网络安全代写 | Small to Medium Network Design – Security Update

本次澳洲代写是一个网络安全相关的assignment

Phase 2

You have successfully been awarded the network job, so you now have to implement your design.

[Obviously this will be out of scope for this assignment.]

However, having created your network and tested fully that the  prototype is working, your next task will be to identify where security breaches may occur. These security breaches may be physical, environmental, internal or external.  These should include those specific to the type of organisation you have been assigned where this is relevant, and also more general issues that may affect most networks.

Refer to the powerpoint (from Module 16) on page 2 of the Assignment Resources, or read through Module 16 on Netacad.com

Read these documents on page 2 of the Assignment Resources:

Choose just ONE device mentioned in the above resources to research further, and describe where in your network it would be placed (show in topology). Describe how it would provide security.

Describe three or four other solutions (not hardware/devices) and how they also provide security based on the risks you identified.  You may find more and want to include them as well, which is fine, but do not simply cut and paste text. I would prefer you to choose a few issues then  identify the issue, describe the problem, suggest / implement a solution

You may or may not be able to “fix” all security issues you identify, but you can describe what you think they might be.

You must also consider your original design and identify where it could be improved, based on further study and /or research and feedback. For this part you will not necessarily implement the improvements (except for that mentioned for switches and routers below), only write in a report why you consider they are needed. You may wish to redo your IP addressing scheme having learned more since Phase 1. Due to the limitations of Packet Tracer, some solutions may not be possible in practice, but you can show where changes may be needed.

You should also consider design changes to address issues of  scalability, redundancy and capability and describe how these network architecture features are important in network design.

Your report should now be targetted at the person who will serve as network administrator. This may or may not be the same person as in part 1, it will depend on the individual business, so adapt your report style to suit.

If you change your design during this phase, include images of the altered designs.

Also save your PT file with a new file name.

You also need to update your packet tracer file with security configurations and decriptions that have been learned in the latter part of the course. These mainly apply to switches and routers.

Relevant lab: Secure Network Devices.pka

Please make sure you document any login/password details used in Packet Tracer so that the marker can access the configurations if required.

Deliverables

Part 2 report should be targetted at the network administrator