NETWORK DESIGN PROJECT - INSTRUCTIONS
Overview
For this project, you will utilize the security policies and the high-level network diagram created in Lab 2 to create a report describing the network design necessary to address common security issues.
Inputs:
1. Lab 2 outputs - security policies and high-level network diagram
2. Course textbook - Vaca, J. R. (2014). Network and system security (2nd ed.). Waltham, MA: Syngress/Elsevier. ISBN: 9780124166899.
3. Other external resources as needed
Instructions:
1. Assume that you are designing a network architecture for a complex enterprise with a diverse application, user community, and device mix.
2. Incorporate and modify the security policies and network diagram created in Lab 2 as needed to elaborate on a more comprehensive network design.
3. Describe how the overall network architecture addresses the security threats and vulnerabilities:
a. Denial of Service (DOS) and Distributed Denial of Service (DDOS) attacks
b. Worms, virus, and Trojan horses
c. Man-in-the-middle (MITM) attacks
d. Rootkit injections
e. Data security/privacy on remote mobile devices
4. Document how each component in the network architecture addresses the security issues from step 2 (and others).
5. Beyond the network design, what additional measures do you recommend to address security concerns?
Outputs:
Write a 5-page research -based paper in current APA format that focuses on a network solution design using best practices in network security. The paper must include at least 5 references in addition to the course textbook and the Bible. Include the security policies, network diagram, and answers to steps 3-5 in the instructions.