Discuss About The Designed And Description Design Evaluated?
The Scope of this project is to create the secure network design for B2B solutions. The B2B solutions expanding their operations. So, organization team decided to creating the network design. The B2B solutions has the six building and various departments. It Each building the has the separate work stations. The Six buildings are finance office, sales office, research office, transport office, Information technology office and head office. the finance office contains the 100 work stations, sales office contains the 25 workstations, research office contains the 25 work stations, transport office contains the 50 work stations, head office contains the 50 work stations and information technology office contains the 250 work stations. Each building has the single subnet. These are connected with each other by using the routers. The Proposed network design provides the security and productivity of the network infrastructure for B2B solutions. The Network security threats are will be identified. The proposed network infrastructure hardware and software components are will be addressed and discussed in detail. The justification of proposed network design will be justified by ensuring the confidentiality, integrity, availability and authorization model in the network.
The security threats are divided into two categories like active and passive threats. The passive threats are identified to as eavesdropping and it involves the attempted by hackers to obtain the information related to communication [1]. It obtained by using the release of message content and traffic analysis method. The release of message content is used to identified the transmitted the file may contain sensitive and confidential information. So, it prevents the opponent from the message or data transmissions. Another method is traffic analysis. It is a kind of attack done on encrypted messages. The Active threats is including the false stream creation and data stream modification by using the denial of service and message modification method. The denial of services is one of the attack and it take the place when the network availability to a resource is blocked by a hacker. The proposed network design is used to provides the secure network by using the cisco firewalls. The firewalls are used to blocking the unauthorised access to prevent the sensitive information’s.
The Proposed network design hardware and software requirements are listed in below [2].
The Software requirements for B2B network infrastructure is shown in below.
The Hardware requirements for B2B network infrastructure is shown in below.
Specification and Features of Network devices
The B2B solutions proposed network infrastructure is used to provide the security and productivity of the network [8]. It has the six building for various department. These are finance office, transport office, sales office, head office, research office and information technology offices. These are connected with each other by using the router. The router is connecting the six building by using the core switches and switches. The Each building has the single subnet. Each building is communicated with others. The Proposed network design uses the cisco network devices like cisco routers, switches, access point, core switches, server and cisco server. It provides the secure wireless network connection for each building by using the cisco access point. It cisco network devices are used to reduce the operational and maintenance costs [9].
The Proposed network solutions is used to ensures the confidentiality, availability, integrity and authorization of the network [10]. The CIAA model provides the secure and effective network for B2B solutions by using the cryptographic algorithms. The Cryptography is plays a major role in network security. The CIAA models is one of the network security techniques. The proposed network solutions ensure the CIAA model by using the cryptographic algorithms. Justification of CIAA model is shown in below.
It is used to prevent the sensitive information from unauthorized users. It only allows the authorised users to accessing the sensitive information. It provides the high data security. It encrypting the information to protect the sensitive information by using the SSL/TLS security protocol for communications over the network. It ensures the information confidentiality include enforcing the file access control and permission to restrict access to information’s [11].
The integrity is used to maintains the data consistency, trustworthiness and accuracy through the network. It ensures that data cannot be modified by unauthorised users. It measures the file permissions and access control lists. It verifies the data integrity by using the checksums and cryptographic checksums.
The availability is used to ensure the authorised users are able to access the information when needed. It provides the sensitive information for authorised users at the right times. It denying the unauthorised users are accessing the information. It ensures the data availability by using the cryptographic algorithms [12].
The authorization is used to authenticate the users to accessing the sensitive information. It allows the authenticated users only accessing the campus information through the network. The Cryptographic algorithms provide the users authentications to accessing the information. The cryptographic mechanisms are used to provide secure network and effective network. The CIAA model is used to maintains the organization security and provide the scalable and reliable network.
The B2B solutions decided to create the secure network design because the organization expanding their operations. The B2b solutions consists of six building and various departments. These are sales office, finance office, transport office, research office, head office and information technology office. These are connected with each other by using the cisco routers. Each building has the single subnet. These are communicated with each other. The proposed network design provides the security and efficiency of the network. It gives the security by using the cisco firewalls. The firewall is used to provide the productivity and security for an organization. It uses the cisco network devices to reduce the maintenance and operational costs. The Network security are identified. The proposed network design hardware and software requirement are identified and discussed in detail. The Detailed proposed design is designed and description of design is evaluated. The Justification of CIAA model is justified.
[1]J. Kurose and K. Ross, Computer networking. .
[2]NETworking. [Hong Kong]: Regional NET Coordinating Team, NET Section, CDI, EDB, 2013.
[3]J. Wang, Broadband wireless communications. [Place of publication not identified]: Springer-Verlag New York, 2013.
[4]W. Osterhage, Wireless security. Enfield, N.H.: Science Publishers, 2012.
[5]D. Forsberg, W. Moeller, V. Niemi and G. Horn, Lte security. Hoboken, N.J.: Wiley, 2014.
