Assess the Security Threats Facing Network Infrastructure

Good Essays
Design and implement a security system ICANWK601A

Case study Design and implement a security system

Project

Assess the security threats facing network Infrastructure
Evaluate mitigation methods for network attacks and different types of malware
Propose a methodical concept of defending network architecture
Network architecture defense
A job brief is the clients understanding of their requirements. You need to prepare a plan of your secured network for the client’s approval. A network design plan consists of the physical and the logical views of the network. A physical network is the hardware such as cables, switches, hub etc. A logical network is the addressing used to connect these devices
Job brief-secure wireless network for a coffee shop
You need to install a wireless network for a coffee shop. They require certain network devices such as a firewall, router computers etc. It is a coffee shop where they want a wireless access point for their customers to login while drinking coffee. They have an Cisco approved wireless access point that you can use. They also require computers for front and back of desk. They require a server and hard drive backup with offsite storage capability.
They have given you a floor plan layout of the coffee shop (Coffee shop.pdf). You will need to construct an elevation plan.
Wireless networks have strengths and weaknesses. A strength is the flexibility as there are no wires making it easier to install. There is no need for wall outlets with hidden cable. The weaknesses are security, speed and interference.
Security solution documentation

Performance criteria
Written reports using the following headings
Assess the security threats facing network Infrastructure
Secure edge devices (routers)
Implement authentication, authorisation and accounting (AAA) and secure access control system (ACS)
Mitigate threats to routers and networks using access control lists (ACLs)
Implement secure network management

You May Also Find These Documents Helpful

  • Better Essays

    Network Infrastructure

    • 2917 Words
    • 12 Pages

    Executive Summary 3 Site Survey 4 WLAN Security 5 Beta Testing 7 Equipment 8 Budget 12 Conclusion 12 Bibliography 14 Appendix A: TECHNICAL TERMS 15 Executive Summary The Athletes Shack (TAS) is a chain of sporting goods stores that is looking into adding a wireless network (WLAN) to their current network. TAS has 10 retail distribution stores in the area and would like all the stores to be able to see live inventory suing mobile devices. The management team at Athletes Shack has realized…

    • 2917 Words
    • 12 Pages
    Better Essays
  • Good Essays

    Introduction A network that is effective today networking enterprise is very critical. Down time as well as performance that is degraded can have a serious impact that can bring operations to a halt. With the importance of networks rising in today’s technology, threats also rise with them as well. Having the ability to keep a network up and running to its maximum ability is not only a job, it’s a business that has responsibility. Having infrastructure security is vital in order to ensure the integrity…

    • 974 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Network Threats

    • 924 Words
    • 4 Pages

    common network threats and provide solution to protect users from threats, hackers and ensures that the data travelling across the networks is safe. Introduction: Computer and network security is a new and fast moving Technology and as such, is still being defined and most probably will always be “still defined”. Security incidents are rising at an alarming rate every year [Figure - 1]. As the complexity of the threats increases, so do the security measures required to protect networks. Data center…

    • 924 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1 Identify Threats and Vulnerabilities in IT Infrastructure Denise Clark, Joseph Huiet, Anthony Brown, Orlando Rodriguez, Niko Budworth, Cory Mooney, Armando Rocha, Denny Hoang Risk – Threat – Vulnerability Primary Domain Impacted Unauthorized access from public internet WAN User destroys data in application and deletes all files System/Application Hacker penetrates your IT infrastructure and gains access to your internal network LAN Intra-office employee romance gone bad User Fire destroys…

    • 454 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    security threats

    • 629 Words
    • 5 Pages

    Area of System Threat Potential Vulnerability D:H Technical hardware failures or errors Equipment failure D:H:Pe:Pr:S Missing, inadequate, or incomplete Loss of access to information systems due to disk drive failure without proper backup and recovery plan organizational policy or planning in place D:H:S:Pe Sabotage or vandalism Destruction of systems or information D:S Memory Safety Violation Buffer overflows D:S Technical software failures or errors Bugs, code problems, unknown loopholes…

    • 629 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3120 Network Communications Infrastructure Unit 10 Network Management—FCAPS © ITT Educational Services, Inc. All rights reserved. Learning Objective  Apply network management and security techniques using the FCAPS process. IS3120 Network Communications Infrastructure © ITT Educational Services, Inc. All rights reserved.Page 2 Key Concepts  Fault management—SNMP alarms  Configuration management—change control board and procedures  Administration management—asset and inventory management…

    • 599 Words
    • 9 Pages
    Satisfactory Essays
  • Powerful Essays

    FREEPORT ZONE NETWORK INFRASTRUCTURE PROPOSAL PREPARED FOR COMTEQ COLLEGE Prepared by: Alcazar, Irish G. Medina, Jonacel M. Malixi, Danica P. Reyes, Edward Q. Submitted to: Mr. Jerome A. Mascardo I. Introduction Many of today’s success and growth of the colleges that offers computer courses and other courses that is related or concerned with the use of computer depends on their facilities, equipments and most especially on the way their network is designed. It…

    • 1363 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Network Security

    • 1567 Words
    • 7 Pages

    ABSTRACT : This paper describes the basic threats to the network security and the basic issues of interest for designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers INTRODUCTION Over the past few years, Internet-enabled business, or e-business, has drastically improved efficiency and revenue growth. E-business applications such as e-commerce, supply-chain management, and remote…

    • 1567 Words
    • 7 Pages
    Powerful Essays
  • Best Essays

    Network Security

    • 4030 Words
    • 17 Pages

    INTRODUCTION In today’s modern world computer networks are the basic source of information exchange for all types of businesses. Different technologies are used within the context of networking depending on the requirements of an organization. Ethernet is off course the best technology for the “local area network” (LAN), but when the organization spread their business to much longer distances (cities) then WAN technologies need to be deployed to keep the business running. The selection of an appropriate…

    • 4030 Words
    • 17 Pages
    Best Essays
  • Powerful Essays

    Network Security

    • 6846 Words
    • 28 Pages

    the CERT® Coordination Center (CERT/CC) sponsored the Distributed Systems Intruder Tools (DSIT) Workshop where a group of security experts outlined the emerging threat of distributed denial of service (DDoS) attack technology. Since then, denial of service (DoS) attack technology has continued to evolve and continues to be used to attack and impact Internet infrastructures. Advances in intruder automation techniques have led to a steady stream of new self-propagating worms in 2001, some of which…

    • 6846 Words
    • 28 Pages
    Powerful Essays