fb
$20 Bonus + 25% OFF
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!
Add File

Error goes here

CSI5212 Network Security Fundamentals

tag 0 Download14 Pages / 3,269 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

‘Lucent Pharma’ is a pharmaceutical firm based in Perth and has two offices in two different suburbs. The firm’s current network topology was deployed in haste and as such does not have any effective security control. The CEO of the firm has started feeling the concerns around the cyber security of its network, as Lucent Pharma’s business is flourishing, and competitors are also becoming more and more active in the region.
 
Requirement:
 
As a network security consultant, you are required to:
 
1. Analyse the current network topology implemented at ‘Lucent Pharma’ and identify five major vulnerabilities that exist in the network. You are also required to provide sound reasoning behind these identified vulnerabilities.
 
2. Place the following security devices/controls, bearing in mind that these devices do not compromise either the network performance or the security of the network:
 
a. Firewall
b. IDS/IPS
c. Honeypot
d. Routers/Switches
e. Other devices that may add value to the ‘Lucent Pharma’ network
3. Explain/Justify why these devices were placed in the chosen locations in (2)?
4. Does the Lucent Pharma network require segregation into multiple domains (i.e. requirement of VLANs)? If yes, please add these additional sub-networks to yourtopology.
5. Create a set of firewall policies and a set of firewall rules that should be implemented by the network administrator for firewall(s) placed in the network. Policies must be sound and robust to cover the cyber-security of the entire network.
6. Create a set of IDS/IPS policies and corresponding rules that are to be implemented by the network administrator. Policies must be sound and robust to cover cyber-security of the entire network.
7. Devise ten security policies that are essential for the Lucent Pharma network. Hint: You may refer to security policies from the SANS (SysAdmin, Audit, Network, and Security) website.
8. Design the ‘Proposed Secure Network Design’ for the pharmaceutical firm preferably in Microsoft Visio. An image of this design must be appended to the report.
 
Part 2
 
This part is independent of Part 1 and requires you to use software tools to examine remote machinesand traffic thus captured. You are required to undertake this activity preferably through a ‘Kali Linux’ Virtual Machine (other VM’s are also acceptable).
 
Requirement:
Use ‘Nmap’ tool to scan the server scanme.nmap.org. You are cautioned not to scan any  other server as this is considered unethical and unlawful. This activity is known as ‘Port Scanning’, and only those servers should be scanned for which you have explicit permissions.
 
There might be a situation where you find that running a port scanner on the above server may cause delay especially when run from within the ECU network. In this case, you are encouraged to run the scan outside ECU’s network to avoid unnecessary delays.
 
2. Record the above traffic using the ‘Wireshark’ tool. You may use the Wireshark tool available in ‘Kali Linux’, or you may install Wireshark on your base operating system. Hint: It is always better to check the interface on which your Virtual Machine is running to avoid delays.
Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

Upload
Unique Document

Document
Under Evaluation

Get Money
into Your Wallet

Total 14 pages, 1 USD Per Page

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2020). Network Security Fundamentals. Retrieved from https://myassignmenthelp.com/free-samples/csi5212-network-security-fundamentals/secured-network-design.html.

My Assignment Help (2020) Network Security Fundamentals [Online]. Available from: https://myassignmenthelp.com/free-samples/csi5212-network-security-fundamentals/secured-network-design.html
[Accessed 22 October 2021].

My Assignment Help. 'Network Security Fundamentals' (My Assignment Help, 2020) <https://myassignmenthelp.com/free-samples/csi5212-network-security-fundamentals/secured-network-design.html> accessed 22 October 2021.

My Assignment Help. Network Security Fundamentals [Internet]. My Assignment Help. 2020 [cited 22 October 2021]. Available from: https://myassignmenthelp.com/free-samples/csi5212-network-security-fundamentals/secured-network-design.html.


Have you ever wondered an easier way of not taking stress in your thematic essay? Just take guidance from MyAssignmenthelp.com, one of the best custom writing service. But it doesn’t stop till thematic essay. You can also ask help for analytical essay, critical analysis essay, compare and contrast essay or any college essays. Top of that, MyAssignmenthelp.com is probably the cheapest writing service you can ever find. You can call us or e-mail us any time you want. We have 24*7 student-support executive who are happy to resolve your query.

Latest Management Samples

BUS2002 Strategic Business Analysis

Download : 0 | Pages : 13

Answer: Introduction The performance management refers to the organizational activity which ensures that the goals and objectives of the organization are met. It focuses on the performance of an individual employee, an organizational department and the organization as a whole. In the performance management, the leaders and the managers of the organization take initiatives to monitor and review the performance of the employees. It includes the...

Read More arrow Tags: Australia Frome Management Accounting in Business University of New South Wales Masters in Business Administration 

729PROJ Project

Download : 0 | Pages : 24

Answer: Introduction The following chapter of the research has been prepared by the researcher to provide the readers a clear view about the background, the problem statement, research questions and the sources from which the information has been collected. The chapter also highlights the analysis of the information and organization of the total study. Background Customer relationship Management can be referred to as the process by which th...

Read More arrow Tags: Australia Melbourne Management Masters in Business Administration University of Melbourne 

MNGT2002 Business Venturing

Download : 0 | Pages : 9

Answer: Introduction As rightly indicated by McKelvie et al., (2014), corporate entrepreneurship essentially points out towards development of novel ideas as well as opportunities within large or else established businesses. This essentially directs towards improvements of profitability and an augmentation of competitive position or else strategic renewal of existing businesses. Particularly, corporate entrepreneurship is essentially vital fo...

Read More arrow Tags: Australia Melbourne Management Corporate Entrepreneurial Performance University of Melbourne MBA 

ACFI3005 Auditing And Assurance

Download : 0 | Pages : 9

Answers: Answer to Question 1: Analytical procedure helps auditors in conducting preliminary analysis of the audit plan. While undertaking the audit, it is required by organization to have audit plan in place that would guide them in accomplishing their tasks. It will also help in maintaining unreasonable costs of audit. Various tools are used by auditors in carrying out audit plan and this involves common sizing, ratio analysis and benchmark...

Read More arrow Tags: Australia Carramar Management OB Ass 3 University of New South Wales Humanities 

HRM101 Introduction To HRM

Download : 0 | Pages : 2

Answers: 1. In present situation, 9 to 5 work time is being back footed day by day. The policy makers of the companies are all aware of the fact that new generation is tired of the same age-old working hours and boring work culture.  It is a fact that, new generation would require liberty of using social media over high salary boring workplace. Young generation likes to stay connected with their family and other friends, not only with th...

Read More arrow
Next

5% Cashback

On APP - grab it while it lasts!

Download app now

*Offer eligible for first 3 orders ordered through app!

ribbon
callback request mobile
Have any Query?