B2B business and how they plan to implement a subnetwork.

I am the Network Security architect and have been given the role of Network Administrator. This is where I design the company’s network.

This report includes information about the company’s network layout and sub-networking.

This report includes information about network design, as well as a discussion about network design.

This report provides details about the network as well as the hardware requirements to construct the network.

Image Cryptography Using RSA Algorithms in Network Security.

International Journal of Computer Science & Engineering Technology. 5(9).

Bhatia (P.) and Sumbaly (R.), 2014.

Framework for wireless network security via quantum cryptography.

Gill, M., and Kakkar A.G.

Joshi, M.R.

Cryptography is a method of securing networks.

Kapoor V. and Yadav R., 2016.

International Journal of Computer Applications (0975 -8887) Volume.

Kumar, A., and Bose S. 2017.

Security and cryptography.

Pearson Education India.

Manshaei M.H.. Zhu Q.. Alpcan T.. Bac?ar T. and Hubaux J.P.

Game theory meets network security, privacy and privacy.

ACM Computing Surveys (CSUR), 45(3). p.25.

W. Stallings; Tahiliani M.P.

Principles and practice of cryptography and network security (Vol.

Van Tilborg H.C. & Jajodia S.

Encyclopedia of cryptography & security.

Springer Science & Business Media.

If you don't know the answer to this question, you can ask us for help. We guarantee an original paper free from Plagiarism.

Order a Similar Paper Order Different Paper

You can trust us with any of your assignments. We got you covered for the whole semester. We dedicate one writer to do all your assignments

Leave a Reply

Your email address will not be published.