Answered You can buy a ready-made answer or pick a professional tutor to order an original one.

QUESTION

Defence in Depht

Defense in DepthOftentimes, the process of implementing security opens one's eyes to other forms of security they hadn't thought of previously. Well, in this assignment you should experience just that. This assignment focuses on a model of implementing security in layers which in many cases requires a network that is designed accordingly. In this assignment, you are to design a network to incorporate the following:- Corporate Site (Chicago)All servers exist here (Web server, file server, print server, mail server, ftp server)Connection to the Internet (50mbps)300 employees who only need access to local corporate resources and the internet- 1 Remote Site (8 miles away)20 employees who need access to all resources at corporate plus the internetConnection to the internet (3mbps)Write a five to six (5-6) pages paper in which you:1. Using Microsoft Visio or its open source alternative, design a network diagram, particularly with defense in depth in mind which depicts:a. All networks devices used (routers, switches, hubs, firewalls, VPNs, proxies, and / or others).b. The interconnections between network devicesc. The end user (client) devices (desktops, laptops)d. The Internet cloud, generically, to represent your network's interface to the internetNote: the graphically depicted solution is not included in the required page length.2. Describe the flow of data through your network, and explain how your network design provides multiple layers of security.3. Use at least five (5) quality resources in this assignment

Show more
Tigerwriter
Tigerwriter
  • @
  • 13 orders completed
ANSWER

Tutor has posted answer for $50.00. See answer's preview

$50.00

************* Diagram ******** ********* ****** ******* ** ************ NameInstitution *************************** diagram *** ******* ********* ************ ******* *************************** Network Diagram ** **** in ******** ***************** systems ** ***** to ******* a **** representation of *** ************ ******* **** type ** ******* ***** ******* ********* *** ********* ** ********* detailed network documentation for implementing ******** ******** ******** like ******* ** Depth ************************* ******* *** ******* ********* **** and ****** **** ** created *** ***** ***** *** ******** information ** ******** ** ******** **** ** this *************************** ******* requires *** Employee ****** ***** ***** ******** *** ********* *** **** need ****** to ***** ********* ********* and *** internet *** Second ***** ******** ** ********* who need ****** ** *** ********* at ********* **** *** ************** *********** ** **** remote site ** 8 ***** **** should be accessible ** user ***** of ** **************** Diagram for ********* **** ** created ** ***** Remote **** ** ******** ** * building *** ****** distance between ********* *** ****** site ** 8 ***** **** ***** ** ******* ************ ************ of ******** of **** network ******* ** to ********* *********** ******** ** ********* ******* ** depth ***** ** *** ******* ********* **** and ******* the ****** **** of *** Organization   Connection ******* ****** Site *** ********* ************** ** ******** will be ********** ***** Switches *** Router *** ****** **** ** provided using a separate *** Server ** *** ********* **** ** access ****** Site **** Corporate **** ******** Bridge *** ****** ** **** which ******* ******** ** Firewall Router *** ******** ***** This ******* the ******* data ******* in *** *** ** *** ********* **** *** ******* ******* **** ***** of ** ********* *** connected ** ****** **** *** Work Group ****** **** **** ***** ****** ********* *********** ** ***** ********* should ** allowed access ** *** ********* and ***** ********* should ** allowed for ***** ********* ******** **** ******* *** network *** method ** ************* **** be depending ** the ******** ** *** network For ********* **** ****** **** be ***** ** *** ***** ******** Service ******** *** network **** ** **** ********* The ******* *** **** ********** *** to ** ******* ** IPv4 There **** ** ** **** ***** ***** IPv6 will ** ****** ** the ****** *** expansion *** ** the ********* on **** ******* **** **** *** ease ********** ** *** **** and **** Connection ** resources **** ***** ****** **** ****** ** ******** subdued to ******* ******** ** *** server ******** ** the network ***** **** user ****** *** **** Hubs *** further ********* ** ******** ***** **** ******** to Work Group ****** *** *** work ***** ****** ******** ********** ***** for *** ***** ********* ** ***** ****** **** **** **** *** **** ** ***** ********** ********* ** *** ******* ** **** *** **** ** ********** **** ****** ** **** or print ****** *** server ** ** *** ****** siteIn ********* business *********** ** ** **** important ** control **** ****** ** ** ******** ** long-term *********** ********* ********* ******** new ********** ********** new ********** for the ********** of information ********* it ** ******** for ************* ** ******** ************** ** ******* appropriate strategies *** ******* and understanding *** ****** of *********** **** **** ** ** ************************** ** Depth ** *** ****** ** *** ******* ***** ** *** ******* ************ ** *** ************ ******* ** ***** ****** ********* ** **** **** ******* security ********** increase ******** ** *** ****** ** * ************ *** ******* ******* implements ******* ** ***** model **** **** of ******** routers *** **** ***** switches **** **** *** ****** ***** **** to ******** router **** **** ******** *** *** ******** ** ********** **** *** ******** router ******* *** **** and ****** if it suspects on ********* ** data *** thus ***** ** ****** ** ** ***** out ** *** *** server ** the ********* ********** flow **** ** *** **** *** ****** **** ** ******* ** ********** **** the **** ** ****** ***** *** ******** bridge **** from ********* **** first **** ** *** ****** point which *** **** *** **** ******* ** *** ****** ********* ** internet ******** bridge ***** ** data flow ** *** ****** **** **** ** ****** **** ***** **** ** ******** ****** *********** on *** ******* **** ***** *** **** and only after **** ** passes the **** ** *** ****** of ****** site **** ***** data **** ****** ** * ******** *********** ** *** ********* ****** of *** ****** **** which **** furthers *** data ** required **************** ProvisionsCreated Network ******* is a ***** ***** ******* diagram **** * Layers ******** mechanism ** **** ******* ** *********** **** *** **** ** ******** ******* ******** *** Work ***** ************** * ******** ******** *********** ** hubs and ***** *** Layer 2 ** the ******** tree ** *** network ******** *********** ******** **** **** ******* ******** ********* Security ********* of ***** ********* ** ********** ** local *** with ****** softwareIP ********* to systems **** be assigned *********** throughout *** ******* ***** ** their ******** on the ***************** ******************************** *********************** **** **** **** addresses designate *** wireless ******* ******* ************ *** ** a crucial **** ** *** network ***** ******** ** **** ******* will **** ***** ***** ****** **** Each *** ***** department will ** having * ******* *********** This will ***** *** a **** and ****** to material *** **** and when *** ***** ** *** ***** necessary for the ********* ** *** ************* ******** ********* **** **** ******* a ******* ****** and ******* ********* for unified communications Power over ******** ******** ****** points **** ** **** ** **** on cabling *** *********** ******** Power **** ******** ** VOIP phones **** also ** **** There is ** ****** to *** phone lines *** ***** ***** cables ********** *** facilities **** **** **** the same **** ** *** the ***** *** power itThe only warning when ***** ***** **** Ethernet ******* ** **** there ** * ***** **** ** *** ***** *** **** ** ***** ******* or multiple on the **** lines **** ****** the ********* ** *** ******* ********** There **** ** no ******** ********* routing ******** ** this ******* *** ******* protocol *** **** ******* **** ** *********** Layer of ******** of **** ******* diagram **** ** implementing **** *********** **** ** ** often *********** ** ********* ******** ****** **** security **** ** ****** because ** following important points:There *** **** ******* **** *** simple to ***** *** ** ******* ***** 2There tends to be a ***** lack ** port ******** implemented ** ***** 2 ******* much ***** ** **** on *** ******* *** ** ********** ****** **** ******** endPort *********************** can ***** ******* ******* ** **** ********* types ** ******* **** ** MAC flooding *** ******** *** ***** **** and *** **** ** **** a ****** **** security we **** be ***** ****** Learning *********** *** ******* ********** ** ****** ***** of the ************* learning ** a very convenient *** ********* *** ** *** ****** *** ******* ******** *** MAC ********* **** ** **** ***** ** our ******* **** ** **** ** ** is ** ******* **** the ******* devices are ********* to *** ******* ** *** then **** ** ****** ******** *** the port ******** ******* itself(Inecom)Conclusion ** ******* ******** ** ******** ******** ******* *** ******** ************ needs *** IT ******** ***** *** ***** **** rapidly ******** ******* at every ******** point ** ***** – **** the ********* ** the ******** from mobile ** *** cloud ********* Organizations **** a holistic view ** ***** ******* Provided ******* diagram *** ******* **** *** ******** ******** ********** **** ***** implementing ***** ******** ***************************************************** **** ******* ******** RequirementsRetrieved **** *************************************************** B **** ******* **************** **** ****************************************************************** **** ****** ***************** from *************************************************************************** (nd) Defence ** ************** from https://wwwowasporg/indexphp/Defense_in_depthPacketLifenet (nd) Port SecurityRetrieved from ********************************************************** ******* (Chicago ********* ****** ******* in ************ *************** *************************** ******* for ******* Corporate ************ ******* Diagram:   IntroductionA ******* ******* ** **** in ******** ***************** ******* ** ***** ** provide a **** ************** of *** ************ ******* This type ** ******* ***** network engineers and designers ** ********* ******** network ************* *** ************ ******** ******** ******** **** ******* ** ***** Models(Evaluation)Network Diagram *** Chicago Corporate site *** remote **** is created *** ***** ***** and ******** information ** ******** ** ******** text ** this *************************** ******* requires *** Employee Groups ***** group ******** *** employees *** **** **** access ** ***** corporate ********* and *** internet *** Second ***** ******** ** employees *** need ****** to *** ********* ** ********* plus *** ************** *********** is **** remote site ** * miles **** should ** accessible ** user ***** of ** **************** ******* *** Corporate Site ** created ** below ****** **** ** ******** ** * ******** *** ****** distance between ********* *** ****** **** ** * miles **** ***** ** network ************ ************ ** ******** of **** ******* ******* ** ** ********* *********** ******** ** implement ******* ** depth ***** in *** Chicago Corporate **** *** between the remote site of the Organization   Connection ******* ****** **** and Corporate ************** ** ******** **** ** maintained ***** Switches and ****** *** Access will ** ******** ***** * separate Web Server ** *** Corporate **** To ****** ****** **** **** Corporate **** ******** ****** *** ****** ** used ***** ******* ******** ** ******** Router for Security ***** **** ******* the ******* **** flowing in *** out ** the corporate site and network ******* user group ** 20 Employees are ********* ** ****** **** *** Work ***** ****** **** **** ***** ****** ********* information of ***** ********* ****** ** ******* ****** to all ********* *** ***** ********* ****** be ******* for ***** ********* ******** **** through *** ******* *** method ** communication **** ** depending ** *** ******** ** *** network *** ********* **** ****** **** ** ***** ** *** local Internet ******* Provider *** ******* **** ** **** ********* *** network *** **** ********** *** ** ** ******* ** **** ***** **** ** in some ***** ***** **** **** be ****** in the future *** ********* *** of the ********* ** this ******* **** **** *** **** capability to run **** and IPv6 Connection ** resources **** ***** ****** Fire ****** ** ******** subdued ** provide security ** *** ****** endsData ** *** ******* ***** **** user ****** via **** **** are ******* connected to ******** ***** **** ******** ** **** Group ****** Now the **** ***** switch contains permission ***** for *** users ********* ** ***** ****** **** **** Data *** **** ** three ********** ********* ** *** ******* ** user *** **** ** permission From ****** ** **** or ***** ****** *** server or ** the ****** siteIn today’s ******** environment ** is very important ** control **** access It ** ******** to ********* *********** ********* Alongside ******** new ********** ********** *** ********** *** *** ********** ** *********** ********* ** ** required for ************* ** ******** infrastructure to ******* appropriate ********** *** ******* and ************* the ****** ** information **** need ** ** ************************** ** Depth ** *** ****** ** *** threats ***** ** *** ******* ************ of *** ************ ******* ** ***** system ********* ** **** **** ******* ******** mechanisms ******** security ** *** system as * ************ *** ******* ******* ********** ******* ** depth ***** **** **** of Firewall ******* and **** group ******** **** from *** ****** first goes ** ******** ****** **** adds security for *** ******** ** ********** data *** ******** router ******* the **** and ****** ** ** suspects on integrity of data *** **** ***** it ****** ** ** ***** *** ** *** web ****** ** *** corporate ********** **** **** ** *** **** *** ****** **** of Chicago ** controlled **** *** **** ** ****** ***** and ******** ****** **** from corporate site ***** **** to *** Access point ***** the **** *** **** ******* ** *** ****** ********* ** ******** ******** ****** ***** in **** flow to *** ****** **** **** ** remote **** first **** ** ******** ****** *********** ** *** network **** ***** the **** *** only ***** **** it passes *** data ** *** ****** ** ****** site **** there **** **** ****** to * Firewall implemented ** *** ********* office ** *** remote **** ***** then ******** *** data ** ******** entitiesSecurity ***************** ******* ******* ** * ***** ***** ******* ******* **** 2 ****** Security ********* in **** ******* is *********** with *** help ** Firewall ******* Firewall *** Work ***** ************** 1 ******** ******** *********** of hubs *** users *** ***** * ** the ******** tree ** *** ******* ******** Connections contains **** **** ******* ******** ********* ******** provision of these ********* ** ********** at ***** *** **** ****** ********** ********* ** systems will be assigned *********** throughout the ******* ***** ** ***** ******** on the ***************** ******************************** SITE192161611/26 There **** **** **** addresses ********* *** wireless devices Virtual ************ *** ** a ******* **** ** *** ******* Every ******** ** this ******* **** **** VLANs ***** ****** them **** and ***** ********** will ** having * virtual *********** **** **** allow for a **** *** ****** ** material *** **** and **** *** where it all maybe ********* *** *** ********* in *** ************* ******** ********* also **** provide * ******* design *** ******* protocols *** unified communications ***** over Ethernet ******** access ****** **** be **** ** **** on ******* *** electrician ******** Power **** ******** ** VOIP ****** **** **** ** **** ***** ** no ****** to *** ***** ***** and extra ***** ****** ********** the facilities **** **** **** *** same **** ** *** *** ***** *** ***** ***** only ******* when ***** ***** over Ethernet ******* is **** there ** a ***** **** ** *** ***** too **** ** ***** ******* ** multiple on the **** lines **** ****** *** usability ** *** ******* themselves ***** **** ** no ******** ********* routing ******** ** this ******* *** ******* ******** *** **** ******* **** ** *********** ***** ** ******** ** **** network ******* will be ************ **** *********** **** ** is ***** *********** to ********* ******** ****** port ******** **** is ****** ******* ** ********* important ************ are **** attacks that *** ****** ** ***** *** ** ******* ***** 2There ***** ** ** * ***** **** of port ******** *********** at Layer * ******* **** focus ** **** ** the ******* *** ** ********** ****** than physical ******* *********************** *** ***** systems against ** **** different ***** ** attacks such ** *** flooding *** ******** *** ***** **** *** *** **** ** **** * ****** **** ******** ** **** ** using ****** ******** *********** *** ******* ********** ** ****** ***** ** *** ************* ******** ** * **** ********** *** ********* *** to set ****** MAC address ******** *** MAC addresses that ** **** ***** ** *** network **** we need ** ** is to confirm **** *** ******* devices *** ********* ** *** ******* ** *** **** turn ** ****** learning *** *** **** security ******* itself(Inecom)Conclusion ** ******* ******** of ******** ******** ******* *** ******** ************ ***** *** ** ******** ***** *** ***** with rapidly ******** ******* ** ***** ******** point ** entry *** **** the perimeter ** *** ******** **** ****** to *** ***** ********* ************* **** * holistic **** ** ***** network Provided ******* ******* *** ******* **** *** ******** ******** ********** **** ***** ************ ***** ******** ******************************************************* (nd) ******* ******** ********************* **** *************************************************** B **** Network **************** from ****************************************************************** **** ****** LearningRetrieved **** http://bloginecom/category/ccie-service-provider/layer-2-technologies/OWASP **** ******* in ************** from ********************************************************** **** Port SecurityRetrieved **** *********************************************************

Click here to download attached files: defence in depht.docx
or Buy custom answer
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question