Question

In: Computer Science

You are a Network and security engineer for the XYZ Consulting Corporation, which is a leading...

You are a Network and security engineer for the XYZ Consulting Corporation, which is a leading network designer and security provider for the small-scale offices. As the Network and security engineer you are required to perform the following tasks.

Task 1: Propose a network design for small scale office (Ex: Business type, departments, building plan). You are free to assume the name of the office and number of staffs ➢ Purpose of the Project ➢ Network overview (ex: connecting PCs, subnetworks, servers or wi-fi networks) • Explain briefly about the device used. ➢ Requirements of the project including network diagram • Draw and explain the proposed network diagram • Design a network using packet tracer. Configure routers, switches and end devices you have used. Test your network by pinging end devices across different departments. ➢ What are the common attacks plaguing your network? How to prevent from attacking your network? ➢ Critically analyse possible security issues in your network and suggest some prevention techniques.

Solutions

Expert Solution

Imagine there is a company named AitiAasik where it is a small Advertisement Company .

Its major work to advertise the business models and products of the clients, So there network many network models to utilize first we willl see the network requirements here:we assume here we have group of 20 systems

1)A secure internet connection from the internet service provider

2)A Router with good speed and bandwidth for 20 systems

3)Modem

4)Firewall

5)Switches for connecting our systems internally as a network (20)

6)Cable or fiber optics to connect them

7)Ethernet hubs and management softwares for the network.

Designing our Netwrok and configuring it.

For Small networks generally the logic flows goes like this the information from internet service provider(ISP) to modem which connects to router after it connects to the system of our company internally

These are the main types of configuations:

1)Star

2)Tree

3)Mesh

4)Token ring

5)Bus

But for our requirements and our budget we will go with Bus .As it is cost effective for smaller networks.and thelayout of this type is comapretively simple and if we want increase our network we can easily scale up the network which means we can add systems easily to our network by adding couple of more wires to the network.

The design of the networ topology used with description attatched

Design we will go by LAN(Loacal area network): This type of design conects the local nodes or in the close location typically used in the office buildings.

Designing a network packet tracker:

Cisco packet tracker

Configuration steps:

1)Open network topology and identify you components of the network

2)Complete the cabling

3)Configure the IP address on the end devices

4)Configure the IP address on the switches

5)Configure your default gateway

6)Test the connectivity

Common Attacks:

1)Phising

2)Malware injection

3)Password attacks

4)Ransomeware

These are the few type of attacks these can be solved by the below prevention techniques

1)Using Complex passwords to encrypt the network traffics

2)Using VPN to enable remote computer access

3)Setup a guest network for other wireless users

4)Limit physical access to router

5)Use upto date definitions of security softwares


Related Solutions

A consulting firm hired you to improve the network security of a Hospital by adding extra...
A consulting firm hired you to improve the network security of a Hospital by adding extra services for defence against external attacks. 1. In order to protect classified encrypted data from disclosure and transmission outside of the Hospital network, you need to choose among the following: proper configuration of DMZ, use of strong encryption algorithms, safeguards over keys. State your selection and justify your choice. 2. You want to use a packet firewall to protect the Hospital network but you...
A consulting firm hired you to improve the network security of a Hospital by adding extra...
A consulting firm hired you to improve the network security of a Hospital by adding extra services for defence against external attacks. 1. In order to protect classified encrypted data from disclosure and transmission outside of the Hospital network, you need to choose among the following: proper configuration of DMZ, use of strong encryption algorithms, safeguards over keys. State your selection and justify your choice. 2. You want to use a packet firewall to protect the Hospital network but you...
Case: Northridge Security Consultants, a security consulting company that specializes in network security for businesses, has...
Case: Northridge Security Consultants, a security consulting company that specializes in network security for businesses, has been using you as an outside contractor to provide research and customer service for their clients. A landscaping business, Sunset Landscapers, has contracted with NSC to help them implement cryptography to protect all documents and transmissions throughout their network. They have over twenty locations nationwide. NSC has found that even though the company would like this technology, the IT Director is resistant to any...
imagine you are a network engineer who has been hired to design a network for a...
imagine you are a network engineer who has been hired to design a network for a small company consisting of a headquarters office in Indianapolis, Indiana, and a branch office in Minneapolis, Minnesota. The company has hired you to design and build the network infrastructure from the ground up. Following is a brief summary of the business structure: Indianapolis, IN This office is the headquarters for the company. It has 61 employees divided across the following three departments: • Administration:...
As you increase the security of your network, you are concerned that the added security measures...
As you increase the security of your network, you are concerned that the added security measures may impact in ways you had not intended. For example, how could a firewall have a negative impact on business from the following list? Explain It can filter packets from a site known to cause DoS attacks. It can filter packets that have a virus signature. It can block traffic that should be allowed through. It can log every packet that is transmitted.
The XYZ corporation, a monopolist, receives a report from a consulting firm concluding that the demand...
The XYZ corporation, a monopolist, receives a report from a consulting firm concluding that the demand function for its product is: Q = 80 – 1.5P + 2.3M + 0.75A Where Q is the number of units sold, P the price of its product, M is buyers’ per capita income, and A is the firm’s advertising expenditure. The total cost function is: C(Q) =50,000 + 42Q – 8Q2 + 1.5Q3 Buyer’s per capita income is estimated to be $10,000 and...
You are a new computer network engineer at School of IT and Engineering at Melbourne Academy...
You are a new computer network engineer at School of IT and Engineering at Melbourne Academy of Technology (MAT). Recently MAT suffered a major data loss where hundreds of student credit card details were stolen. forensic engineers identified that the culprit hacked the free Internet offered within the campus and eventually acquired the password of the system admin at the school. a) Recommend appropriate wireless network security solutions to better protect data at MAT. b) Discuss the ethical standards in...
You are a Structural Engineer working in a structural repair and rehabilitation consulting firm. You have...
You are a Structural Engineer working in a structural repair and rehabilitation consulting firm. You have been assigned to provide the answers and solutions for the following job: “Some cracks were observed on a suspended reinforced concrete slab on an existing public building. As these cracks raised public concerns, the owner has decided to carry out a structural investigation into the cause of cracking to check the structural integrity and determine the remedial works to be done.” (a) Outline and...
Define the scope of network security.
Define the scope of network security.
1. a) If you were a consulting engineer and were submitting Turnkey tender on behalf of...
1. a) If you were a consulting engineer and were submitting Turnkey tender on behalf of a Turnkey Contractor, would you consider a conflict of interest between the role of a consulting engineer and contractor? Enlarge on the ethics of this subject. b) It is clear to you that an Engineer engaged in a particular project (implement at the taxpayer’s account) is not maintaining professional standards, i.e. professional competence and integrity are lacking. What would be your reaction? Will you...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT