Question

In: Computer Science

You have been appointed as a design engineer and assigned to design a secured network for...

You have been appointed as a design engineer and assigned to design a secured network
for a private organization. Evaluate your approach to improve the security posture of
your network before, during, and after your network implementation.

Solutions

Expert Solution

As a design engineer to design a secured network for a private organization, have to focus on multiple things that improve the security posture of the network. They're given some phases like before, during, and after network implementation.

First, generally, some kind of tips to design a secured network is implementing VLANs that are dividing the hosts according to clans virtually but physically all are connected to a single network device. The second one is by implementing Subnets in the given network to bring and improve the security posture for the network. The intrusion Detection system and Intrusion protection system (IDS AND IPS ) is also should be installed.

Demilitriaized zones implementation is a must and should in a network in making it more secure than before. Access ports implementation while designing is also useful for making the network and privacy secured. Implementation of spanning trees in the network helps in decreasing the network flaws which are useful for attackers to attack and helps in improving the security standards of the network.

The most underrated security implementation is physical security. Be sure that no intruder can get access to your network. It is the best and foremost first lane highly recommended and essential security line to protect from intruders and attackers from outside. A firewall with hardware and software is an essential one to implement and install while designing a network for any organization.

We have to consider all these tips and then implement the network. The designing of the network should be in such a way that there should be no loophole or flaw in the network where an attacker can join and connect with the network. If there is a flaw in the network that letting an intruder connect that network then it will be a greater threat for the whole organization. Engaging Quality of Service is also a part of the implementation of a secured network.

Identifying security flaws and risks before the implementation of the network is essential. The one who helps you in designing the network should be the person who is a more trustworthy one to the company. Because he knows exactly how the network is designed and he knows very well where the security risks are there in the network.

Be sure that any wireless network that you are using should be protected with a high secured password. Be aware while giving access to the employees in the organization. Make sure everyone is well wishes and good use of the organization and not cause any potential damage to the organization.

These are the things to make your network more secure before and after and during the network implementation.

***If you have any doubt please feel free to comment...Thank You...please UPVOTE***


Related Solutions

imagine you are a network engineer who has been hired to design a network for a...
imagine you are a network engineer who has been hired to design a network for a small company consisting of a headquarters office in Indianapolis, Indiana, and a branch office in Minneapolis, Minnesota. The company has hired you to design and build the network infrastructure from the ground up. Following is a brief summary of the business structure: Indianapolis, IN This office is the headquarters for the company. It has 61 employees divided across the following three departments: • Administration:...
Heat Transfer Problem You had been assigned, at General Motors as a design engineer, to design...
Heat Transfer Problem You had been assigned, at General Motors as a design engineer, to design a radiator (Heat Exchanger) for a new model car . It is necessary that the heat exchanger will be compact enough to fit within a space of 2 feet by 3 feet available in front of the car. IF the temperature of the incoming engine coolant is 150 degree Centigrade and the outside temperature of air is about 38 C: What type of heat...
You have been appointed as a team leader to a group of auditors assigned to assess...
You have been appointed as a team leader to a group of auditors assigned to assess RMZ Trading, a big retail store selling mobile phones in Nizwa. The store has been operating in Nizwa for the past five years and has been doing well. It has many customers and income is coming in. Because of this, the store is usually keeping a large stock of its inventory of mobile phones, in varying brands and models. While analyzing the inventory of...
You have been assigned as Coach to a new employee who has been recently appointed as...
You have been assigned as Coach to a new employee who has been recently appointed as an Assistant Manager in the Administration department. Use the GROW model of coaching to plan how you are going to coach this employee. Please type your answer in the table below. GOAL REALITY OPTIONS WAY FORWARD
You have been assigned to report to your network administrators on the use of Teredo
Case Project 4-1: Tunneling IPv6 You have been assigned to report to your network administrators on the use of Teredo. Prepare a two-page memo that outlines why Teredo was developed, how it is implemented in Windows operating systems, for which types of networks it is appropriate, and how long it should be implemented.
Case - 3 You are newly appointed assistant plant manager and have been assigned the task...
Case - 3 You are newly appointed assistant plant manager and have been assigned the task of examining ordering policies for supplies used in production. You found that your employer was using an EOQ policy for ordering cases of lubricating oil. You called the finance department and was told that for the purposes of analysis, the appropriate holding cost was 24 % per year. Demand over the past three years was for 7486 cases or an average of 2495 cases...
(Q2) As a fire engineer, assume that you are assigned to a fire engineering design of...
(Q2) As a fire engineer, assume that you are assigned to a fire engineering design of the retail building with extraordinary atrium that connected six floors. You have to adopt fire engineering approach on this project and conduct a theoretical analysis of full evacuation in this commercial building. Please brief your design procedures. (Hint: Relationship between occupant density, travel speed and flow is recommended to consider.)
As a Project Engineer in consultant firm, you are assigned to design a residential building with...
As a Project Engineer in consultant firm, you are assigned to design a residential building with basement at Yuen Long. How would you describe to the developer your findings from site investigation?
As an Electrical Engineer, you have been asked to design a receiver that detects a particular...
As an Electrical Engineer, you have been asked to design a receiver that detects a particular sequence of bits transmitted from a remote transmitter. Your system is a MEALY machine that has an input ‘w’ and an output ‘z’ that produces z=1 when the previous two values of w are 00 or 11 otherwise it should give z=0. Please note that there would be only 3 states. Draw the corresponding state diagram and state table.
You have been asked to design a network (wired, wireless, or a combination) for a home...
You have been asked to design a network (wired, wireless, or a combination) for a home on which construction will start soon. The home is serviced by a cable TV provider and local phone company, and both provide Internet connectivity. It has two levels totaling 250 meters2 (2700 feet2). Five people will live in the home and use three laptop/tablet computers, a desktop computer, a multimedia server, an Internet-connected TV device (for example, TiVo or digital cable DVR), two multifunction...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT