Network security project

Residency @ UC Northern Kentucky NKY CAMPUS – Florence, KY

June 29 – July 01, 2018

Dr. Mamdouh Babi

Firewalls

firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

Firewalls are often categorized as:

Network firewalls: filter traffic between two or more networks and run on network hardware.

Host-based firewalls: run on host computers and control network traffic in and out of those machines.

Network Security – Firewalls

Virtual Private Network (VPN):

extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

Applications running across the VPN may therefore benefit from the functionality, security, and management of the private network. *

*Mason, Andrew G. (2002). Cisco Secure Virtual Private Network. Cisco Press. p. 7.

Network Security – VPN

Project Development Life Cycle

The key model behind the network design process is known as the network development life cycle (NDLC)

Network Development Life Cycle

Project Analysis

Information gathering—scope, Requirement.

Design

Flow charts, Flow Diagram, Mock-up, etc…

Purchasing decisions—which switches, routers, firewalls, servers and so on are needed

Ordering equipment

Implementation

Configuring and installing the servers and network equipment, and testing connectivity and functionality

Testing

Monitoring

Management

Documentation

Creating your document, document your resources, etc..

Planning Network Projects

Think of your presentation as a verbal executive summary. Your presentation should be in the form of Power Point Presentation (PPP).

Your presentation should include a minimum of 15 slides (not including title slide).

Presentation

Remember, you are presenting the good knowledge of your work and should include the merit of your ideas and knowledge. In order to achieve these goals, at the end of the presentation your audience should:

Understand the initial requirement and why it is worth addressing.

Understand how you are addressing your project.

Know what features have you implemented.

Be confident of your knowledge.

Presentation

Your slides should include the following sections (everything you need is in the Telecommunications Case Assignment document):

Introduction: In this section, you will introduce the project and the objectives of the project including executive summary. 3 slides

Requirement Analysis: In this section, you will discuss the requirement. (use details provided in specifictions)– 2 slides

Design: You need diagrams, charts, pics, etc.. 3 slides – I-flowchart 1-cincinati 1- atlanta

Presentation

Implementation: diagrams, charts, and possibly screen shots. – overview– 1-slide

Testing (optional): You can present your data testing in this section.

Cost analysis: Estimated cost (you can use the internet to get pricing). Make sure to include labor cost in your analysis.– 3 slides hardware $ software & labor pov

Conclusion: Summary, lesson learned, future work, etc.. 2slides

Future work— 1 slides

Lessson learned – 1 slide

Presentation

Miscellaneous:

You can assume that your audience has a similar level of technical background to yours, although they know nothing about your project.

Use this presentation as an opportunity to highlight the strengths of your project; i.e. make sure to point out any particularly unusual or creative features.

Presentation

Power Point Presentation (PPP) additional Instructions:

In order to be most effective, here are some general design guidelines:

Include visual items (diagrams, charts, screen shots).

Use larger font than you would use for a written paper (i.e. don’t use 12 point!).

Presentation

Acme Corporation is a new startup

wishes to sale:

their new phone to the public called Acmephone,

a more secure version of the phone to business organizations, called the Acmephone B+, and

highly secure version of the phone, called the Acmephone G+, to the government.

Network Security Project

Due to the fear of corporate espionage and government security requirements, there are many security concerns that must be addressed.

As a security professional, you have been employed to design a network infrastructure for their two campuses located in Atlanta and Cincinnati

Network Security Project

based upon the following specifications:

1. There needs to be a constant connection between the two locations that can carry at least 50 Mbps of data.

2. Each facility has three floors. The buildings are rectangular with each floor being 350’x350’.

3. There will be 200 network connections on each floor with an additional 100 network connections in the data centers located on the third floor of each building.

Network Security Project – Specifications

4. The primary data center will be located at the Atlanta location.

5. There will be a failover* data center at the Cincinnati location.

* Failover is a method of protecting computer systems from failure, in which standby equipment automatically takes over when the main system fails.

6. Each location should be protected from intrusions that are not limited to state change attacks.

7. The Atlanta location will house the two secure development teams. As such, it will need the most security. To further complicate the design, there will be database servers and the corporate Web servers housed at that location as well.

Network Security Project – Specifications

8. There will be database servers located at the Cincinnati site.

9. The servers must have redundancy.

10. The solution must have a plan to verify security measures.

Network Security Project – Specifications

Your job is to develop a network design to meet the requirements above.

1. You should submit a network drawing listing the network’s topology including any necessary hardware.

2. You should list any recommended cable.

3. You can recommend wiring closets wherever you need them.

Network Security Project

4. You should recommend ways to assure that you are not getting attacked.

5. You should build traps to stop attackers.

6. You should recommend any WAN or wireless technologies.

7. You should recommend any technology needed in the data center for high availability.

8. Justify your recommendations.

Network Security Project

Number of Pages – not limited

Use APA format

https://owl.english.purdue.edu/owl/resource/560/01/

Project’s Document

Include the following sections:

Abstract: Describe the problem and the solution you presenting (few lines)

Introduction: In this section, you will introduce the project and the objectives of the project including executive summary.

Requirement Analysis: In this section, you will discuss the requirement

Design: You need diagrams, charts, pics, etc..

Implementation: diagrams, charts, and possibly screen shots

Testing (optional): You can present your data testing in this section

Cost analysis: Estimated cost (you can use the internet to get pricing). Make sure to include labor cost in your analysis.

Conclusion: Summary, lesson learned, future work, etc..

References

Project’s Document

Computer Networking

Network Security, Firewalls and VPNs

Project Development Life Cycle

Network Development Life Cycle

Requirement Analysis

Design

Implementation

Testing

Management

Documentation

Project – Case Study

Project – Case Study Presentation

Project – Case Study Documentation

Conclusion

Looking for Discount?

You'll get a high-quality service, that's for sure.

To welcome you, we give you a 15% discount on your All orders! use code - ESSAY15

Discount applies to orders from $30
©2020 EssayChronicles.com. All Rights Reserved. | Disclaimer: for assistance purposes only. These custom papers should be used with proper reference.