Preview

Project 1

Satisfactory Essays
Open Document
Open Document
300 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Project 1
Bryan Kelly
02/09/2014
NW 306 Project 1 Deliverables: Two Diagrams, One Summary

Bryan Kelly
02/09/2014
NW 306

“Intro to Network Security”
Project 1: Network Diagram with Security Features Defense in Depth and Web Security Summary Report

The purpose of this summary is to explain the changes made in the to-be diagram from the previous as-is diagram. Also, to note the protective hardware added, and the justification for the changes made. The to-be diagram has been changed or altered to reflect a defense in depth approach. This diagram is upgraded with the addition of multiple security layers. This diagram has the removal of its wireless access points and the addition of VLAN subnetting for improving network performance and reducing network congestion.
Creating layers of firewalls and subnetting prevents other compromised devices from being used as an attack platform against the entire network. An additional firewall security layer is added to the two firewalls from the as-is diagram. This is a storage firewall to protect the back-up server. The back- up storage layer is an added layer of security that’s more controlled and will be less likely to security breaches from the other layers.
A DMZ network has been set up to add another layer of security. A DMZ is layered defense created to limit access deeper into the network. Connected to that particular firewall is the addition of a storage router, that makes it now three routers in the network diagram as oppose to the two routers in the as-is diagram. To ensure software countermeasures, the deployment of anti-virus and firewall software for servers and computers are implemented. Anti-virus software for servers would operate at the database layer while other antivirus and software firewalls would operate at the client layer. The use of a personal firewall protects each of the client machines, creating a virtual layer.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Multiple layers can be used to secure internal threats like keeping employees from accessing inappropriate material, update and patch workstations and run current anti-virus/malware on workstations daily. The layers also help mitigate external threats like hackers by using firewalls and shutting traffic out of the internal network.…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Between every network and the outside host of threats there is a first line of defense. For almost every network this will be a firewall. A firewall can be both hardware and software and is usually a combination of the two. A firewall creates a barrier between networks. Any outside computer or client must pass through the firewall to access the network or its resources. Only a computer or system that has proper access can easily access a network protected by a properly configured firewall. Though it is not infallible, a firewall is the first and perhaps best means of security…

    • 855 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    Firewalls are hardware or software-based network security system that controls the outgoing and incoming network traffic by analyzing the data packets and determining whether they should be allowed through or not based upon the settings. A firewall establishes a barrier between a trusted, secure internal network and another network that is not assumed to be secure and trusted. Many computers and other hardware such as routers and modems have built-in firewall capabilities. These firewalls can be effective with little or no configuration. Software firewalls can be installed on your computer and can be configured according to your needs. Many software firewalls have user defined controls for setting up safe file and printer sharing and to block unsafe applications from running on your computer. Software firewalls may also incorporate privacy controls and web content…

    • 498 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    a. Placing a firewall between two routers and another firewall before a DMZ would be the best requirement choice to use…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Network Perimeter: Network perimeter is defined as the boundary between a privately-owned network, and the public network. The idea between network perimeters is that the assets of a network and the hardware and any other element of the network can be monitored and controlled from outside the organization. The concept of this trend was vital because it was quite necessary to defend the internal assets of the organization. There are numerous systems that organizations are trying to implement to help with this new trend. The belief of the organization is that there is a possibility of ensuring that the assets within the network are managed in such a way that it eliminates all the possible threats. The latest trend in setting up network perimeter is adopting of remote access.…

    • 366 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    I have been asked to implement a system design for Acme Manufacturing, linking all their computers to each other with a (WAN). The WAN network has all the features that all are used to in the current LAN. With the WAN network, employees are able to connect to another network remotely. As a system designer, it is my privilege to implement such a design. This document will show the design system in detail, with a follow-up section for someone that may have a system design question. I hope everyone will find this document informative as well as instructive.…

    • 1101 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Individual Vlan

    • 644 Words
    • 3 Pages

    Due to the changes happening within the company, expansion of the call center, employees moving around within the building, and employees moving off site there is a need for change to the network. Virtual Local Area Network (VLAN) is the most obvious choice because “the VLAN solution can help reduce costs by allowing us to purchase fewer router ports. It also gives us the flexibility of physically placing and moving our clients anywhere in the organization, while still including them virtually within their own subnet. We can also contain broadcasts within the network, thereby freeing up network resources. From a security perspective, it allows us very granular control of the network.” (McIntire, 2001)…

    • 644 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Justification: Since there is an influx of internet business, a secured router on each floor would provide the network administrator with a central location to complete the security administration while retain the ability to connect to the central servers on the primary hub. Additionally, a secured hub would provide functionality to encrypt data between the primary hub and each hub on each floor. This would provide additional security to business sensitive data.…

    • 874 Words
    • 4 Pages
    Good Essays
  • Good Essays

    A job brief is the clients understanding of their requirements. You need to prepare a plan of your secured network for the client’s approval. A network design plan consists of the physical and the logical views of the network. A physical network is the hardware such as cables, switches, hub etc. A logical network is the addressing used to connect these devices…

    • 944 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Company information is as valuable a company asset as money in the bank. In fact, some information can be even more valuable than cash, so protecting the company 's information with appropriate security is critical to business success. The network and data security measures you put in place for your business, from a firewall to a data backup system, are physical manifestations of business rules. You make business decisions about how important your computer network and the data it holds are to your business, and as well as how you want to protect it. Data security systems are the direct result of those business decisions.…

    • 2543 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    5. How does your design provide security for ElectroMyCycle’s network? I will be doing security in layers; Firewalls, ACLS, Vlans, security policies, Anti-virus, Physical security, port parking, Monitoring software.…

    • 280 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Ccna3 Case Study

    • 4832 Words
    • 20 Pages

    The following case study is used to illustrate the process required for designing a redundant switched network. This case study presents a scenario in which XYZ Insurance Company has hired a Network Consultant Group to design their network. In order to help you organize this project, the scenario has been divided into phases listing the requirements for each task.…

    • 4832 Words
    • 20 Pages
    Satisfactory Essays
  • Good Essays

    project 3

    • 1551 Words
    • 7 Pages

    American-born Sakamoto (b. 1931) lived with her Japanese husband in Osaka and taught English to Japanese students. She is currently a professor at Shitennoji Gakuen University in Hawaii. “Conversational Ballgames” is a chapter from her textbook on conversational English, Polite Fictions, published in 1982. Her contrasts of English and Japanese styles of conversation and her strategy for developing that contrast make us aware of the effect of cultural conditioning on the ways we learn to use language.…

    • 1551 Words
    • 7 Pages
    Good Essays
  • Better Essays

    Its main functions include protecting the network from Threats such as Denial OF Service and unauthorized usage.…

    • 754 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Chapter 8 Computer

    • 2419 Words
    • 10 Pages

    Once the hacker gains access to the network, four types of threat may arise. List and explain each of these four threats.…

    • 2419 Words
    • 10 Pages
    Good Essays