Question

In: Computer Science

You work for a consulting company as the senior network architect. Your company was contracted by...

You work for a consulting company as the senior network architect. Your company was contracted by a local university to design and deploy a new network. During the deployment process, this network will operate in parallel to the present infrastructure. The network currently has many performance issues and security concerns. A few months ago, there was a situation reported in the local newspapers that students had gained access to the student records database and had made modifications to grades.

Your task as the senior network architect is to design a network that will mitigate these risks and address the performance issues. Special considerations should be given to physical and logical access control and how the proper implementation of the same can reduce the risk.

In a 2–3-page document, discuss the design approach you will use.


Talk about the physical security, logical security, and access control measures that will be implemented. Provide specific details.


Discuss the design approach that will control traffic flow, thus improving performance.


Use diagrams where possible to support your discussion points.


That is all the information that is available to me. What else do you need?

Solutions

Expert Solution

FOR PHYSICAL SECURITY:- Obstacles should be placed in the way of potential attackers and physical sites should be hardened against accidents, attacks or environmental disasters. Such hardening measures include fencing, locks, access control cards, biometric access control systems and fire suppression systems. Second, physical locations should be monitored using surveillance cameras and notification systems, such as intrusion detection sensors, heat sensors and smoke detectors. Third, disaster recovery policies and procedures should be tested on a regular basis to ensure safety and to reduce the time it takes to recover from disruptive man-made or natural disasters.

LOGICAL SECURITY:-Authentication is one of the most popular logical security measures in the cybersecurity space. However, authentication strategies are getting more advanced every year as it becomes clear that traditional password authentication is no longer enough against the range of threats businesses face. These more advanced strategies add additional steps to the authentication process, helping enterprise networks verify with greater certainty the identity of users attempting to access system resources.

Token authentication is one of these measures. In this model, security tokens provide users with a number that changes on a given timeline—typically every minute. As part of a log-on process, enterprise systems will prompt users for the token and match it against internal mechanisms to ensure the token is correct. Two-factor authentication (2FA) is another emerging area of logical security. In addition to a username and password, users might have to provide answers to security questions or confirm a PIN sent to a separate device or app.

In addition to types of authentication—which can even include biometric measures—there are other logical security measures available. For example, user segmentation allows system administrators to control the areas of the organization's network that individual users can access. This ensures that in the event of a user’s account being compromised in some way, the attacker won’t be able to wreak havoc across the organization’s entire network.

ACCESS CONTROL MEASURES

Access control is a process that is integrated into an organization's IT environment. It can involve identity and access management systems. These systems provide access control software, a user database, and management tools for access control policies, auditing and enforcement. When a user is added to an access management system, system administrators use an automated provisioning system to set up permissions based on access control frameworks, job responsibilities and workflows.The best practice of "least privilege" restricts access to only resources that an employee requires to perform their immediate job functions.A common security issue is failure to revoke credentials and access to systems and data when an individual moves into a different job internally or leaves the company.


Related Solutions

You work for a surveying company. Main roads WA has contracted your company to set out...
You work for a surveying company. Main roads WA has contracted your company to set out the centre line of a new highway to be constructed. You have found the following video online about a robot that can do the work more effectively:[10 marks] https://www.youtube.com/watch?v=ZeTJBxgSjEs Write a one-page report to convince your line manager of the benefits of using the robot for line marking compared to traditional surveying methods.Use scholarly sources to support your argument.In your report address the following:...
Assuming that you currently work for a consulting firm. You are considering opening your own consulting...
Assuming that you currently work for a consulting firm. You are considering opening your own consulting firm, where you expect to earn RM 200,000 per year once you get established. To run his own firm, you would need an office and a law clerk. You have found the perfect office, which rents for RM 50,000 per year. A law clerk could be hired for RM 35,000 per year. To open your own consulting firm, you would have to quit his...
Assuming that you currently work for a consulting firm. You are considering opening your own consulting...
Assuming that you currently work for a consulting firm. You are considering opening your own consulting firm, where you expect to earn RM 200,000 per year once you get established. To run his own firm, you would need an office and a law clerk. You have found the perfect office, which rents for RM 50,000 per year. A law clerk could be hired for RM 35,000 per year. To open your own consulting firm, you would have to quit his...
You are an audit senior in charge of your first audit and are wrapping up your work....
You are an audit senior in charge of your first audit and are wrapping up your work. The client's controller, a pretty fussy person, knows you're going to ask for a "representation letter" near the end of the audit which he thinks adds an unnecessary burden on him because he's already overworked. He says he won't comply with your request until you explain why an auditor needs a representation letter for every audit. 
Apply IP Configurations to the network. You may use this network ID 192.168.200.0. Show your work....
Apply IP Configurations to the network. You may use this network ID 192.168.200.0. Show your work. Network 1: 240 Host Network 2: 75 Hosts Network 3: 48 Hosts Network 4: 10 Hosts Connect to the Internet Connect to a DMZ For each network, find the following Network ID Subnet Mask Default Gateway Broadcast Range of IP Addresses for each network
Explain the methodologies and design issues that will need to be addressed by the network architect...
Explain the methodologies and design issues that will need to be addressed by the network architect when planning and designing a network. Also, detail how hardware, software, data, and media will determine the technology implemented. Include discussion on how devices such as switches, routers, and IOS function within a network.
The network architect/engineer usually are the ones asking the questions. And the customers, users, and IT...
The network architect/engineer usually are the ones asking the questions. And the customers, users, and IT staff using the network usually are the ones that would provide answers to the network design questions. Listed below are a few basic subject areas to consider when forming your questions. You may use this list to identify what questions would be asked for each of the subject areas. You may include other subject areas as you deem appropriate. Users Organization Growth Security Budget...
You are a member of the senior executive group at your company. The company has a...
You are a member of the senior executive group at your company. The company has a reputation of compensating its executives at a very high level. In fact your own compensation appears to be at least 50% above that of your peers in like companies. Due to pressure from the founder who has a controlling interest in the company and now lives in another state the company is considering developing an incentive system for all employees who other than the...
Scenario You work for a company called Apteryx systems as a Junior Network engineer. The company...
Scenario You work for a company called Apteryx systems as a Junior Network engineer. The company are planning to expand its organisation to two new locations across Auckland and they want to connect all 3 sites together and this may require them to redesign their network at their current headquarters. The Companies planned 3 sites is intended to accommodate the following 1. Headquarters – Located on Queen St in the Auckland CBD • The network consists of i. A Primary...
( show all work including formulars ) as a senior analyst for the company you have...
( show all work including formulars ) as a senior analyst for the company you have ... Question: Show Excel ( show all work including formulars ) As a senior analyst for the company you have bee... show Excel ( show all work including formulars ) As a senior analyst for the company you have been asked to evaluate a new IT software project. The company has just paid a consulting firm $50,000 for a test marketing analysis. After looking...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT