Design a voice and video network that meets West Consulting's needs, including annotations that highlight how traffic concerns will be addressed. Diagram your voice and video network design in Micro

Introduction

This is a network security policy and it contains a list of network assets and how they are used. It also contains potential threats and vulnerabilities that these assets need to be protected from. This policy also shows security methods that will be used to protect these assets and lastly it shows a high-level incident handling process for the identified network attacks and it also shows the person to contact and what needs to happen to the asset. Let us start by listing the network assets.

Network Assets

Router:

According to Lammle T (2004) a router is a “network layer mechanism, either software or hardware, using one or more metrics to decide on the best path to use for transmission of network traffic”.

Firewall:

According to Lammle T (2004) a firewall is a “barrier purposefully erected between any connected public networks and a private network, made up of a router or access server or several routers or access servers, that uses access list and other methods to ensure the security of the private network”.

Servers:

According to Lammle T (2004) a server is a “hardware and software that provide network services to clients”.

Switch:

According to Lammle T (2004) switch is a device that operates at the Data Link layer of the OSI model and its main purpose is filtering, flooding and sending frames.

Potential Threats and Vulnerabilities

Let us start by defining threats and vulnerabilities. According to Pfleeger C et al (2015) threat is “a potential cause of harm”. In this case a threat is potential cause of harm to the network. According to Pfleeger C et al (2015) vulnerabilities are “weaknesses that can allow harm to occur”. An example of vulnerability can be an open port that can be exploited by an attacker.

Examples of threats that our assets need to be protected from include:

Denial-of-Service (DoS):

According to Securitytrails team (2019) a denial-of-service is “when a server gets overloaded with traffic and it simply crashes”.

Phishing:

According to Securitytrails team (2019) phishing is a “method of social engineering with a goal of obtaining sensitive data such as passwords, usernames, credit card numbers etc”.

An attacker can send a phishing email and when a user opens it, a malware infects the computer and it starts stealing the data.

Man-in-the-Middle Attacks:

According to Securitytrails team (2019) man-in-the-middle-attacks are “cyber security attacks that allow the attacker to eavesdrop on communication between two targets”.

Computer Virus:

According to Securitytrails team (2019) computer viruses are “pieces of software that are designed to be spread from one computer to another”. The main goal of computer virus is to disable your security settings, corrupt your system, steal data etc.

Security Measures to Protect the Assets

Install a firewall that checks incoming and outgoing packets

Routers and switches need to be configured with password-encryption

Only use Secure Shell (SSH) version 2 to access the network remotely

Ensure all computers connected to the network are virus protected with antivirus software

Ensure that discovery protocol is disabled

High-level Incident Handling Process

Computer Virus:

When a computer has been infected with virus, the user of the computer needs to immediately report to the computer security incident response team. The computer will be removed from the network so as not to infect other computers. The computer will be labeled so that other users should not touch it. An up to date antivirus will be used to rectify the problem. Once the problem has been rectified, the computer will be returned to the network. Protection of data is guaranteed because daily automatic data backup is done.

Phishing:

When a phishing incident occurs, the employee who notices the occurrence of phishing should report to the computer security incident response team. The team will look at the extent of the affected resources. The team will try and mitigate the incident by following the incident response plan that is in place. After remedy, the employees will be asked to change their login credentials. The data will be protected because automatic daily backups are done.

References

Lammle, T. (2004). CCNA: Cisco Certified Network Associate Study Guide. Retrieved from http://faculty.petra.ac.id/resmana/private/cnap/Sybex.CCNA.Cisco.Certified.640-801.Study.Guide.4th.Edition.eBook-DDU.pdf

Pfleeger, C., Pfleeger, S. & Margulies, J. (2015). Security in Computing. Retrieved from https://ahsanghazi.files.wordpress.com/2017/03/263973122-security-in-computing-5-e-charles-p-pfleeger-pdf1.pdf

Securitytrails, (2019). Top ten common network security threats explained. Retrieved from https://securitytrails.com/blog/top-10-common-network-security-threats-explained