You are required to produce the following deliverables as part of your contract:
1. Analyse the network and enlist all vulnerabilities found. 2. The vulnerabilities identified in the network architecture from (1) above should be explained in detail. 3. Provide recommended improvements to the network architecture in order to harden the entire network and to fix the vulnerabilities identified above. 4. Draw the improved network architecture. 5. Based on a rough estimate of the number of operating devices at the Perth HO and the Port Hedland Offices, as well as the network bandwidth, estimate the network traffic intensity during a given time of the day (approximated in numbers). Is there any bottleneck identified on this link that can be exploited by the adversary for launching a DoS attack? If so, propose a solution for countering this threat. 6. Create a JMeter profile to generate network traffic with intensity calculated in (5) above. 7. Generate the network traffic based on the profile from (6) above. 8. Capture the generated network traffic using Wireshark. (Hint: Run Wireshark on a separate virtual machine from JMeter). 9. Write-up network security policies for the resources of the network (devices and technologies). Do not write access policies for end-users rather define policies appertaining solely to the network architecture.