[6]"Disadvantages of Wireless Networks | Techwalla.com", Techwalla, 2017. [Online]. Available: https://www.techwalla.com/articles/disadvantages-of-wireless-networks. [Accessed: 27- Sep- 2017].
[7]T. Alpcan and T. Bas?ar, Network security. Cambridge: Cambridge University Press, 2011.
[8]T. Chia, "Confidentiality, Integrity, Availability: The three components of the CIA Triad « Stack Exchange Security Blog", Security.blogoverflow.com, 2017. [Online]. Available: https://security.blogoverflow.com/2012/08/confidentiality-integrity-availability-the-three-components-of-the-cia-triad/. [Accessed: 28- Sep- 2017].
[9]"What is confidentiality, integrity, and availability (CIA triad)? - Definition from WhatIs.com", WhatIs.com, 2017. [Online]. Available: https://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA. [Accessed: 28- Sep- 2017].
[10]"Wireless Networking Security", Cs.bham.ac.uk, 2017. [Online]. Available: https://www.cs.bham.ac.uk/~mdr/teaching/modules03/security/students/SS7/Wireless%20Networking%20Security.htm. [Accessed: 28- Sep- 2017].
[11]"What is Network Security? - Palo Alto Networks", Paloaltonetworks.com, 2017. [Online]. Available: https://www.paloaltonetworks.com/cyberpedia/what-is-network-security. [Accessed: 28- Sep- 2017].
[12]J. Rak, J. Bay, I. Kotenko, L. Popyack, V. Skormin and K. Szczypiorski, Computer network security. .
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2018). Designed And Description Design Evaluated. Retrieved from https://myassignmenthelp.com/free-samples/designed-and-description-design-evaluated.
"Designed And Description Design Evaluated." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/designed-and-description-design-evaluated.
My Assignment Help (2018) Designed And Description Design Evaluated [Online]. Available from: https://myassignmenthelp.com/free-samples/designed-and-description-design-evaluated
[Accessed 26 January 2021].
My Assignment Help. 'Designed And Description Design Evaluated' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/designed-and-description-design-evaluated> accessed 26 January 2021.
My Assignment Help. Designed And Description Design Evaluated [Internet]. My Assignment Help. 2018 [cited 26 January 2021]. Available from: https://myassignmenthelp.com/free-samples/designed-and-description-design-evaluated.
Students stuck with complicated research paper outlines and topics are no more required to look around for help frantically. MyAssignmenthelp.com is available with the best team of writers and resources for the finest bibliography, referencing, thesis statements and conclusions. From assisting students with rhetorical analysis to helping them with critical literature analysis; MyAssignmenthelp.com is dedicated to sending across comprehensive solutions on a plethora of research topics.
Answer Introduction The university management system (UMS) is a web-based system of an enterprise that automates the interaction with the instructors and students as well as the university internal operation processes. East West University (a private university in Aftabnagar, Dhaka-Bangladesh) is planning to adopt an information system which will allow them to develop a more structured organization, boost the internal control system and incre...
Read MoreAnswer Introduction This reflective report presents the reflection of blogs and presentation that I had attended during the class. It also illustrates the technology related todesign it process. A critical self-analysis and reflection of your learning Week 1 and 2: Design What and Design Process During these weeks, I have improved my knowledge regarding “design it”. I have also learned about the entrepreneurship. In this way, i...
Read MoreAnswer: Do you think it is possible to remove all research bias from a study? Yes, I think it is possible to remove all bias from the study. It is considered that the main aim of removing bias isn’t to standardize all people to be equal or have the same perception but to allow the respective researchers to divulge their true emotions without falsification (Schmidt & Hunter, 2014). Through this, despite bias being characterized as inte...
Read MoreAnswer: Conduct of Business Functions Responsibly and ethically to Accelerate Sustainable Growth for Operation in Tomorrow’s World. Decision making derives its basis from objectives. In this study, the man point of focus will be on the objectives of Coca-Cola Company. Specifically, the focus is on the objective to be globally known as a company that conducts its business functions responsibly and ethically to facilitate sustainable ...
Read MoreAnswers: 1. The Bundaberg hospital has been located in Coastal town, Queensland Australia. It faced a failure due to its corporate governance failure which was main contributing factor to the event of Bundaberg. In this hospital, doctors were working long hours and there is no safety and work standards are followed to strengthen the overall work functions of doctors and other staff members. Surgeons and doctors were complaining about understaff...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
it was a good one! the expert did a thorough and nice job. my professor was impressed
Australia
love the work. I got the marks I need to pass the exam. I recommend assignment help to others too
Australia
Got a pretty good grade on my assignment. They completed it before my deadline for the same price. Price was decent but really happy.
Australia
THANK YOU FOR ALWAYS ON TIME OR EARLY SUBMISSION. ALWAYS WILLING TO HELP BUT IM HOPING EACH EXPERT WILL ASSIGN TO ME WILL ALWAYS BE CONSISTENT. ALWAYS BE WILLING TO HELP. GOD BLESS YOU ALWAYS.
Australia